text stringlengths 32k 189k | timestamp stringlengths 20 20 | url stringlengths 15 660 |
|---|---|---|
These Terms and Conditions (the “Terms and Conditions” entered into between Ready Freddy VoIP, referred to as (RF VoIP) in this document and Customer.
RF VoIP reserves the right to modify these Terms and Conditions from time to time. Any modifications to these Terms and Conditions will be effective on the first day of the month following the posting of modified Terms and Conditions at https://rfvoip.net/terms-conditions/ Customers should therefore check the site regularly for updated versions.
“DID” means a telephone number assigned by RF VoIP to Customer (or ported to RF VoIP by Customer) has functionality that allows inbound voice communication.
“911 Enabled DID” means a telephone number assigned by RF VoIP to Customer (or ported to RF VoIP by Customer) has functionality that allows inbound voice communication and also has an Address registered to the 911 Enabled Two-Way Number. Each account comes standard with a Default 911 Enabled DID that you register your location address with for 911. You can purchase additional e911 Address locations as outline below.
“ANI” mean Automatic Number Identification.
“Basic 911 Service” means the ability to route an emergency call to the designated entity authorized to receive such calls serving Customer’s Registered Address. With Basic 911 Service, the emergency operator answering the phone will not have access to the caller’s telephone number or address information unless the caller provides such information verbally during the emergency call.
“Call Rating” means the methodology used to define the type and jurisdiction of specific call. Call Rating criteria includes the originating Automatic Number Identification (ANI) (sometimes referred to as the from or source fields) and terminating ANI provided in the call signaling (sometimes referred to as the destination or To fields; may also include remote party ID field). Call Rating defines the type of calls and correlating costs per call.
“Class 5 Features” means additional phones features beyond standard routing and audio. For example, both call hunting and voicemails are Class 5 Features.
“Default” means (and will occur): (i) if Customer fails to make any payment for the Service not disputed in good faith pursuant to terms below.
“Directory Listings” means the listings of a Subscriber’s telephone number in the ILEC directory for a market.
“Enhanced 911 Services” or “E911” means the ability to route an emergency call to the designated entity authorized to receive such calls, which in many cases is a Public Safety Answering Point (“PSAP”), serving Customer’s Registered Address and to deliver the Subscriber’s telephone number and Registered Address information automatically to the emergency operator answering the call.
“Improper Calls” means call types that (i) would result in RF VoIP incurring originating access charges, local exchange carrier “DIP” fees or other call types that may be subject to a reverse billing process, (ii) 911 / E911 or other emergency service calls; (iii) any unauthorized or fraudulent communications on pay-per-call numbers, information service calls, directory assistance calls or the like; and/or (iv) mass calling events, excessive non-completed and invalid calls and failed calls due to inadequate Customer capacity.
“International” means anywhere outside of the continental United States, including Alaska and Hawaii.
“LCA” or “Local Calling Area” means a geographical local calling area (determined by the applicable ILEC) containing one or more Rate Centers.
“Number” or “Numbers” means 911 Enabled Two-Way Number(s) and/or Toll Free Number(s).
“Operator and Directory Assistance” means live or automated operator assistance for the placement of Subscriber calls, listing services and/or related information. Usually dialed with a 411 or NPA-555-1212.
“Phone System” means communication system that transmits information between distant points. For the purpose of clarity, a phone system such as a Key-system (i.e. IP-Key-system, Analog Key-system, Digital Key-system or Hybrid Key-system), Private Branch Exchange (PBX) (aka IP-PBX) system, or any other voice application or appliance.
“Rate Center” means a geographic area (determined by the applicable ILEC) within a LCA or market that is associated with one or more specific NPA/NXX codes.
“Registered Address” means the address provided by Customer and entered into appropriate RF VoIP provided portals, which address represents the physical location from which the Service (and 911 Enabled Two-Way Numbers associated with the Service) will be used.
“Responsible Organization” mean the party hereto that is responsible for managing and administering the account records in the Toll Free Service Management System Database.
“Service” means RF VoIP service provided pursuant to these Terms and Conditions and as further described in Section 2 below.
“Service Term” will be as defined in Section 11 below.
“Standard Business Use” means use of the Service as contemplated by these Terms and Conditions in a manner consistent with business use, which will include, without limitations: (i) use with a Phone System; (ii) a maximum of 15 Numbers per SIP trunk; and (iii) a Registered Address. Standard Business Use does not included an IP address outside of the United States.
“Standard Support” allows the customer to open a support ticket or contact our support department by telephone to receive help in troubleshooting why something may not be working. If we determine that everything from our end is functioning normal you will need to work with your network engineer. To contact support just send an email to support@rfvoip.com.
“Toll Free Number” means a telephone number that supports NADP and is assigned to Customer by RF VoIP (or ported to RF VoIP by Customer) for use with the Service.
“U.S. Domestic” means the continental United States (excluding Alaska and Hawaii).
Provided that Customer is not in Default, RF VoIP will provide Customer with the Service described in these Terms and Conditions for the Service Term. Customer is solely responsible to obtain, use, configure and operate any customer premise equipment that Customer may use in connection with the Service. The Service is provided with Standard Support, unless otherwise indicated in writing and signed by RF VoIP CEO as an Addendum to these Terms and Conditions.
The Service is a bundled virtual trunking service providing (i) real-time, two-way inbound, outbound local, and outbound long distance voice communication series via Two-Way Number(s), and/or (ii) real-time, two-way inbound voice communication services via Toll Free Number(s). The Service will route between a Customer’s PBX/Phone System and either the PSTN or another IP address with RF VoIP delivering traffic to Customer’s PBX/Phone System via an IP connection using SIP. Each account is allowed to only have one PBX/Phone system connected to the account. Each trunk enables a single concurrent call but can be oversubscribed with multiple Numbers accessible via a single trunk. If purchased by Customer trunks also may include Basic 911 Services, 411, Operator and Directory Assistance, inbound caller id, caller location and/or white page listing. For clarity, (i) Customer must provide RF VoIP a Registered Address to utilize the Service, and (ii) Customer only may utilize Two-Way Numbers and/or Toll Free Numbers provided by RF VoIP (or ported to RF VoIP) in connection with the Service.
Calls will be rated as local if the call terminates within the LCA associated with the call’s originating ANI, which must be a 911 Enabled Two-Way Number. All calls terminating outside a Subscriber’s LCA will be rated as either intrastate, interstate or international long distance. RF VoIP will distinguish interstate versus intrastate versus international long distance. RF VoIP utilized the value in the “FROM” field in the SIP header as the originating ANI for establishing the jurisdiction of the call (i.e., interstate versus intrastate versus international). However, if a value is present in any of the SIP header fields used for caller id (e.g. Remote party ID, P-Assert-Identity), RF VoIP may use this in lieu of the “FROM” field as the originating ANI to determine the jurisdiction of a call. If RF VoIP cannot accurately rate a call due to an invalid or omitted originating ANI, and its rating jurisdiction is not international, RF VoIP will default to rating the call as intrastate. RF VoIP will determine the originating or terminating carrier by evaluating the terminating ANI down to the NPA-NXX-X level. Customer must maintain the originating ANI for all outbound calls and abstain from any ANI manipulation in the call signaling.
Rating outbound calls as local only applies to calls that utilize Two-Way Numbers as the originating ANI. Termination of calls from telephone numbers not provided by RF VoIP (or ported to RF VoIP) will be rated as either interstate or intrastate long distance. RF VoIP will distinguish interstate versus intrastate long distance based on the originating ANI and terminating ANI provided in the call signaling. If RF VoIP cannot accurately rate a call due to an invalid or omitted originating ANI, and its rating jurisdiction is not international, RF VoIP will default to rating the call as intrastate.
If Customer utilized Toll Free Numbers in connections with the Service, such toll free service is an IP termination service for calls terminating to such Toll Free Numbers. Customer is the Responsible Organization for such Toll Free Numbers and all charges associated with the service.
Customer may not use the Service with (or in connection with) a least cost router (or “LCR”), which RF VoIP will determine, in its reasonable discretion, based upon analysis of Customer’s traffic patterns in the ordinary course of business.
In addition to any applicable limitations pursuant to the AUP (as defined below), Customer may not use the SIP Trunking Service with (or in connection with) an auto-dialer (or “Robo-dialer”), which Provider will determine, in its reasonable discretion, based upon analysis of Customer’s traffic patterns in the ordinary course of business.
The Service requires a Registered Address. Customer may not move the physical location from which the Service is used away from the Registered Address without updating the Registered Address by Customer as contemplated in the definitions of “Registered Address”. If Customer fails to notify RF VoIP of any move of the physical location from which the Service is used without updating the Registered Address as contemplated in the definition of “Registered Address”, RF VoIP may, in its sole discretion, immediately suspend the Service until Customer notifies RF VoIP of such move (or otherwise updates the Registered Address as contemplated in the definition of “Registered Address”). Customer acknowledges and agrees that (i) any such failure by Customer may cause incorrect routing of 911 Services for which Customer will be solely liable, and (ii) the continuation of certain 911 Enabled Two-Way Numbers may be restricted or precluded based upon the physical location to which Customer wishes to move the Registered Address.
The Service does not included any Class 5 Features. For clarity, the Service will not provide any of the calling call types: 976, 900, or 1010xxx.
If Customer utilizes Toll Free Numbers in connection with the Service, such toll free service is an inbound-only service and does not provided any outbound calling, including, without limitation, 911 Services, with respect to such Toll Free Numbers. Customer is strictly prohibited from using (or reconfiguring to support such use) any toll free service or any Toll Free Numbers in connection with the Service in connection with any outbound calls or any Improper Calls. RF VoIP may take immediate action to prevent Improper Calls from taking place, including without limitation, denying any Service to specific ANIs and/or terminating these Terms and Conditions and/or the Service.
In addition to any other rights that RF VoIP has or may have pursuant to theses Terms and Conditions, if RF VoIP determines, in its discretion, that Customer’s use of the Service (or the specific method or technology utilized by Customer) materially and adversely interferes with or otherwise places in jeopardy RF VoIP’s network, other customers, partners and/or overall business(es) of RF VoIP or any of RF VoIP’s other customers or partners, RF VoIP may suspend or terminate these Terms and Conditions, and/or the Service immediately upon as much prior notification to Customer as is practicable under the circumstances, if any.
The Service is provided for Standard Business User for a single company only. RF VoIP reserves the right to ensure that Customer’s use of the Service is consistent with Standard Business Use and otherwise complies with these Terms and Conditions. If RF VoIP determines that Customer is not using the Service for Standard Business Use for a single company, RF VoIP may, in addition to all other rights and remedies pursuant to these Terms and Conditions, notify Customer and allow Customer the opportunity to cure any such use withing two (2) calendar days. Customer may cure by stopping any such use, buying more trunks in order to comply with Standard Business Use, or Customer’s use of the Service in any other way that is consistent with Standard Business Use.
Each High Volume SIP trunk has a softcap or 3,000 combined inbound and outbound minutes (excluding metered international an toll free calling) in any calendar month (or billing cycle, if applicable). If you purchases 10 High Volume trunks your softcap would be 30,000 minutes during any billing cycle that you maintain those 10 trunks in your account.
1) Calls to Canadian numbers or inbound calls on Canadian DID’s account for 2 minutes per actual minute called as it applies against the 3,000 minute softcap due to the high cost of calling to and from Canada.
2) Calls to other North American International numbers such as but not limited to US Virgin Islands that are included as part of the High Volume trunking service and not otherwise billed separately may be accounted as more then 1 minute per actual minute called as it applies against the 3,000 combined inbound and outbound minute limit described above, at RF VoIP’s reasonable discretion. We will notify customers who exceed this softcap during any billing cycle and work with them to determine how many additional trunks would need to be purchased if they are exceeding this softcap.
The RF VoIP High Volume trunking service is not to be used with any type of Softswich or Call Router with the intention of feeding phone service from a service provider to their customers using their own Softswitch or Call Router in a wholesale/resale environment. This service is to be registered to a single PBX/Phone System direct that belongs to a customer for their own internal use only. You are not to use any RF VoIP service for purchasing and porting the numbers out to another service provider. RF VoIP may determine, in its reasonable discretion, if Service is being purchased or used in violation of this provision, based upon analysis of Customer’s traffic, purchase and cancellation patterns in the ordinary course of business. In addition to all other remedies that RF VoIP has listed as part of the terms listed in this agreement, RF VoIP has the right to assess a Port Out fee of up to $100.00 per phone number that is being ported out of an account that RF VoIP has reasonably determined is being used for the resale of phone numbers.
All metered services require the customer to pre-pay a minimum of $25.00 but the customer can request that dollar amount be higher. As Metered Services are used such as Toll Free, International or any other items defined in Section 14 (Metered or Additional Charges). Once the customers balance is less then $5.00 the system will auto charge your Credit Card to Top Up amount by default of no less then $25.00 or any higher amount that you request. The Top Up service will only charge your account once every 24 hours so if you will be using more then $25.00 per day in metered services you will need to have us increase that Top Up amount. Once your Balance falls to $0.00 no Metered Services will be allowed and will be blocked. Any new automated charges below the Top Up amount, not including purchases from the store or your normal monthly service charges, will use the Top Up balance.
The Service includes either E911 Service (or Basic 911 Service under certain circumstances) if, and only if; the call’s originating ANI is a 911 Enabled Two-Way Number.
When a caller from Customer’s Registered Address dials the digits 9-1-1 from a 911 Enabled Two-Way Number, the 911 Enabled DID Number and the Registered Address are automatically sent to the local emergency center servicing the physical location of the Registered Address. Emergency operators will have access to this information regardless of whether the caller is able to verbally provide such information to the emergency call-taker. Accordingly, with E911 Service, the emergency operators will have the caller’s callback telephone number and Registered Address. In limited circumstances, callers utilizing a 911 Enabled Two-Way Number equipped with E911 may have their calls routed to the national call center. Please see the description below for an explanation of when this would occur and how this service operates. If a customer sends any number other than a 911 Enabled DID when calling 911, RF VoIP reserves the right to substitute a Customer’s Primary E911 enabled Two-Way Number that is registered at the Customer’s Registered Address. In this case, the emergency operator will have this callback number and the call will be routed to the local emergency center serving this location. The Customer is responsible for testing and assuring that their proper address and call-back number is being delivered to the E911 center and can do this by dialing 933 and listening to the number transmitted and the registered address played back to the customer.
When a caller from Customer’s Registered Address dials the digits 9-1-1 from a 911 Enabled Two-Way Number, the call is sent to the local emergency center serving the physical location of the Registered Address. However, emergency operators answering the call will not have automatic access to the caller’s telephone number or the Registered Address because the emergency center will not be equipped to receive, capture or retain Customer’s telephone number and/or Registered Address. Accordingly,callers must be prepared to verbally provide both callback and address information. If the call is dropped or disconnected, or if the caller is unable to speak, the emergency operator answering the call will not be able to call the caller back or dispatch help to the caller’s address.
Depending upon their geographic location, certain Customers do not have access to either E911 Service or Basic 911 Service. If Customer does not have access to either E911 Service or Basic 911 Service, emergency calls placed using the digits 9-1-1 will be sent to a national emergency call center. A trained agent at the emergency call center will ask for caller’s name, telephone number, and location and then transfer the caller to the appropriate local emergency center or otherwise determine the best way to provide emergency services to the caller. Like Basic 911 Service, the trained operators answering calls in the national call center will not have automatic access to the caller’s telephone number or Registered Address because the national call center will not be equipped to receive, capture or retain Customer’s telephone number and/or Registered Address. Accordingly, callers must be prepared to verbally provide both callback and address information. 911 calls also may be sent to RF VoIP’s national emergency call center if there is a problem validating the Registered Address provided by Customer, if Customer is located in an area that is not covered by the land line 911 network, or if Customer has E911 Service or Basic 911 Service based on their geographic location, but the call fails to complete and is routed to the national emergency call center for failover purposes.
d. E911 Service is not available from all local emergency centers; the determination of whether E911 Service, Basic 911 Service or national call center service will apply generally is not controlled by RF VoIP. As additional local emergency centers become capable of E911 Service, RF VoIP will automatically upgrade Customer from Basic 911 Service to E911 Service. RF VoIP will not notify Customer of any such upgrade. In limited circumstances, callers equipped with Basic 911 Service based on their geographic location may have their calls routed to the national call center as described above.
i. CUSTOMER ACKNOWLEDGES AND AGREES THAT THE SERVICE IS INTERNET BASED AND THAT 911 SERVICES ARE DIFFERENT THAN THAT OF TRADITIONAL WIRELINE SERVICE. FOR BASIC 911 SERVICE OR E911 SERVICE TO BE ACCURATELY ROUTED TO THE APPROPRIATE EMERGENCY RESPONDER, CUSTOMER MUST PROVIDE THE 911 ENABLED TWO-WAY NUMBER USED WITH THE SERVICE FOR THE REGISTERED ADDRESS, IN THE ‘USERPART’ OF THE ‘FROM URI’ CONTAINED IN THE SIP ‘FROM’ HEADER.
ii. CUSTOMER ACKNOWLEDGES THAT THE SERVICE MAY NOT SUPPORT BASIC 911 SERVICE OR E911 SERVICE DIALING IN THE SAME MANNER AS TRADITIONAL WIRELINE PHONE SERVICE. CUSTOMER AGREES TO INFORM ALL USERS OF THE POTENTIAL COMPLICATIONS ARISING FROM BASIC 911 SERVICE OR E911 SERVICE. SPECIFICALLY, CUSTOMER ACKNOWLEDGES AND AGREES TO INFORM ALL EMPLOYEES, GUESTS, AND OTHER THIRD PERSONS WHO MAY USE THE SERVICE THAT BASIC 911 SERVICE AND E911 SERVICE WILL NOT FUNCTION IN THE CASE OF A SERVICE FAILURE FOR ANY OF THE FOLLOWING REASONS: (A) POWER FAILURES, (B) SUSPENDED OR TERMINATED BROADBAND SERVICE, (C) SUSPENSION OF SERVICE DUE TO BILLING ISSUES, AND/OR (D) ANY OTHER SERVICE OUTAGES NOT DESCRIBED HEREIN. CUSTOMER FURTHER ACKNOWLEDGES THAT FAILURE TO PROVIDE A VALIDATED REGISTERED ADDRESS IN THE REQUISITE FORMAT MAY CAUSE ALL BASIC 911 SERVICE OR E911 SERVICE CALLS TO BE ROUTED TO THE INCORRECT LOCAL EMERGENCY SERVICE PROVIDER. FURTHERMORE, CUSTOMER RECOGNIZES THAT USE OF THE SERVICE FROM A LOCATION OTHER THAN THE LOCATION TO WHICH THE SERVICE WAS ORDERED, I.E., THE “REGISTERED ADDRESS,” MAY RESULT IN BASIC 911 SERVICE OR E911 SERVICE CALLS BEING ROUTED TO THE INCORRECT LOCAL EMERGENCY SERVICE PROVIDER.
iii. CUSTOMER ACKNOWLEDGES AND AGREES THAT NEITHER RF VOIP, ITS UNDERLYING CARRIER, OR ANY OTHER THIRD PARTIES INVOLVED IN THE ROUTING, HANDLING, DELIVERY, OR ANSWERING OF EMERGENCY SERVICES OR IN RESPONDING TO EMERGENCY CALLS, NOR THEIR OFFICERS OR EMPLOYEES, MAY BE HELD LIABLE FOR ANY CLAIM, DAMAGE, LOSS, FINE, PENALTY OR COST (INCLUDING, WITHOUT LIMITATION, ATTORNEYS FEES) AND CUSTOMER HEREBY WAIVES ANY AND ALL SUCH CLAIMS OR CAUSES OF ACTION, ARISING FROM OR RELATING TO THE PROVISION OF ALL TYPES OF EMERGENCY SERVICES TO CUSTOMER. CUSTOMER FURTHER AGREES AND ACKNOWLEDGES THAT IT IS INDEMNIFYING AND HOLDING HARMLESS RF VOIP FROM ANY CLAIM OR ACTION FOR ANY CALLER PLACING SUCH A CALL WITHOUT REGARD TO WHETHER THE CALLER IS AN EMPLOYEE OF CUSTOMER. CUSTOMER ACKNOWLEDGES AND AGREES TO HOLD HARMLESS AND INDEMNIFY BADNWIDTH.COM FROM ANY CLAIM OR ACTION ARISING OUT OF MISROUTES OF ANY 911 CALLS, OR WHETHER LOCAL EMERGENCY RESPONSE CENTERS OR NATIONAL EMERGENCY CALLING CENTERS ANSWER A 911 CALL OR HOW THE 911 CALLS ARE HANDLED BY ANY EMERGENCY OPERATOR INCLUDING OPERATORS OF THE NATIONAL CALL CENTER. THE LIMITATIONS APPLY TO ALL CLAIMS REGARDLESS OF WHETHER THEY ARE BASED ON BREACH OF CONTRACT, BREACH OF WARRANT, PRODUCT LIABILITY, TORT AND ANY OTHER THEORIES OF LIABILITY.
RF VoIP may from time to time interrupt or otherwise impact Service for maintenance. RF VoIP will make commercially reasonable efforts to provide to Customer reasonable advance notification (via phone, email or other means) of such maintenance. RF VoIP will use commercially reasonable efforts to perform such maintenance in a manner that will not unreasonably interrupt the Service. RF VoIP may interrupt its provision of the Service for unscheduled emergency maintenance without notice to Customer.
RF VoIP will require a completed and signed Letter of Authorization (“LOA”) for any existing telephone numbers Customer wishes to port from another carrier to RF VoIP. RF VoIP may require a recent copy of the current phone bill which contains Customer’s Billing Telephone Number (“BTN”) as well as a record of any numbers that need to be ported. RF VoIP must receive necessary LOA(s) and/or bill copy(ies) before RF VoIP will initiate a port request and obtain a Confirmed Port Date. The “Confirmed Port Date” is the date upon which the current voice provider has agreed to port a number(s) to RF VoIP. The Confirmed Port Date interval may in some cases take as long as one (1) to two (2) business weeks after Customer initiates the port request; since the port interval is a product of the accuracy of the information provided to RF VoIP by Customer, as well as the processing speed of Customer’s current voice provider, RF VoIP makes no guarantees regarding the promptness of a port, however all ports will be provided consistent with applicable law.
All services are activated within a few minutes usually of signing up for service with the exception of Number ports, which usually take 2-4 weeks.
The “Service Commencement Date” will be the date when the voice components are delivered and confirmed by RF VoIP via email. The “Service Commencement Date” ill be the first date of billing for the Service.
RF VoIP provides support for the Service as described at https://rfvoip.net/sla based on SLA’s as defined here.
The monthly recurring charge(s) (“MRC”) and any non-recurring charge(s) (“NRC”) applicable to use of the Service, as well as any other charge(s) applicable to use of the Service, will be as stated in these Terms and Conditions or referenced to https://rfvoip.net/service-rates. All applicable federal, state or local taxes and all use, sales, commercial, gross receipts, privilege, surcharges, or other similar taxes, license fees, miscellaneous fees, and surcharges, whether charged to or against RF VoIP, will be payable by Customer, including, without limitation, any cost recovery fee which will represent an accurate and non-inflated recovery of RF VoIP, or any underlying provider’s, miscellaneous tax, surcharge, and fee payments to federal, state or local governmental authorities associated with the provision of the Service by RF VoIP to Customer. RF VoIP retains the right to invoice Customer for costs incurred by RF VoIP from time to time related to RF VoIP compliance with court orders and other actions of governmental agencies or entities, including, without limitation, subpoenas duces tecum (and similar subpoenas), related to telephone numbers and other information related to or associated with Customer or Customer’s customers and/or end users. At its sole discretion, RF VoIP may require a security deposit to continue providing Service should Customer’s credit profile yield insufficient credit. Additionally, at its sole discretion, RF VoIP reserves the right to demand immediate payment by wire and block Customer’s voice traffic should RF VoIP determine Customer’s usage exceeds their approved level of credit. Except as otherwise provided in these Terms and Conditions, RF VoIP will not increase any MRCs and/or NRCs during the Initial Service Term; thereafter RF VoIP may increase MRCs and/or NRCs upon at least thirty (30) days written notice. All MRCs, NRCs, rates and/or other charges are subject to change immediately in the event there are mandated surcharges or taxes imposed by federal, state or governmental agency. Notwithstanding the foregoing, in the event of governmental or regulatory action, RF VoIP reserves the right, at any time without liability, to: (i) pass through to Customer all, or a portion of, any changes or surcharges or taxes directly or indirectly related to such governmental or regulatory action;(ii) modify the Service, rates (including any rate guarantees), promotions, these Terms and Conditions in order to conform to such action; or (iii) if such governmental or regulatory action materially and adversely impairs the provision of Service, as reasonably determined by RF VoIP, terminate these Terms and Conditions.
13) Metered or Additional Charges.
All per minute rates (Interstate LD, Intrastate LD, Local if applicable, 800 Domestic) assume at least 95% of calls terminating will be of a call duration of no less than six (6) seconds in length. If 5% or more of Customer’s completed calls are equal to or less than six (6) seconds in length during any billing cycle, then RF VoIP reserves the right to charge, and Customer will pay, a charge per short duration call as published at https://rfvoip.net/service-rates. This charge will be in addition to Customer’s current rates.
If no rate schedule is attached, international rates are available at https://rfvoip.net/service-rates (Please note: the posted international rates may include some rate centers in Canada, however, most of Canada outbound calling is included with the High Volume Trunking Service except those listed on the International rate schedule.) International per minute rates are subject to change. RF VoIP reserves the right to block all or a number of high cost, international routes.
Domestic inbound calls to Toll Free Numbers are billed at the quoted flat, per-minute rate or rate schedule that you agreed to at signup and can be found at https://rfvoip.net/service-rates .
The Service may provide Operator and Directory Assistance. Specific per call rate as defined at https://rfvoip.net/service-rates will apply.
A per Phone Number charge as defined at https://rfvoip.net/service-rates will be charged for each phone number you request us to port. This charge is placed on your account regardless if you cancel the port request after submitting it. For cancelled LNP requests within 48 hours of FOC, a non-recurring charge of $100 per Number will be charged. Once a port has been completed you can initiate a port out of any number at anytime to any carrier.
In the event Customer’s Toll Free Number(s) receives any inbound calls originating from a Payphone, these calls will be subject to a charge per call. The charges are based on regulated FCC Payphone Compensation rules. These regulatory charges will be passed through directly to the customer https://rfvoip.net/service-rates.
Billing increments, if applicable, are set forth below.
RF VoIP will bill Customer for the Service as provided in these Terms and Conditions. Invoices will include all applicable federal, state, and local taxes. All such taxes, and all use, sales, commercial, gross receipts, privilege, surcharges, or other similar taxes, license fees, miscellaneous fees, and surcharges, whether charged to or against RF VoIP, which will be payable by Customer. However, if Customer provides proof of its specific tax-exempt status, RF VoIP will not charge applicable taxes due to such exemption. Customer will supply RF VoIP a valid and properly executed tax exemption certificate(s). In such cases Customer remains responsible for, and agrees to pay, any and all remaining non-exempt charges; tax exemption status validation is solely the responsibility of Customer and RF VoIP will not be obligated to consider any retroactive tax exemption.
RF VoIP will commence billing for the Monthly Recurring Charges and usage of the Service on the Service Commencement Date. Payments are due on the invoice date and auto drafted from your Credit Card. If your Credit Card fails to allow the charge amount After (2) days of non-payment, all fees will accrue interest at a rate of one and one-half percent (1.5%) per month or any part thereof, or the highest rate allowed by applicable law, and customer will pay all collection costs incurred by RF VoIP (including, without limitation, reasonable attorney’s fees) and customer at RF VoIP sole decision may terminate or suspend all services. If RF VoIP terminates the Service, then all unbilled or uncollected fees will apply. RF VoIP retains the right to bill, including any amended or corrected billing, for the Service(s) for a period of up to twelve (12) months, commencing from the date the billed Service(s) were provided to Customer. RF VoIP will retain such billing rights for this twelve (12) month period notwithstanding any prior billing to Customer for the same period(s) and regardless of any otherwise conflicting billing conditions in these Terms and Conditions. Customer agrees that for the duration of this twelve (12) month period, RF VoIP will not be deemed to have waived any rights with regard to billing for the provided Service(s) that are subject to this period, nor will any legal or equitable doctrines apply, including estoppel or laches.
If Customer disputes any invoiced charges will submit written notification on or before the applicable due date by opening a support ticket, with “Notice of Billing Dispute” in the subject line of the ticket with respect to any disputed charges. Such ticket will include Customer’s complete contact information, the specific dollar amount in dispute, detailed supporting reasons for the dispute, and any supporting documentation, if available. The parties will work together in good faith to investigate any disputed charges and use commercially reasonable efforts to resolve any payment dispute within thirty (30) calendar days after receipt of such a “Notice of Billing Dispute” from Customer. Any dispute resolved in favor of Customer will be credited to Customer’s next invoice(s); any disputed amounts resolved in favor of RF VoIP will be due and payable by Customer immediately if not paid already. RF VoIP reserves the right to deny any and all matters described in any “Notice of Billing Dispute” (or delay RF VoIP’s determination of the validity of any matters described in any “Notice of Billing Dispute”) if Customer’s account is in arrears or otherwise not in good standing in accordance with RF VoIP’s customary practices and policies.
If Customer requests that Service be restored after a suspension or termination, RF VoIP has the sole and absolute discretion to restore such Service and may condition restoration upon satisfaction of such conditions as RF VoIP determines is necessary for its protection, including requiring Customer to execute a new agreement, pay all past due statements in full, pass RF VoIP’s credit approval, and/or make advance payments. New NRCs also may apply to restore Service.
18) Additional Non Recurring Charges.
In addition to any other quoted charges in Metered or Additional Charges Section please review the https://rfvoip.net/service-rates for any additional charges.
Customer will be solely responsible to provide any needed internal wiring or extensions (including but not limited to required conduit, facilities, power, etc.) for customer premise equipment, Phone Systems, and phones required to use the service.
EXCEPT AS PROVIDED IN SECTION 24, IN NO EVENT WILL RF VOIP OR CUSTOMER BE LIABLE FOR ANY INDIRECT, INCIDENTAL, PUNITIVE OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, LOST PROFITS) ARISING OUT OF OR IN RELATION TO THE SIP TRUNK, DEDICATED INTERNET ACCESS SERVICE, CUSTOMER PREMISE EQUIPMENT, AND/OR ANY PRODUCTS OR SERVICE PROVIDED BY THIRD PARTIES UNDER THESE TERMS AND CONDITIONS. RF VOIP’S MAXIMUM LIABILITY UNDER THESE TERMS AND CONDITIONS IS LIMITED TO SERVICE CREDITS NOT TO EXCEED THE FEES ACTUALLY PAID TO RF VOIP BY CUSTOMER FOR THE SERVICE PROVIDED.
Customer will indemnify and hold harmless RF VoIP, its directors, officers, employees, agents, and affiliates from and against any and all alleged or actual losses, costs, claims, liability of any kind, damages (including, without limitation, to any tangible property or bodily injury to or death of any person), or expense of whatever nature, (including reasonable attorneys’ fees) to or by any third party, relating to or arising from (a) the use of the Service provided to Customer, whether or not Customer has knowledge of or has authorized access for such use, (b) any damage to or destruction of customer premise equipment not caused by RF VoIP or its employees or agents, and (c) any Default by Customer. Customer has the sole and exclusive responsibility for the installation, configuration, security, and integrity of all Customer systems and/or customer premise equipment used in conjunction with or related to the Service. Customer will indemnify and hold harmless RF VoIP from and against any actual or alleged losses, costs, claims, liability of any kind, damages, or expenses or fees (including reasonable attorneys’ fees) on the part of or which may be incurred by Customer or a third-party relating to or arising from the use or operation of customer premise equipment. Customer’s indemnification in this subsection includes any alleged or actual losses or claims in connection with unauthorized access to or use of the Service by any third-party through customer premise equipment, regardless if such unauthorized access is unintentional, accidental, intentional or by fraud and regardless of whether Customer had knowledge of such unauthorized access. In all such cases of unauthorized access Customer agrees that it retain full and sole responsibility for any and all charges for the Service provided by RF VoIP. If RF VoIP grants Customer access, either by online access, by application programming interface (API), or access by any other means, to a service ordering/management system and other related electronic tools (collectively, the “Electronic Tools”), Customer agrees that it is fully and exclusively responsible for all information accuracy, charges, costs, transactions, and activities conducted through such Electronic Tools. Customer agrees that it is fully and exclusively responsible to safeguard, monitor, manage, and maintain access to the Electronic Tools, and to only allow authorized use of the Electronic Tools to persons that Customer designates. Customer therefore agrees that it will indemnify and hold harmless RF VoIP from and against any actual or alleged losses, costs, claims, liability of any kind, damages, or expenses or fees (including reasonable attorneys’ fees) on the part of or which may be incurred by Customer, or a third-party, relating to or arising from the use or operation of the Electronic Tools. Customer’s indemnification in this subsection includes any alleged or actual losses or claims in connection with unauthorized access to, use, transactions, or activity conducted through the Electronic Tools, regardless if such unauthorized access is unintentional, accidental, intentional, or by fraud, and regardless of whether Customer had knowledge of such unauthorized access. In all such cases of unauthorized access Customer agrees that it retains full and sole responsibility for any and all charges for the Service provided by RF VoIP.
22) No Warranties and Customer Assumption of Risk.
RF VOIP MAKES SERVICE COMMITMENTS UNDER THE APPLICABLE SERVICE LEVEL AGREEMENT (“SLA”); SAID SLA IS INCORPORATED HEREIN BY REFERENCE. HOWEVER, RF VOIP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, FOR THE RF VOIP SERVICE PROVIDED UNDER THESE TERMS AND CONDITIONS AND SPECIFICALLY DISCLAIMS ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. RF VOIP DOES NOT WARRANT THAT THE SERVICE WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT THE SERVICE WILL MEET CUSTOMER’S REQUIREMENTS OR THAT THE SERVICE WILL PREVENT UNAUTHORIZED ACCESS BY THIRD PARTIES. RF VOIP EXERCISES NO CONTROL OVER, AND HEREBY DISCLAIMS ANY RESPONSIBILITY FOR, THE ACCURACY AND QUALITY OF ANY INFORMATION TRANSMITTED WITH THE USE OF THE SERVICE. CUSTOMER HEREBY EXPRESSLY ASSUMES THE RISK OF ITS OR ITS EMPLOYEES, USERS, CUSTOMERS’, ETC., USE OF ANY INFORMATION TRANSMITTED VIA THE SERVICE. CUSTOMER WILL INDEMNIFY AND HOLD HARMLESS RF VOIP, ITS OFFICERS, EMPLOYEES, AGENTS AND AFFILIATES FROM AND AGAINST ANY AND ALL LOSSES, CLAIMS, EXPENSES, COSTS OR DAMAGES OF WHATEVER NATURE ARISING FROM OR RELATING TO THE USE OF ANY RF VOIP SIP SERVICE RESULTING FROM THE FAILURE OF CUSTOMER TO COMPLY WITH THIS SECTION.
a. Handwritten alterations or additions to these Terms and Conditions made by Customer will not be considered part of the Terms and Conditions. These Terms and Conditions may only be modified, or any rights under it waived, by a separate written document executed by both parties.
b. These Terms and Conditions will be governed by, construed under, and enforced in accordance with, the laws of the State of Wisconsin a without reference to its choice of law principles. For any action or suit to enforce any right or remedy of these Terms and Conditions, the parties consent to exclusive jurisdiction and venue in the courts for Winnebago County, Wisconsin and the prevailing party will be entitled to recover its costs, including reasonable attorney’s fees.
c. In the event of a conflict between these Terms and Conditions and any applicable tariff, the tariff will prevail.
d. Customer may not assign these Terms and Conditions without RF VoIP’s prior written consent. These Terms and Conditions will be binding on the parties hereto and their respective personal and legal representatives, successors, and permitted assigns. If any provision of these Terms and Conditions is held to be invalid or unenforceable, the validity and enforceability of the remaining provisions of the these Terms and Conditions will not be affected thereby.
e. Customer signing up for service certifies that (s)he is an officer or certified representative of Customer, and as such is authorized to enter into this binding Agreement. In the event any specified time frame or deadline denotes calendar days, it is agreed that when the last date of required action or response falls on a weekend or holiday, the action and/or deadline will automatically extend to the next business day. Agreement headings are provided for reference purposes only.
f. THESE TERMS AND CONDITIONS, TOGETHER WITH ANY ATTACHMENTS, INCLUDING ANY SCHEDULES, ADDENDUMS, PRICE LISTS, SERVICE LEVEL AGREEMENTS, AND ACCEPTABLE USE POLICIES, CONSTITUTE THE ENTIRE UNDERSTANDING BETWEEN THE CUSTOMER AND RF VOIP, WITH RESPECT TO THE SERVICE PROVIDED HEREIN. CUSTOMER ACKNOWLEDGES AND UNDERSTANDS THAT CUSTOMER IS NOT RELYING ON ANY AFFIRMATION OF FACT, PROMISE OR DESCRIPTION FROM ANY PERSON OR ENTITY, NOR ANY OTHER ORAL OR WRITTEN REPRESENTATION OTHER THAN WHAT IS CONTAINED IN THESE TERMS AND CONDITIONS AND ANY INCORPORATED DOCUMENTS.
All use of the Service must comply with RF VoIP’s Acceptable Use Policy (“AUP”) posted by RF VoIP from time to time. The AUP is incorporated herein by reference and subject to change. RF VoIP reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrong, including, without limitation, due to or arising as a result of any violation of the AUP.
The Service is based on RFC 3261 – “SIP-Session Initiation Protocol” and requires Customer to conform to this standard. If RF VoIP determines that Customer is in violation of RFC 3261 and this violation prevents RF VoIP from accurately rating or billing Customer’s calls, RF VoIP reserves the right to bill the customer based on their estimated usage and rates, based on RF VoIP’s discretion.
The parties do not intend by the execution, delivery, or performance of these Terms and Conditions to confer any benefit, direct or incidental, upon any person or entity not a party to these Terms and Conditions.
27) CNAM and Directory Listing.
The following applies to Directory Listing and related services only, if applicable: Customer may request Directory Listing and/or CNAM. Upon the submission of any request for Directory Listing, Customer approves the inclusion of any applicable information with any applicable Directory Listing. | 2019-04-20T14:44:14Z | https://rfvoip.com/terms-conditions/ |
To start off, this subject is completely new to traders developing EAs using the MetaQuotes Language 4/5 (MQL4/5). I could see it for myself when I tried to do a relevant search on the MetaQuotes website. There is nothing on this subject.
Every trader creates its own Expert Advisor which requires a serious approach to tackling all kinds of problems associated with programming and very complicated program logic. At the end of the day, the program is supposed to run ON ITS OWN like clockwork in any standard and force majeure situation.
But how can one embrace everything? This is extremely difficult which is why automatic control systems require proper programming of all control systems that can be best achieved using the only appropriate programming technology of Automata-Based Programming. In recent years, a great attention has been revolving around the development of programming technologies for embedded and real-time systems that set high requirements to the quality of software.
In 1991, the Russian author A.A. Shalyto (Lecturer, Professor, DSc in Engineering, Head of the "Programming Technologies" Department at SPbSU ITMO) developed a programming technology which he called "automata-based programming". I believe the readers may find it interesting to see how simple automata-based programming or SWITCH-technology can be. It allows to make the development of MTS using the MetaQuotes Language so convenient that it simply could not be better. And it blends great into the system of complex decision making.
A long cherished dream of all problem originators and software developers must be to have a planned solution to the problem (algorithm) and an implementation of that algorithm fully consistent with it. But it does not seem to be working out that way for originators and developers. Algorithms tend to leave out what is important to developers for implementation, while the program text per se bears little resemblance to the algorithm.
Thus, there are two algorithms - one is on paper (for recording and documenting design solutions) which usually represents a certain design outcome instead of methods employed in obtaining a given result, while the second algorithm is in the developer's mind (which is, however, also saved textually).
The final version of the program text is often followed by attempts to modify the documentation whereby many things are again not taken into account. In this case, the program logic may likely be different from the logic of the algorithm, thus demonstrating a lack of correspondence. I intentionally say 'likely' as nobody is ever going to check somebody's program text.
If the program is large, it is impossible to check whether it corresponds with the algorithm by the text alone. The accuracy of implementation can be checked using a procedure called 'testing'. It basically checks how the developer grasped the algorithm (laid out on paper), transformed it into another algorithm in his mind and output it as a program. Eventually, the developer is the only holder of valuable information on the logic and all that was coined before the implementation becomes absolutely irrelevant.
It is not even that the developer can fall ill (or... resign). The point is that the underlying program logic would be different with every developer, depending on their intelligence and knowledge of a programming language. In any case, the developer introduces and uses a lot of intermediate variables as he deems fit. And if the program is large and logically complex, a more qualified specialist will be required to find the glitches (and I do not mean OS glitches or incorrect use of language functions here but rather an improper implementation in terms of logic) and work it out through the program text itself.
The majority of developers are, to say the least, not keen on writing down algorithms before programming (or even sketching them on paper), which is likely due to the fact that they will still need to think up something of their own along the way. Indeed, why waste time on drawing some rectangles, diamonds and arrows when it is better to immediately proceed to programming and then lay out a somewhat similar or a very general algorithm in documentation.
Everybody has got used to it - developers do it because it is easier that way, while problem originators do not always have programming skills to the extent required and even in the case they do, they are simply unable to make a timely change to what developers will come up with. Convenient programming environments also contribute to the validity of the specified order of development. Advanced tools for debugging and monitoring values of variables give us hope for detection of any error in the logic.
As time is slipping away and the project deadline is approaching, the developer is sitting and sketching on a 'napkin' solutions to a given logical problem which, by the way, still need to be implemented, let alone errors overlooked during testing for testing follows pretty much the same (chaotic) scenario... This is the current situation. Is there a solution or can it at least be improved? It feels that something important is lost in the transition from an algorithm laid out in a standard way to the program code.
The author of "automata-based programming" proposed the following concept of the ideal logical part of a program. The entire logic of the program is based on the switch. Simply put, any control algorithm (automaton) can be implemented as shown below (do not think much about the meaning of the comments at this point, just take a look at the structure).
switch(int STATUS ) // Мulti-valued global state variable of the automaton.
// Execution of output functions in the state.
// logging transitions and actions if the condition is met.
Regardless of the development techniques, any program has states determined by all its data values at any specific time. There may be hundreds and even thousands of variables and several control flows in a large application program. A complete set of these variables describes the state of the application program at any specific time.
The program state can be treated in a simpler way as a collection of values of all control variables, the ones that take part in all transition conditions. A change in the value of one of control variables will then mean a change in the program state, and the number of program states will be determined by the maximum possible number of combinations of control variable values arising during the program operation. Suppose that only binary control variables (flags) are used in a program. The number of states of the program containing n binary control variables will in this case lie within the range from n to 2n.
It may be that the developer has provided for reactions to all combinations of control variable values (2n combinations in our case). However, it is more likely that some combinations of control variable values (up to 2n-n) turned out to be unspecified. Then if the unexpected combination of input actions arises, the program can transition into an unspecified state.
Such states are called "unvisualized". Complexity causes the difficulty of enumerating, much less understanding, all the possible states of the program leading to its unreliability... Complexity of the structure is the source of unvisualized states that constitute security trapdoors. The program behavior in an unspecified state may range from memory protection faults to extending program to new functions and creating side effects of various nature.
A lot of PC users and probably all software developers have many a time come across situations where a program in use or under development gets into an unspecified state.
To eliminate the very possibility of unspecified states in the program, all required states should be explicitly specified as early as at the design stage and only one multi-valued control variable should be used to differentiate between them. It is then necessary to identify all possible transitions between the states and develop a program so that it cannot 'go astray'.
Universal method for implementation of algorithms expressed in this notation.
A finite automaton based on the notion of "state" is proposed to be used as a mathematical model. Automata-based programming supports such software development stages as design, implementation, debugging and documentation.
Whereas the term 'event' is becoming more commonly used in programming in the recent years, the proposed approach is based on the notion of 'state'. After coupling it with the term 'input action' that can either be an input variable or an event, the term 'automaton without output' can be introduced. The latter is followed by the term 'output action' and the notion of (deterministic finite) automaton is further introduced. The area of programming based on this concept is therefore called automata-based programming and the respective development process is referred to as automata-based program design.
The specified approach is peculiar in that when it is applied, automata are represented by transition graphs. To differentiate between their nodes, the term 'state assignment' is introduced. When choosing a 'multi-valued state assignment', the states whose number coincides with the number of values the selected variable can take on, can be differentiated using only one variable. This fact allowed to introduce into programming the term 'program observability'.
Programming under the proposed approach is carried out through 'states' rather than 'variables' (flags) which helps to better understand and specify the problem and its components. Debugging in this case is done by logging in terms of automata.
Since the above approach proposes to move from the transition graph to the program code using a formal and isomorphic method, it appears to be more reasonable to do this applying switch structures when high-level programming languages are used. That is why it was decided to use the term 'SWITCH-technology' when referring to automata-based programming paradigm.
The application of automata-based approach was further extended to event-driven systems that are also called 'reactive'. Reactive systems interact with the environment using messages at the rate set by the environment (an EA can be included in the same class).
The development of event-driven systems using automata was made possible by employing the procedural approach, from where the name explicit state-based programming was derived. Output actions are in this method assigned to arcs, loops or nodes of transition graphs (mixed automata - Moore and Mealy automata - are used). This allows to get a compact representation of the sequence of actions being reactions to relevant input actions.
The proposed approach to programming the given class of systems features an increased centralization of logic due to it being eliminated from event handlers and generation of a system of interconnected automata called from the handlers. The interaction between automata in such a system can be achieved by nesting, calling and exchanging numbers of states.
The system of interconnected automata forms a system-independent program part while a system-dependent part is formed by input and output action functions, handlers, etc.
for logging in terms of automata (as specified above).
The latter allows to control the accuracy of automata system operation. Logging is performed automatically on the basis of the program developed and can be used for large-scale problems with complex program logic. Every log can in this case be considered as a relevant script.
Logs allow to monitor the program in operation and illustrate the fact that automata are not 'pictures' but real active entities. Automata-based approach is proposed to be used not only when creating a control system but also when modeling control objects.
The basic concept of automata-based programming is STATE. The main property of the system state at any specific time t0 is to 'separate' the future (t > t0) from the past (t < t0) in the sense that the current state contains all information on the system's past that is necessary in determining its reactions to any input action generated at any given time t0.
When using the term STATE the knowledge of historical data is not required. State can be regarded as a special characteristic which implicitly combines all input actions of the past affecting the reaction of the entity at the present moment. The reaction now only depends on the input action and the current state.
The notion of 'input action' is also one of the key notions in automata-based programming. An input action is most commonly a vector. Its components are divided into events and input variables, depending on the meaning and generation mechanism.
The combination of the finite set of states and finite set of input actions forms a (finite) automaton without output. Such automaton reacts to input actions by changing its current state in a certain way. The rules according to which the states can be changed are called the automaton transition function.
What is referred to as (finite) automaton in automata-based programming is basically the combination of 'automaton without output' and 'input action'. Such automaton reacts to the input action by not only changing its state but also by generating certain values at outputs. The rules of generating output actions are called the automaton output function.
When designing a system with complex behavior, it is necessary to take as a point of departure the existing control objects with a certain set of operations and a given set of events that may arise in the external (market) environment.
The initial data of the problem is not merely a verbal description of the target behavior of the system but also a (more or less) accurate specification of the set of events incoming to the system from the external environment and a great number of requests and commands of all control objects.
A set of control states is built.
Every request of control objects is assigned a corresponding input variable of the automaton, while every command is assigned a corresponding output variable. The automaton that is going to ensure a required system behavior is built based on control states, events, input and output variables.
The second feature follows from the first one. Any automaton contains a switch structure (in fact, it is virtually made of it) that comprises all logical operations. When an automaton is called, the control is transferred to one of the 'case' labels and following the relevant actions, the automaton (subprogram) operation is completed until the next start. These actions consist in checking transition conditions and should a certain condition be met, the relevant output functions are called and the automaton state is changed.
The main consequence of all stated above is that the implementation of an automaton is not only simple but most importantly that the program can do without many intermediate logical variables (flags) whose functionality in every automaton is provided by a multi-valued state variable.
The last statement is hard to believe as we got used to using a lot of global and local variables (flags) without thinking too much. How can we do without them?! These are very often flags signaling to the program that a condition is met. The flag is set (to TRUE) when the developer deems necessary but is then (usually only after the flag begins to give rise to wanted effects by being always TRUE) painfully sought to be reset to FALSE elsewhere in the program.
Sounds familiar, doesn't it? Now take a look at the example and see: no additional variables are used here; the change concerns only the value of the state number and only when a logical condition is met. Isn't it a worthy replacement for flags?!
Algorithm plays a major role in creating a logical part of a program. The key phrase to be remembered here is 'logical part'. State underlies everything in this case. Another word that should be added is 'waiting'. And, in my opinion, we get a quite adequate definition of 'waiting state'. When in the state, we wait for the appearance of input actions (attributes, values or events). Waiting can be either short or long. Or, in other words, there are states that can be unstable and stable.
The first property of the state is the fact that a limited set of input actions is waited for in the state. Any algorithm (and obviously any program) has input and output information. Output actions can be divided into two types: variables (e.g. object property operations) and functions (e.g. call of application start function, report function, etc.).
The second property of the state is provision of a set of accurate values of output variables. This reveals a very simple yet extremely important circumstance - all output variable values can be determined at any given time as the algorithm (program) is in a certain state at every point in time.
The number of states is limited, as is the number of output variable values. The function for logging transitions is smoothly integrated into the automaton function and the sequence of transitions between states, as well as the delivery of output actions can consequently always be determined.
The complete list of features is provided in section 2. Features of the Proposed Technology, and the complete list of advantages can be found in section 3. Advantages of the Proposed Technology. This article simply cannot cover the vast amount of information on the subject! After a thorough study of all the research literature written by Anatoly Shalyto, all theoretical questions should be directed toward him personally to shalyto@mail.ifmo.ru.
And being the user of his scientific ideas while having in mind our goals and problems, I will further below give three examples of my implementation of automata-based programming technology.
State is just a mode in which the system exists. For example, water exists in 3 states: solid, liquid or gas. It transitions from one state to another when influenced by one variable - the temperature (at constant pressure).
// logging transitions and actions when the condition is met.
This automaton has 32 = 9 transition conditions so nothing can be left out or overlooked. This style can also be very convenient when writing instructions and laws! No loopholes and bypassing of laws are allowed here - all combinations of variants of succession of events must be covered and all cases described.
If there are N states (except for 0 start) in the system, the total of transition conditions is N2.
Transition diagram: N = 3 states, the number of transitions and loops is N2 = 9 (equal to the number of arrows).
It shows that all the calculated values in the table rise exponentially, i.e. design is a complicated process that requires thoroughness when selecting the main systemic variables.
Even if there are only two parameters, it is very difficult to describe everything! However, in practice, it is all much easier! Depending on the logic and meaning, 50-95% transitions cannot exist physically and the number of states is also 60-95% less. This analysis of logic and meaning greatly decreases the difficulty of describing all transitions and states.
In more complicated cases, it is required to calculate the maximum number of states for all known input and output data in an EA. The solution to this problem can be found by applying combinatorics and combination, permutation, arrangement and enumerative combinatorics formulas.
Programming of relays, triggers, registers, counters, decoders, comparators and other non-linear digital and analog control system elements can be very convenient in an EA.
Y = Y(t) - signal at the output.
Y is the current input state of the automaton from 1 to 9. The value of Y is generated in the EA outside the given subprogram. MEGASTATUS is the past state of Y.
Let us review a Simple Audio Player.
The audio player control system is represented by an automaton. Buttons pressed are regarded as events having effect on the automaton. Transitions between tracks, playing, display control, etc. are output actions.
case 1: //--- "No Track"
In theory, this automaton could contain 36 transition variants, but only 15 are really existent and all the details can be found in the description provided by the author.
The book by А.А. Shalyto "Logic Control. Methods of Hardware and Software Implementation of Algorithms. SPb.: Nauka, 2000", available at the specified website in the "Books" section can be taken as a prototype". It embodies a proper presentation of information as it was published by the oldest and the most reputable publishing company in Russia.
Introduction should give grounds for the relevance of the subject chosen, briefly state the problem under consideration and specify the programming language and operating system used in the project.
A detailed verbal description of the problem at hand should be provided in the "Problem Description" section along with figures, diagrams and screenshots clarifying the problem described.
When using the object-oriented programming, the "Design" section should include a diagram of classes. The main classes should be carefully described. It is advisable that a "Block diagram of the class" is prepared for every one of them aiming at presenting its interface and methods used along with indication of automata-based methods.
Three documents should be provided for every automaton in the "Automata" section: a verbal description, automaton link diagram and transition graph.
A verbal description should be quite detailed, however given the fact that the behavior of a complex automaton is difficult to be described in a clear way, it usually represents a "declaration of intent".
variables for storing states of the automaton with the number N, denoted as YN.
If complex computational algorithms are used in nodes or transitions, the "Computational Algorithms" section explains the choice of algorithms and provides their description (including mathematical description). These algorithms are designated by variables x and z, depending on whether the calculations are made at the input or output.
Peculiarities of the program implementation should be set forth in the "Implementation" section. It should particularly present a template for a formal and isomorphic implementation of automata. Implementations of automata should also be provided here.
"Conclusion" covers benefits and downsides of the completed project. It can also offer ways of improving the project.
explore this new approach to programming.
implement this utterly new and extremely interesting approach to programming your ideas and trading strategies.
over time become the standard in programming and design for all traders and even MetaQuotes Language developers.
be the basis in complex decision making when designing an EA.
in the future develop into a new language - MetaQuotes Language 6 - supporting the automata-based programming approach and a new platform - MetaTrader 6.
If all trading developers follow this programming approach, the goal of creating a no-loss EA can be achieved. This first article is my attempt to show you a whole new outlet for creativity and research in the field of automata-based design and programming as an impulse to new inventions and discoveries.
The central issue in practical programming is the issue of understanding program codes. It is always beneficial to have source codes at hand but the problem is that this is often not sufficient. And additional documentation is usually needed in order to gain an understanding of a nontrivial program. This need grows exponentially as the amount of code increases.
Program code analysis aimed at restoring the original design decisions made by developers and understanding programs are two important branches of programming technology whose existence goes hand in hand with insufficiency of source codes for understanding programs.
Everyone who has ever been involved in a major software reconstruction project will always remember the feeling of helplessness and perplexity that comes when you first see a bunch of ill-documented (though not always badly written) source codes. The availability of source codes is not really of much help when there is no access to key developers. If the program is written in a relatively low-level language and is in addition ill-documented, all the main design decisions usually disperse in programming details and require reconstruction. In cases like that, the value of higher-level documentation, such as interface specification and architecture description, may outweigh the value of the source code itself.
The realization of the fact that source codes are inadequate for understanding programs gave rise to attempts to combine the code and a higher-level documentation.
If you miss the early stages of the project, the complexity and the amount of work will virtually 'lock away' the source codes from you, provided that there is no high-level documentation in place. Understanding the "prehistoric" code in the absence of the developers originally working on the project or adequate documentation allowing to sort out the relevant architectural decisions is probably one of the most difficult challenges programmers encounter».
So, while the absence of source codes can be bad, their availability can equally be poorly beneficial. What is still missing for a life "happy ever after"? The answer is simple - a detailed and accurate design documentation that includes program documentation as one of its components.
Bridges, roads and skyscrapers cannot normally be built without documentation at hand, which is not true about programs.
The situation that has come about in programming can be defined as follows: "If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization."
Why is it that a good deal of detailed and clear design documentation is issued for hardware and can be relatively easily understood and modified by an average specialist even years after it was issued, but such documentation is either nonexistent for software or it is written in a purely formal way and a highly skilled specialist is required to modify it (if the developer is missing)?
Apparently, this situation can be explained as follows. First, development and manufacture of hardware are two different processes carried out by different organizations. Therefore, if the quality of documentation is poor, the development engineer will spend the rest of his life working in the 'plant' which is obviously not what he would wish for. When it comes to software development, the situation changes as in this case both the software developer and manufacturer are usually one and the same company and therefore, regardless of the list of documents, their contents will, as a rule, be quite superficial.
Second, hardware is 'hard', while software is 'soft'. It makes it easier to modify programs but does not give grounds for not issuing design documentation altogether. It is known that most programmers are pathologically reluctant to read, and all the more so to write, documentation.
The experience suggests that virtually none of newly qualified programmers, even the smartest ones, can prepare design documentation. And despite the fact that many of them took and passed long and complex courses in mathematics, it has almost no effect on their logic and rigor of writing documentation. They might use different notations for one and the same thing throughout the entire documentation (regardless of its size), thus calling it e.g. the bulb, the light bulb, the lamp or Lamp, writing it with a small or capital letter whenever they like. Imagine what happens when they give their fancy full scope!
Apparently, it happens due to the fact that when programming the compiler flags inconsistencies while design documentation is written without any prompts whatsoever.
The issue of the quality of software documentation is becoming an issue of increasing social significance. Software development is progressively becoming similar to show business with its strong profit motive. Everything is done in a mad rush, without thinking of what will become of the product in the future. Like show business, programming measures everything in terms of "profit and loss", rather than "good and bad". In the majority of cases, a good technology is not the one that is actually good but the one that pays.
The unwillingness to write design documentation is probably also associated with the fact that the more restricted (undocumented) the project is, the more indispensable the author.
Such work behavior unfortunately spreads out to the development of software for highly critical systems. It is largely due to the fact that programs are in most cases written, and not designed. "When designing, any technique more complicated than CRC cards or use case diagrams is considered to be too complex and is therefore not used. A programmer can always refuse to apply any given technology by reporting to the boss that he may not be able to meet the deadline".
This leads to situations where even the "users do not consider errors in the software something out of the ordinary".
It is presently widely thought that design and proper documentation shall be in place when it comes to large buildings, and not software.
In conclusion, it should be noted that such situation did not use to exist in programming in the past - when early large-scale computers were in use, programs were either designed or developed very carefully as in case of an error, the next attempt would normally take place as early as in a day. Thus, technical progress has led us to a less careful programming.
Unfortunately, our problems and concerns cannot be traced on the website of the institute department where A.A. Shalyto works. They have their own problems and goals and are totally unfamiliar with, and unaware of, our concepts and definitions, hence no examples relevant to our subject.
and other interesting articles and projects: http://project.ifmo.ru/projects/, http://is.ifmo.ru/projects_en/ and http://is.ifmo.ru/articles_en/.
The number of possible different events of a Rubik's Cube is (8! × 38−1) × (12! × 212−1)/2 = 43 252 003 274 489 856 000. But this number does not take into account that central squares can have different orientations.
Thus, considering the orientations of center faces, the number of events becomes 2048 times as large, i.e. 88 580 102 706 155 225 088 000.
The Forex market and exchange do not have so many variants of succession of events but problems associated with them can easily be solved in 100-200 steps using this programming paradigm. It is true! The market and EAs are in constant competition. It is like playing chess where nobody knows the upcoming moves of the opponent (just like us). However there are impressive computer programs, such as Rybka (very powerful chess engine) designed based on alpha-beta pruning algorithms.
May these successes of others in other areas of programming give you energy and commitment to our work! Although, we certainly all know that we know nothing.
It is a very interesting approach to designing an EA. Reminded me of my university years and several courses on Mealy/Moore machines. I see how it can be used in expert advisors, but I doubt it will become "base standard for all traders."
Good article. I use state machines and this approach as a design pattern in some of my EAs since a long time ago, and probably many other systems developers and engineers.
I'm new to Metatrader and MQL5 but highly experienced in software development, C, C++, OOP and State Machines and Process Management as enivid and figurelli said, and in fact I'm applying these in my EAs as it is a very good way to manage trading rules.
I do not know if this will become a standard as so many times a great product fails, but I'm sure it could.
Это сообщение всем, кто сыграл определенную роль в эволюции этой статьи, особенно автора.
Я не могу полагаться на 100% на текст или лингвистику, чтобы я мог передать свой ответ и реакцию на статью, которая была опубликована здесь. У меня так много, что я хотел бы выразить. Если я начну пытаться объяснить мои чувства с помощью текста, тогда я буду ей на половину жизни и все равно не смогу точно передать свое сообщение. С учетом сказанного мой выбор заключается не в том, чтобы сильно полагаться на текст и слова. Моя отзывчивая энергия найдет свой путь ко всем тем, кто сыграл определенную роль в событиях, ведущих к моему открытию.
Богатство мудрости, ожидающее здесь, нашло меня, и я понял с удивительной ясностью. Это в надежных руках.
This is a message to all who have played a part in the evolution of this article, particularly the author.
I am not able to rely 100% on text or linguistics in order for me to convey my response and reaction to the article that has been published here. I have so much that i would like to express. If I begin to attempt to further explain my feelings through text, then i will be her for half a life time and still not be able to accurately convey my message. With that said my choice is not to rely heavily on text and words. My responsive energy will find its way to all of those that have played a part in events leading up to my discovery.
The wealth of wisdom waiting here has found me and I have understood with amazing clarity. It is in good hands.
In this article we are going to show how to explore the Standard Library of Trading Strategy Classes and how to add Custom Strategies and Filters/Signals using the Patterns-and-Models logic of the MQL5 Wizard. In the end you will be able easily add your own strategies using MetaTrader 5 standard indicators, and MQL5 Wizard will create a clean and powerful code and fully functional Expert Advisor.
Hello dear reader! In this article, I will try to explain and show you how you can easily and quickly get the hang of the principles of creating Expert Advisors, working with indicators, etc. It is beginner-oriented and will not feature any difficult or abstruse examples.
Throughout the entire duration of the Automated Trading Championship 2012, we will be providing live coverage of the events - hot reports and interviews every week. This report spotlights Achmad Hidayat (achidayat), the participant from Indonesia. On the first day of the Championship his Expert Advisor secured its position in the third ten, which is a good start. Achmad has sparked our interest with his active participation in the MQL5 Market. He has already published over 20 products thus far. | 2019-04-24T21:57:22Z | https://www.mql5.com/en/articles/446?utm_campaign=redirect&utm_source=autopilot |
The war on Yemen has recently been receiving a bit more coverage than in previous months.
The coverage is damning for Saudi Arabia and its allies, which is as it should be, but the war continues to go mostly unnoticed.
Yemen is being called the “forgotten war.” That is somewhat inaccurate, since that implies that there was a time when it used to be widely known and has only later been forgotten. It is the ignored war, the war about which Western publics know little and care less, the war that some Western governments enable with military support without ever telling their citizens why they are doing it. It is not surprising that the Saudis and their allies pretend that they aren’t killing hundreds of Yemeni civilians with their indiscriminate attacks, but what is more remarkable is that they rarely have to repeat those lies because there is so little scrutiny or criticism of their actions in Western capitals. Were it not for the important work of human rights organizations, aid workers, and journalists documenting the Saudi-led coalition’s crimes in Yemen, there would be almost no one calling the Saudis and their allies to account for what they have been and still are doing to Yemeni civilians.
The heart of the current chaos and misery is the larger reality that Saudi Arabia and Iran have both made Yemen a testing ground for their regional strategic rivalry, against a backdrop in which the United States, the major supplier of arms to the Saudis, is simultaneously attempting a significant thaw in relations with Iran. All the Gulf states except Oman have joined the Sunni military coalition in recent months, yet the US has largely turned a blind eye to the war crimes being committed. Its priority is to allay Sunni fears that the old alliances could be compromised after the nuclear deal was reached with Iran.
Yet America’s balancing act may fail. The security vacuum created in Yemen, and the radicalisation that the conflict has accentuated, have opened up more space for al-Qaida-affiliated groups. Recent US drone strikes underline that what is happening in Yemen is military escalation, not stabilisation. A negotiated settlement is long overdue, but it will only happen if strong international pressure, including from the US, is exerted on the Saudis. If even more instability is to be prevented on the Arabian peninsula, there must be a preparedness to name, shame and restrain those who are conducting atrocities against civilians in Yemen. Current western complacency and silence will only bring more chaos and strife.
Errant Civilian Airstrikes Turn Yemenis Against The U.S.
Half the people killed in Yemen's conflict have been civilians, Amnesty International reports.
The Obama administration's assistance in a Saudi-led military coalition is turning Yemeni people against the U.S. as more of the Saudi airstrikes aimed at the Houthis, Yemen's rebel militia group, fall errantly on civilians, The New York Times reported.
here are some sentiments in the region that the Obama administration is "selling this weaponry so that we can provide some jobs for your kids in the United States and provide some economy improvement," Jalal Fairooz, a former member of parliament in Bahrain, told Press TV.
Schell Fellow at the Nation Institute who reports from the Middle East and South Asia for a number of magazines and whose investigative work exposing war crimes in Afghanistan won him the George Polk Award and the Medill Medal for Courage in Journalism.
Of the many perils Yemen’s civilians have faced during the last six months of war, with starvation looming and their cities crumbling under heavy weapons, none have been as deadly as the coalition airstrikes. What began as a Saudi-led aerial campaign against the Houthis, the rebel militia movement that forced Yemen’s government from power, has become so broad and vicious that critics accuse the coalition of collectively punishing people living in areas under Houthi control.
Errant coalition strikes have ripped through markets, apartment buildings and refugee camps. Other bombs have fallen so far from any military target — like the one that destroyed Mr. Razoom’s factory — that human rights groups say such airstrikes amount to war crimes. More than a thousand civilians are believed to have died in the strikes, the toll rising steadily with little international notice or outrage.
In parts of northern Yemen, which is populated largely by Shiite Muslims, residents told reporters making a rare visit to the area that the bombing campaign by the Sunni coalition often feels like a sectarian purge. Airstrikes nearest the border with Saudi Arabia have been so intense that people have taken shelter in mountain caves or been forced farther south, often on foot, where they set up flimsy camps on the side of the road.
Neighborhoods in the northern city of Saada have been so heavily bombed that locals joke grimly that the coalition has run out of buildings to hit. The shrinking pool of targets has not stopped the planes that circle daily over Sana, the capital, from bombing the same security buildings over and over again, with a bewildering and terrible frequency.
The Saudi-led coalition has rarely if ever acknowledged killing civilians by mistake, even after the deadliest strikes, like the bombing of a residential compound for workers in Mokha in July that killed at least 63 people. Instead, the coalition blames the Houthis, accusing them of fighting from populated areas.
There is little mystery about the repeated attacks on the northern Saada Province, the birthplace of the Houthi movement. Months ago, the Saudi coalition declared that the entire province was a military zone, drawing an outcry from human rights groups that did little to deter the warplanes.
Here's part two of Gabriel Gatehouse's special reporting from Yemen. CONTAINS SOME DISTRESSING IMAGES.
Should there be an international investigation into possible war crimes in Yemen? James O'Brien asked Daniel Kawczynski, member of the UK's Foreign Affairs Select Committee.
Sturm auf die jemenitische Hauptstadt Sanaa: Die Militärkoalition aus mehreren Golfstaaten legt das Armenhaus der Arabischen Welt in Schutt und Asche. Die UN reagiert entsetzt.
Unsere Rache wird nicht lange auf sich warten lassen“, polterte Abu Dhabis Kronprinz Mohammed bin Zayed. „Wir werden so lange weiterbomben, bis der Jemen von diesem Abschaum gesäubert ist“. Mit Abschaum meint der Emir die schiitischen Huthis, die am vergangenen Freitag bei einem Angriff auf ein Armeelager der Golfstaaten 45 emiratische, zehn saudische und fünf bahrainische Soldaten töteten – der bisher schwerste Verlust der Golf-Alliierten.
Seit dem Massaker in den eigenen Reihen kochen die superreichen Kriegsherren von „Decisive Storm“, die zusammen der größte Waffeneinkäufer der Welt sind: Für die nächsten Wochen nun blasen sie zum Sturm auf die Hauptstadt Sanaa.
„Das Ausmaß des menschlichen Leidens ist unbeschreiblich“, erklärte der UN-Chef für humanitäre Hilfe, Stephen O’Brien. In Krankenhäusern lägen die Verletzten auf Bodenpappen, alle Blutkonserven seien aufgebraucht, selbst sterile Gummihandschuhe für Untersuchungen gebe es nicht mehr. Denn sämtliche Häfen des Jemen werden von Kriegsschiffen blockiert, der wichtigste in Hodeidah ist zerstört, ein Angriff, den O’Brien empört als „Verstoß gegen das internationale Menschenrecht“ verurteilte.
Kommentar: Wer sich auch nur etwas über den Jemen informiert hat, für den bringt der Artikel nichts Neues. Für den üblichen deutschen Zeitungsleser wahrscheinlich schon. Wachen Einzelne bei den „Mainstreammedien“ nach 5 ½ Monaten saudisch-amerikanischem Luftterror im Jemen endlich auf, nachdem sie vorher durch Verschweigen das In-Schutt-und Asche-Bomben eines Landes, dafür dass ein Präsident geschasst wurde, für einen ganz normalen Vorgang erklärt haben?
The roster of antiquities damaged in the war in Yemen runs long. Missiles fired from the coalition's planes have obliterated a museum (where the fruits of an American-Yemeni archaeological dig were stored), historic caked-mud high-rise dwellings, 12th century citadels and minarets and other places whose importance to humanity's heritage has been recognised by the UN. The Great Dam of Marib, a feat of engineering that was undertaken 2,800 years ago, has been struck four times, most recently on August 18th. Antiquities experts fear for the oldest surviving fragment of the Koran, in a six-month war which has killed over 4,000 and injured 20,000.
But apparently out of deference to their Saudi and Gulf friends, Western powers have yet to make much comment on the destruction in Yemen, whether humanitarian or cultural. They have expressed justified horror over cultural losses in Syria, such as Islamic State's demolition of the Bel temple in Palmyra. They willingly subscribe to the general principle of protecting religious and cultural objects from war.
Yet Western officialdom has been tongue-tied about Yemen; Britain's Foreign Office, for instance, did not respond when asked about the cultural damage there. In the ancient city of Sana'a, a UNESCO World Heritage site, there is a bitter feeling that the West is applying lenient standards to a coalition whose members are strategic allies and defence customers. Mohannad al-Sayani, director of Yemen's General Organisation of Antiquities and Museums, laments that his country is suffering cultural vandalism whose ideological purpose resembles the campaign against Syrian and Iraqi antiquities. In all cases, people are bent on wiping out what they consider to be "idolatry"—in other words, any object that in their view signals deviation from the strict path laid down by the Prophet Muhammad and his immediate successors. In addition to the strikes from the air, he says, ruthless local branches of Islamic State and al-Qaeda are making ground attacks on Yemen's cultural sites.
Die jemenitische Exilregierung zieht sich aus den für kommende Woche geplanten Friedensverhandlungen mit den Houthi-Rebellen zurück. Eigentlich wäre eine Waffenruhe im vom Bürgerkrieg gebeutelten Land vorgesehen gewesen.
Die für kommende Woche geplante neueste Runde der Friedensverhandlungen für denJemen steht wieder infrage: Er werde nicht an den Gesprächen unter UNO-Schirmherrschaft teilnehmen, solange die Houthi-Rebellen nicht einem Rückzug aus von ihnen eroberten Gebieten zustimmten, erklärte der nach Saudi-Arabien geflüchtete Präsident Abd Rabbo Mansour Hadi in der Nacht auf Sonntag. Als Grundlage verwies sein Büro auf eine UNO-Resolution, die die Rebellen zum Teilrückzug verpflichtet.
Hadi has refused to start political talks with the Houthis for months, repeatedly demanding the rebels' acceptance of the resolution's terms.
The April U.N. Security Council resolution slapped the Shiite group with sanctions -- a part of the measure that's been a key sticking point with Houthi leaders ever since.
But otherwise, according to senior Houthi-alled politicians and U.N. envoy Ismail Ould Cheikh Ahmed, Houthis have accepted a majority of the resolution.
The upcoming U.N.-sponsored talks will focus on making a strategy for implementing it, senior Houthi officials told CNN.
"Accepting the U.N. resolution is not the concern; the problem is the implementation. The Houthis have accepted to withdraw their forces and hand in the arms they seized, but want to ensure they take place in a manner that doesn't keep Yemen lawless," said Hasan Zaid, President of the Houthi-allied Haq party.
Man wolle erst dann mit den Aufständischen sprechen, wenn diese aus den wichtigsten Städten abzögen, meldet die amtliche Nachrichtenagentur Saba. Außerdem müsse die Regierung anerkannt werden. Unter Vermittlung der Vereinten Nationen sollten ursprünglich Verhandlungen der Konfliktparteien über eine Waffenruhe stattfinden.
Kommentar: Das war schon vorher klar. Man will den totalen Sieg und sonst nichts. Das Land kann dabei gerne draufgehen. Die westlichen Medien, die die Bombardierungen damit gerechtfertigt haben, dass damit die Huthis an den Verhandlungstisch gebombt werden sollten, müssen an partieller Amnäsie leiden. Die Seite, die niemals verhandeln will, ist eben die Exil“regierung“. Die Huthis haben immer wieder Verhandlungsbereitschaft betont. Ob ernst gemeint oder nicht, ist ja nie ausgetestet worden.
Die für kommende Woche geplante neueste Runde der Friedensverhandlungen für den Jemen steht wieder infrage: Er werde nicht an den Gesprächen unter UN-Schirmherrschaft teilnehmen, solange die Huthi-Rebellen nicht einem Rückzug aus von ihnen eroberten Gebieten zustimmten, erklärte der nach Saudi-Arabien geflüchtete Präsident Abd Rabbo Mansour Hadi in der Nacht auf Sonntag.
Als Grundlage verwies sein Büro auf eine UN-Resolution, die die Rebellen zum Teilrückzug verpflichtet. Eigentlich sollten bei den Verhandlungen zwischen Rebellenvertretern und Exilregierung in den kommenden Tagen im Oman eine Waffenruhe und ein Rahmen für einen friedlichen Übergang ausgehandelt werden. Am Freitag hatte Hadi eine Teilnahme noch zugesagt. Nach Angaben des UN-Sondergesandten Ismail Ould Cheikh Ahmed hatten auch die Huthi-Rebellen ihr Kommen angekündigt.
Kommentar: Deutlich erweist sich jetzt die von den USA im UN-Sicherheitsrat durchgedrückte UN-Resolution 2216 als absoluter Hemmschuh für jede Friedensverhandlungen. Diese Resolution in ihrer völligen Einseitigkeit richtet sich allein gegen die Huthis und toleriert die saudischen Luftangriffe. Ihre Erfüllung – was der Selbstaufgabe der Huthis entspräche – zur Vorbedingung für jede Verhandlungen zu machen, macht damit Verhandlungen unmöglich.
Yemen's exiled government backed out of UN-brokered peace talks as loyalist forces supported by a Saudi-led coalition launched a major offensive against Shiite Huthi rebels on Sunday.
A military official said the offensive aimed to push the Iran-backed insurgents out of the oil-rich Marib province east of Sanaa and eventually move on the capital, which the rebels seized a year ago.
President Abedrabbo Mansour Hadi's government, which has fled to Saudi Arabia, had said on Friday it would join UN-mediated talks this week in Oman.
But in a short statement overnight, Hadi's office said the government would not attend talks unless the rebels first accept a UN resolution demanding their withdrawal from territory they have captured.
The government decided "not to take part in any meeting until the militia recognises Resolution 2216 and agrees to implement it without conditions," the statement said.
Kommentar: der erste satz ist entlarvend: Offensive statt Gespräche.
Yemen's exiled government has confirmed it will attend UN-mediated peace talks next week aimed at reaching a ceasefire with the Houthi rebels who control large parts of the country.
In a statement on Thursday the internationally recognised government of President Abd-Rabbo Mansour Hadi said that a rebel pullback from areas seized since last year - as outlined by a UN resolution - remained a precondition to negotiations.
Die Konfliktparteien im jemenitischen Bürgerkrieg haben sich nach Angaben der Vereinten Nationen (UN) auf neue Friedensgespräche verständigt. Die Unterredungen sollten in der kommenden Woche in der Region beginnen, teilte der UN-Sondergesandte für den Jemen, Ismail Ould Cheikh Ahmed, am Donnerstag in New York mit. Eines der Hauptziele der Verhandlungen sei es, eine Waffenruhe zu erreichen. Ort und Zeitpunkt sollen demnach in den kommenden Tagen bekanntgegeben werden. Der UN-Sondergesandte rief die Teilnehmer auf, sich konstruktiv an den Gesprächen zu beteiligen.
he Saudi-led coalition which has invaded Yemen over the past two months is now poised to make a direct assault on the country’s capital city, Sanaa, according to press reports Sunday. An estimated 12,000 troops launched an offensive in Marib province, directly east of the capital.
There were accounts of troop reinforcements passing through the Wadia border crossing from Saudi Arabia into Yemen in preparation for the latest offensive.
Yemeni forces have taken control of a Saudi military base in the southwestern border province of Jizan as part of retaliatory offensives against Saudi Arabia’s ongoing invasion of their country.
Fighters from the Houthi Ansarullah movement, backed by allied army units, seized the Faridhah military base and destroyed three Saudi armored vehicles in their retaliatory attacks against Saudi positions in Jizan, local media reported on Monday.
According to reports, Yemeni troops also launched an attack against Saudi-led foreign forces in Yemen’s central province of Ma’rib, killing scores of them, including a Qatari and an Emirati officer. At least 21 armored vehicles were destroyed during the raid.
Forces loyal to fugitive former president Abd Rabbuh Mansur Hadi backed by Saudi-led airstrikes launched a ground operation against Ansarullah movement in Ma'rib on Sunday.
Also on Monday, Yemeni troopers carried out rocket attacks on several Saudi bases in Jizan, killing and injuring a number of Saudi soldiers.
Kommentar: iranische Quelle: “Yemeni forces”: Armeeeinheiten, die auf Seiten der Huthis kämpfen.
The UAE Armed Forces have launched a successful ground offensive on the Houthi rebel militias and made advance on the ground in Marib as part of the Saudi-led Arab coalition in Yemen. The General Command of the UAE Armed Forces announced that an Emirati servicemen was martyred during the operation. The General Command expressed its heartfelt sympathy and offered solace to the family of the martyr, praying to Almighty Allah to grant his soul rest in Paradise.
The Yemeni army has recruited 4,800 southern fighters following a presidential decision to integrate loyalist militiamen who helped push Iran-backed rebels out of second city Aden, a military official has said.
Kommentar: “Yemen army” hier jemenitische anti-Huthi-Kämpfer.
Forces loyal to Yemen's exiled president, backed by a Saudi-led coalition, launched a major ground offensive against Iran-backed rebels east of the capital Sanaa on Sunday, a military official said.
"This is the largest and fiercest offensive since operations began in Marib province," the official told AFP.
Fighters loyal to President Abed Rabbou Mansour Hadi have attacked the rebels in two areas - Jufeinah and Faw - that lie on the route leading to rebel-held Sanaa, he said.
Most of the oil-rich province of Marib is controlled by fighters and armed tribes allied with Hadi, but the Shiite Houthi rebels and renegade troops loyal to ousted president Ali Abdullah Saleh hold parts of the province.
More troops have poured in since the attack. Saudi Arabia dispatched more elite forces to join the 3,000-strong coalition force already on the ground, while Qatar, hitherto only participating in air operations, has sent 1,000 soldiers.
The coalition has since unleashed an unprecedented flurry of air strikes in both the northern governorate of Saada, the stronghold of the Houthi rebels, and the country’s capital, Sana’a. Residents say as many civilian as military targets are being hit, including houses, restaurants and main streets. “The coalition has gone wacko since the attack,” says Hassan Boucenine, who heads the Yemen office of Médicins sans Frontières, a charity.
At least 25 civilians were killed in rockets shelling in Yemen's Marib province late Friday as ground battles intensified between the Shiite Houthi group and pro-government troops, the media reported.
Medical sources told Xinhua news agency that 25 civilians were killed and more than 16 wounded in the shelling in the market in Marib city, the provincial capital.
Witnesses said Houthi fighters fired Katyusha rockets upon the arrival of Yemeni troops trained in Saudi Arabia on Friday to Marib city.
The troops, which returned to Yemen on Wednesday, came as part of military preparation led by the Saudi-led coalition to take Marib from the Houthis and to advance to the capital Sanaa to restore power of exiled President Abd-Rabbu Mansour Hadi.
Kommentar: “Yemen army”: Iranische Quelle, hier also die auf Seiten der Huthi kämpfenden Teile der jemenitischen Armee. Jede Seite beansprucht für ihre Kämpfer den Status „jementische Armee“, da er der dahinter stehenden Regierung die beanspruchte Legitimität verleiht.
Yemen's Shiite rebels intensified attacks against pro-government forces on Saturday in the southern city of Taiz, as they pushed to seize a strategic mountain and landmark positions in the city ahead of scheduled peace talks, security officials said.
At least 18 civilians were killed in Yemen's province of Marib where battles between the pro-government forces and the Houthi militants have lately escalated.
Local sources said on Friday 15 civilians including women were killed after Houthi militants fired rockets on the government compound, the central market and houses randomly and hysterically.
Tens if others were injured some seriously, the sources said.
And the Saba news agency reported that the 3 others were killed in an airstrike by the Saudi-led alliance.
At least 16 Yemeni civilians including ten people from a single family were killed in nationwide air strikes by a Saudi-led military coalition on Saturday, medics in three provinces said.
Gulf Arab countries have stepped up their air attacks targeting the Shi'ite Muslim Houthi movement allied to Iran after the group killed at least 60 Arab troops deployed to Yemen in a missile attack on their base last Friday.
The raids pummeled the Houthi-controled capital Sanaa and the southern city of Taiz, which is being fought over in heavy street battles between Houthi fighters and Gulf-backed Yemeni forces.
Two civilians were killed in the capital and ten people from one family died in Taiz. Eyewitnesses said the strikes appeared to target the houses of political leaders allied to the Houthis.
Four more people were killed near Yemen's border with Saudi Arabia in the far northern province of Saada.
At least 13 Yemeni people have been killed and scores of others wounded in Saudi Arabia’s latest airstrikes as Riyadh's unabated aggression against the war-torn country continues.
The Yemeni al-Masirah news channel reported on Friday that at least 10 people were killed and many others sustained injuries when Saudi warplanes targeted a village in Yemen’s southwestern province of Ta’izz. The Saudi army also killed three civilians in the central province of Ma’rib and also pounded the Baqim district in the northwestern province of Sa’ada with rockets and shells.
Late on Thursday, Saudi fighter jets dropped bombs on military positions and civilian neighborhoods in and around the Yemeni capital Sana’a.
Reports said that in one of the airstrikes on the capital, the Saudi fighters targeted the Yemeni military camp of al-Hafa. The force of the explosion caused by the airstrike discharged rockets and other weapons from the military camp toward a nearby neighborhood.
The bodies of six Indian nationals reported missing after their boats were hit by airstrikes off Yemen on Tuesday have been found, Indian officials say.
The two boats had been carrying 21 Indian crew members when they were hit - 14 were rescued, and one remains missing.
The funerals will be held on Friday in the city of Hodeida, Yemen's second biggest port after Aden and a key source of supplies for the country's capital, Sanaa.
The Indian foreign ministry did not say who it thought had carried out the airstrikes.
However, Yemeni coast guard officials said a Saudi-led coalition attacked more than five boats off the Yemeni coast on Tuesday.
Kommentar: Das Herumeiern um die Frage, wer die Luftschläge zu verantworten hat, ist jämmerlich. Die Huthis und ihre Verbündeten haben keine Luftwaffe.
Gulf-trained unit of Yemeni forces loyal to exiled President Abd-Rabbu Mansour Hadi has joined the battle in the central energy-producing Marib province for the first time, a senior provincial official said on Friday.
The official, who declined to be identified, said the unit had joined the front line in the al-Jafeena area of Marib.
Bei einem Luftangriff ist in der jemenitischen Hauptstadt Sanaa das Gebäude des Staatsfernsehens komplett zerstört worden. Wie Augenzeugen berichteten, wurde das Studio von Saba TV am frühen Freitagmorgen von einem Kampfjet der arabischen Militärallianz bombardiert. Auch das Studio eines weiteren Fernsehsenders sei getroffen und beschädigt worden.
Nach neuen Luftangriffen der arabischen Militärkoalition hat es schwere Explosionen in der von schiitischen Aufständischen kontrollierten jemenitischen Hauptstadt Sanaa gegeben. Dabei wurden offenbar Raketen und andere Waffen aus einem Lager der Rebellen in die Luft geschleudert.
Die arabische Militärallianz hat für den Kampf gegen die schiitische Huthi-Miliz im Jemen weitere Einheiten mobilisiert. Mindestens 40 Armeefahrzeuge überquerten am Freitag die Grenze zwischen Saudi-Arabien und dem Jemen.
Mit der Verstärkung der Truppen solle die Rückeroberung der Hauptstadt Sanna vorbereitet werden, erklärte ein jemenitischer Militärvertreter.
Kampfflugzeuge der arabischen Koalition bombardierten unterdessen ein Militärfahrzeug der Rebellen in der östlichen Provinz Marib. Sieben Kämpfer seien bei dem Angriff am Freitag getötet worden, verlautete aus Armeekreisen. Auch in der benachbarten Schabwa-Provinz wurden Stellungen der Huthis aus der Luft attackiert.
On the Yemeni Saudi border: The Saudi-led coalition battling Iran-backed insurgents sent more military vehicles and troops across the border into Yemen on Friday in preparation for an offensive to retake the capital, military officials said.
The arrival of reinforcements came as coalition warplanes killed seven rebels in an air raid on Friday in eastern Yemen, where Apache helicopters have also joined the fight against the Al Houthi militia.
The strike targeted a military vehicle used by the militia in the eastern province of Marib, while other air raids struck rebel positions in neighbouring Shabwa province, military sources said. At least 40 coalition military vehicles crossed over into oil-rich Marib.
The vehicles were carrying Yemeni troops trained in Saudi Arabia as well as coalition troops whose nationality military officials in the area declined to specify.
It came hours after UN special envoy for Yemen, Esmail Ould Shaikh Ahmad, said that the exiled government and Al Houthi militia had agreed to take part in peace talks that “will convene in the region next week”.
Kommentar: Quelle vom Golf, daher Propagandasprech von “Sanaa befreien”. Die UN-Gespräche sind seitens der Hadi-„Regierung“ abgesagt, man will militärische Konfrontation.
Rebellenangriff auf Markt im Jemen: Mindestens 20 ToteDutzende Menschen wurden durch Raketenbeschuss verletzt.
Bei einem Rebellenangriff auf einen belebten Markt sind im Jemen nach Angaben von Ärzten mindestens 20 Menschen getötet worden. Dutzende weitere Menschen wurden demnach verletzt, als Rebellen am Freitag den Markt in der östlichen Stadt Marib mit Raketen beschossen.
Wenige Stunden zuvor waren bei Angriffen der von Saudi-Arabien geführten Militärallianz in der Region um Marib sieben Rebellen getötet worden.
Yemen’s Houthi rebels fired Katyusha rockets at a busy market in the eastern city of Marib on Friday, killing at least 20 people.
“Twenty civilians were killed and dozens were wounded,” a medical official said. Witnesses said the provincial capital’s market was the target.
The Saudi military has been talking up an escalation of the war against Yemen all week, announcing thousands of additional foreign troops to enter the country, but today seemed once again to be focused on their ongoing campaign of airstrikes against the capital city of Sanaa.
Elsewhere, one of the major private hospitals in Sanaa was battered by constant explosions, and a number of the patients fled the building, fearing it was going to collapse from the strikes pounding the area, which was near military sites.
Kommentar: Gatehouse macht guten Journalismus. Das Defizit der westlichen Mainstreammedien wird daran deutlich, dass kaum berichtet wurde. Der Angriff auf die Flaschenfabrik, der hier geschildert wird, liegt schon länger zurück.
With charter renewal looming, the BBC is under increasing scrutiny from the government to justify its licence fee. So it’s fair to say Thursday night’sNewsnight Yemen special did little to endear the corporation to some members of the Tory camp.
The programme — led by the BBC’s Gabriel Gatehouse — looked into Yemen’s ‘forgotten war’; highlighting the Saudi-led coalition’s bombing campaign over Yemen to drive Houthi rebels from the city. It reported how the airstrikes — which have hit some civilian targets — are supported by Britain as the country sells arms to Saudi Arabia.
Now Kawczynski is scheduled to appear on tonight’s episode to make his case.
Update: Kawczynski’s appearance on the show did not go smoothly. The Tory MP had a strongly worded debate with James O’Brien, who aggressively grilled him on the country’s links to Saudi Arabia. Kawczynski remains adamant that the BBC are ‘trying to falsify the situation’ on the ground ‘through their biased coverage’.
He says ‘it’s time that people stood up to the appalling bias of the BBC’, before commenting that ‘the BBC is omnipotent and such an important organisation and never makes any mistakes’. Mr S senses a degree of sarcasm in his latter comment.
Britain is one of the leading arms suppliers to Saudi Arabia. It has granted the Gulf Kingdom 37 export licenses for military goods since Yemen’s war began.
“The UK Government is quietly fuelling the Yemen conflict and exacerbating one of the world’s worst humanitarian crises potentially in breach of both domestic and international laws on the sales of arms," Oxfam said in a statement on Friday.
“There is a paradox at the heart of the government’s approach to Yemen,” said Oxfam’s Chief Executive Mark Goldring on Friday. “On the one hand the Department for International Development is funding efforts to help civilians caught up in the conflict, while on the other the Government is fuelling the conflict that is causing unbearable human suffering."
In April, the British government allocated £4 million to help meet emergency needs as Yemen teetered on the edge of humanitarian disaster. Aid agencies say 1.8 million children across the country are at risk of malnutrition and that 84 per cent of the population are in immediate need of humanitarian assistance.
On the directives of His Highness President Sheikh Khalifa bin Zayed Al Nahyan, and Vice President and Prime Minister and Ruler of Dubai, His Highness Sheikh Mohammed bin Rashid Al Maktoum, and instructions of His Highness Sheikh Mohamed bin Zayed Al Nahyan, Crown Prince of Abu Dhabi and Deputy Supreme Commander of the UAE Armed Forces, and follow-up of H.H. Sheikh Hamdan bin Zayed Al Nahyan, Ruler’s Representative in the Western Region, and Chairman of the Emirates Red Crescent (ERC), the ERC has launched a major humanitarian campaign to help about 10 million people affected by the unfolding crisis in Yemen. Themed “Yemen: We care”, the one-month long campaign aims to mobilise support for the ERC programmes and projects with the aim of easing the suffering of those caught up in Yemen’s conflict.
“This donation falls within our strong belief of supporting people in need wherever they are and regardless of their nationalities or background,” Sajwani said. He added that the Yemen: We Care campaign represents a noble cause as do all the campaigns led by the leadership in the UAE, aimed at helping millions of Yemenis. “We hope that our humble contribution will help ease their suffering in the current conflict,” he said.
For the last 45 years, the Gulf Cooperation Council (GCC) has tried to mitigate its Yemen problem through short-term tactics, rather than construct and give resources to a strategy for solving it. That policy has failed repeatedly. A bold and lasting transformation is needed, not the same ineffectual meddling.
Traditionally, the attitude of most GCC members toward Yemen has been fond but standoffish. The Gulf states have been fairly generous in funding projects and providing aid, but held populous Yemen at arms’ length, for reasons both demographic and ideological, the latter being fear of Marxism and republicanism.
Saudi Arabia has always regarded Yemen as a direct threat. King ‘Abd al-‘Aziz is reputed to havewarned his sons that “the good or evil for us will come from Yemen,” and so to keep it weak and divided. It is unclear exactly what the Saudi royal was wary of: Yemeni intentions of taking over the entirety of Saudi Arabia; efforts by Yemen’s Hamid al-Din dynasty to defeat their Al Saud rivals; or merely attempts by Yemen to recover the three provinces of ‘Asir, Jizan and Najran that ‘Abd al-‘Aziz had captured from Imam Yahya in 1934. But the king’s advice was taken to heart, and has been implemented ever since. “The Saudis want a moderate government in Sanaa—on a short leash,” Michael Van Dusen, a long-time senior staffer for the House Foreign Affairs Committee, wrote in 1982, referring to hundreds of millions of dollars in annual disbursements to both the Yemeni government and Yemeni tribal leaders.
In addition, and as it has done in many Muslim countries, Saudi Arabia subsidized the export of puritanical Wahhabism into a nation that traditionally was Shafi‘i Sunni in the south, and Zaydi and Isma‘ili in the north. This state-sponsored evangelism was perceived as a threatening political encroachment on Zaydi space. It also grated on many Yemenis’ national sensibilities, something the Wahhabis should have known.
The 2011 uprising in Yemen brought millions of people into the streets, protesting against precisely the elite corruption and autocracy that Saudi Arabia (with Western backing) had worked to entrench. Saudi policy toward Yemen since the popular revolt is almost certainly an attempt to maintain the status quo ante. Indeed, the GCC initiative that claimed to break the political impasse has been seen as an effort to achieve an apparent transition of power while ensuring, sub rosa, that the same coterie of Saudi clients remain in place. Certainly, the Saudi-led Operation Decisive Storm is an attempt to reinstate ‘Abd Rabbu Mansour Hadi to the presidency. Yet Hadi was President ‘Ali ‘Abdallah Salih’s long-term vice president, his clique shows traits similar to the deposed Salih’s, and a terrorist-traced salafi, ‘Abd al-Wahhab al-Humayqani, has reportedly been appointed as Hadi’s “adviser.” Many Yemenis will see Humayqani as a Saudi-placed eminence grise.
The GCC fears that the Zaydi Houthis are a fifth column for Iran, and claims they receive a copious Iranian weapons supply. In fact, the Fiver Shi‘a—with their founding doctrine of resistance to an unjust ruler—are an ideological threat to the Islamic Republic’s theory ofvelayat-e faqih (rule of the jurisprudent), and were mostly armed by Salih. The Gulf states could regard the Zaydis as a cherished Arab ally against the Iranians, whose Safavid antecedents destroyed the first Zaydi state. Instead, GCC policy is driving Zaydis into Iranian arms.
Kommentar: Sehr interessante Analyse, die die gegenwärtige Entwicklung aus der regionalen Geschichte erklärt.
We have been informed by our Hodeidah Office based on the information received from Advisor of Chairman of the port authority that they have reopened the Mokha port on 11/09/2015 and the port is operational and safe.
Please be informed that the Hodeidah port has been reopened & started the work for receiving the ships from 27/08/2015 at 11:30 am & all operations are working normaly & they has been received & berthed first ship MV. ORYX at berth no.4 & started discharging at 12:30 pm for the cargo Steel & Flour.
Please be informed that any vessel calling Yemeni ports require to get entry permission from Ministry of Transport, the ships agent or receivers needs to obtain this prior to the vessels arrival to Bab Al-MandabAny vessel coming to the Yemeni ports should be calling to the naval forces of the Saudi Arabian coalition by VHF on channel 16 for the arrival registration before 3 miles of arrival to the Bab Al Mandab to get approval to enter to the Yemeni territorial waters and thereafter they will advise the ship's master about the anchor position until getting the final approval to enter after inspection.
Kommentar: Die Blockade mit der Durchsuchung aller Schiffe hat die Versorgung einbrechen lassen (siehe weiter unten). Das genannte „Transportministerium“ ist natürlich Teil der die Hadi-"Regierung" im saudischen Exil.
The men have been stuck for over 15 days now at Khokha port in Yemen where they had gone to deliver cargo. This comes days after six Indians, most of them from Gujarat, were killed following air strikes in the Arab country.
India said Sunday that it is taking steps to ensure safe evacuation of its nationals from Yemen after a sailors’ group claimed that 70 seamen from Gujarat are stranded in the war-torn country. Officials spokesperson of the Ministry of External Affairs’ Vikas Swarup said on Sunday, “Our mission in Yemen (camp office in Djibouti) is aware of the situation and taking steps to ensure safe evacuation of Indians.” Nearly 70 seamen from the coastal village of Mandavi in Kutch and from Jodiya and Salaya villages of Jamnagar have been stuck for over 15 days at Khokha port in Yemen where they had gone to deliver cargo in five boats, a sailors’ group in Gujarat said, appealing to the government to rescue them.
Kommentar: Diese Geschichte zeigt, was es mit der saudischen Seeblockade des Jemen auf sich hat.
"About 70 Gujarati sailors along with five vessels are stranded in Yemen for around 15 days and they now need the government's help for their rescue," Vahanvatta Association of Kutch and Mandavi president Haji Juneja told PTI.
"The sailors are in a pitiable condition as some forces have been bombarding them. They escaped death last night when some force, either of the insurgents or the Saudi coalition, began an attack with rocket launchers," he said, adding that the sailors had gone to Yemen on a voyage to deliver cargo.
Meanwhile, one of the stranded sailors, identified as Sikandar from Mandavi village, sent an audio message last night in which he said that they last night came under a bomb attack.
"I am an Indian. My name is Sikandar. We are at Khokha port. They have lobbed three rockets and we somehow managed to save ourselves. We are running here and there to save ourselves," Sikandar says in the message.
"We are 70 Indians stranded here along with five ships. They have been bombarding us with warplanes. Please help us. We are Indians. We are in great difficulty. They will kill us. Please save us," he said.
Around 70 crew members, who had to abandon ship in search of safety, are now stranded near the Khokha Port. Prasanna D Zore/Rediff.com spoke to Indian crew members who say they are safe for now but will die of hunger if not rescued by the Indian government.
Wali Mohd, one of the Indian crew member from Kutch Mandvi told Rediff.com that as many as 70 crew in five ships are stranded near Khokha Port in Yemen.
Wali said that all were safe but on Saturday night had to evacuate their ship and seek shelter in a small village about six kilometres away from the port, after heavy shelling began where their ship was anchored.
"It is a small village and people here are helping us with water, food and shelter," Wali Mohd said. He feared that given the intensity of the shelling they may not be able to remain safe for longer.
Wali Mohd was reduced to tears as he spoke with this correspondent over the phone. He was unable to give the name of the village but said that it was just five to six kilometres away from Khokha Port.
He said that they were forced to evacuate their small mechanised boat after heavy shelling on Saturday and the group abandoned the ship in search of safety. Most of these 70 were now scattered, he said. "We ran wherever our instincts took us," Wali Mohd said.
Als Land mit wenig bebaubaren Flächen musste der Jemen schon lange rund 90% seiner Lebensmittel aus dem Ausland importieren. Traditionell wurde das per Schiff betrieben, aber mit einer Seeblockade der gesamten jemenitischen Küste durch die Saudis die letzten Monate hindurch ist es nicht einfach, diese Schiffe in einen Hafen zu bekommen.
Viele Reedereien haben sich zurückgezogen, nachdem der Versuch, in den Jemen zu liefern, mit endlosen Verzögerungen durch die Marinekräfte vor der Küste verbunden ist. Diejenigen, die weiterhin versuchen, Lebensmittel zu liefern, warnen vor der steigenden Gefahr einer Hungersnot besonders im Norden, wo die Blockade so gut wie alle Lieferungen verhindert.
23 Schiffe liegen allein vor der Küste von Hodeida, ohne Hinweis, wann, ja ob sie überhaupt die Genehmigung zum Anlegen bekommen werden. Sogar im Fall, dass sie grünes Licht bekommen, ist es schwierig, die Lieferung abzuwickeln, da die Kriegsflugzeuge der Saudis einen großen Teil des Hafens mit Luftangriffen zerstört haben, darunter auch die Ladekräne, mit denen die Schiffe entladen werden.
Die Marine der Vereinigten Staaten von Amerika gab eine Warnung heraus, dass rund 14 Millionen Jemeniten aufgrund der Blockade ohne Grundnahrungsmittel dastehen könnten, und dass die Blockiererländer keine klare Erklärung für ihre Verzögerung liefern, obwohl die meisten Schiffe aus Europa und aus den Vereinigten Staaten von Amerika kommen.
Bemerkenswert ist, dass die Marine der Vereinigten Staaten von Amerika, die zeitweise selbst bei der Blockade mitgemacht hat, nominell um den Schmuggel „iranischer Waffen“ in den Jemen zu verhindern, jetzt an der Blockade herumnörgelt. Die Vereinigten Staaten von Amerika nehmen weiterhin an dem Krieg teil, aber genau zum jetzigen Zeitpunkt nicht direkt an der Blockade.
Kommentar: Nach neueren Meldungen wurden 7 Inder getötet, 13 überlebten.
A nation with little arable land, Yemen has long had to import some 90% of its food from abroad. This has traditionally meant ships, but with a Saudi-led naval blockade of the entire Yemeni coast for the past several months, it’s not easy to get those ships into port.
Many shipping companies have pulled out, since trying to deliver to Yemen means endless delays from the naval forces off the coast. Those who continue to try to deliver food warn of a growing risk of famine, particularly in the north, where the blockade is preventing virtually all shipments.
23 ships are parked off the cost of Hodeida alone, with no indication when or even if they’ll be allowed to dock. Even when they’re given the go-ahead, it’s difficult to make their deliveries since Saudi warplanes destroyed much of the port’s infrastructure in airstrikes, including the cranes that would usually lift huge cargoes of grain off the ships.
The US Navy issued a report warning that some 14 million Yemenis could be left without basic foods because of the blockade, adding that the blockade countries aren’t offer clear explanation of the holdup, even though most of the ships are from Europe and the US.
It is noteworthy that while the US Navy is grousing about the blockade they have actually taken part in it at times, nominally to prevent “Iranian weapons” from being smuggled to Yemen. The US remains involved in the war, but not directly in the blockade right now. | 2019-04-18T11:17:12Z | https://www.freitag.de/autoren/dklose/krieg-im-jemen-neue-artikel-zum-nachlesen-18 |
Decluttering is a growing trend, but are Canadians truly committing to a minimalist lifestyle or is decluttering just an excuse to clear up space for more stuff?
There are real benefits to a clutter-free home. Not only does your home look better when it’s neatly-organized, but a clutter-free home also promotes focus and self-efficacy while reducing stress and anxiety. However, when you throw your purged items in the trash or declutter only to go out and buy more stuff, you contribute to a growing environmental problem.
When you throw unwanted stuff away, it doesn’t really go “away.” Every year Canadians produce 720 kilos of waste per person. That’s twice as much waste per capita as Japan and seven percent higher than the United States’ per capita waste output, Canadian Geographic reports. While some waste gets recycled, most of it ends up in the landfill — and even when you think you’re recycling, your waste may still end up in a landfill, either domestically or abroad.
There’s a better way to achieve an orderly home without increasing the burden on the environment. These tips will help you declutter your home in a more eco-friendly fashion.
1. Sell or donate before you trash.
Selling unwanted items or donating them takes more effort than tossing them out, but it keeps things out of the landfill longer and allows shoppers to purchase used items rather than new ones that take resources to create. Reuse is especially important for large items like appliances and furniture, as well as electronics. These items quickly fill landfills and contain toxic materials that pollute the environment. If you prefer to earn some money from your old stuff, sell online. You’ll net more and spend less time than holding a yard sale. Click here to learn more about the second hand economy.
Even items that seem worthless could have a second life. Old linens that aren’t good for home use can be used in animal shelters, broken lawn equipment can be repaired by someone handy, and partially-used products can go to a family that struggles to afford new. Even if you’re not sure someone would want your old stuff, give it a try! You’ll be surprised at how creative people can be.
2. Shop secondhand before buying new.
Don’t just add to the second hand economy, shop from it too. Buying used items saves money and the planet, and oftentimes older items are built to a higher-quality than new consumer goods.
Paper is a major source of clutter in homes. From junk mail to filing cabinets, paper takes up a lot of space. And while paper is one of the more easily recycled materials, it’s still best to reduce usage wherever possible. Once you’ve digitized all your important documents, enroll in e-delivery with the companies you do business with and follow Canada Post’s instructions to stop unwanted mail.
4. Choose nontoxic and plastic-free household products.
Shoppers love conventional household cleaners for their potency, but that strength comes from toxic chemicals that pollute the environment when they’re sprayed in the air or washed down a drain. They’re also bad for human health. The Environmental Working Group lists cleaning products that are safer for the environment and for you. Unfortunately, many of these products generally still come in disposable plastic packaging. The better option is to make or purchase package-free household products and use refillable containers to reduce plastic waste.
5. Skip the plastic garbage bags.
When you do need to toss things out, skip the plastic garbage bag. Spending money on single-use plastics with the sole purpose of throwing them away contributes to the global plastic problem. Instead, put waste in the garbage bin without a bag and wash the bin regularly to keep it clean. If you’re composting and recycling as much as you can, your trash should be quite dry and clean. If you prefer a bag or your waste management company requires it, reuse bags from other household purchases instead of buying new plastic.
Consumers are becoming more conscious about their daily household waste through recycling and composting. However, without a change in buying habits, our waste problem will only continue to grow. The next time you’re planning to declutter, turn to the second hand economy instead of the trash bin and think about how you can adopt more eco-friendly habits for the future.
Alice began her career in the home organization industry as a professional house cleaner, which involved lots of decluttering. Over the years, she has helped her clients get rid of everything from old mattresses to outdated electronics to entire closets worth of clothes in aneco-friendly way.
Members' Corner is a monthly blog series where SPEC members share their favourite sustainability-related resources.
There is a lot of mis- and incorrect information on bioplastics and plastics in general, and this webcast helps clarify the issue. In this talk Dr. Love-Ese Chile explores the major types of sustainable plastics available and highlights what we can do as consumers and tax-payers to help create a circular economy for these new materials. You should watch this webcast if you are interested in learning about sustainable plastics and circular economies from a PhD in bio-plastics. I also know her personally and she is dedicated to this problem.
Hosted by Mary Robinson (former president of Ireland) and Maeve Higgins (Irish comedian), the Mothers of Invention podcast celebrates women who do remarkable things in pursuit of climate justice. Each episode explores a diverse array of women from around the world who are at the forefront of the fight against climate change and injustice - there is a seriously impressive range of guests, from local politicians to presidents and cabinet ministers, local activists to global campaigners, entrepreneurs to world-renowned scientists. Climate change is a huge, complex issue which can be overwhelming, but the Mothers of Invention podcast strikes a good balance between education and entertainment to raise awareness about climate justice. This show is engaging, funny, educational, and the many stories of the "mothers" are truly inspiring.
Food Tank is a global organization that is working to advance food systems. Their website is a great resource for info on sustainable agriculture and how it relates to other issues such as climate change and poverty. They also release top 10 lists of food-related books.
Proportional Representation or First Past the Post?
We’re told that sharing our intentions with friends may influence their decision about whether to vote and how to vote in the referendum on Proportional Representation. With that in mind, and knowing that good hearted people can disagree, I’d like to ask you to vote for Proportional Representation.
The easy question is Question #1 – choosing between Proportional Representation (PR) or First Past the Post (FPTP.) PR distributes seats in the legislature according to the proportion of the popular vote and FPTP is the familiar “winner takes all” system of voting. My friend Bob Bossin says the choice is proportional representation or disproportional Representation. That sums up my perspective as well.
Question #2 is the harder question that asks you to rank the three options for how to implement PR. It’s important to understand that you can skip the second question. Some people are not participating because they find the options hard to differentiate and make a choice. Don’t skip the opportunity to vote for Proportional Representation.
Perhaps there is no single good answer to the question of which option is best. The easy answer is, “they’re all ice cream, just different flavours,” meaning they’re all 'better' (more fair) than FPTP and they all have the same basic intention and some similarities. But there are differences, and, because they’re unfamiliar, they're not that easy to explain.
We need a system that allows voters to bring their values and not just their strategic concerns into the voting booth. We need a system that forces parties to bring their best ideas into coalitions that balance views and focus on good governance.
Imagine you’re going to buy a car. What kind of car do you want? If you want an older, used model that's familiar but a gas hog, First Past the Post is your choice. If you want a more modern, sustainable, and neighbourhood friendly model, Proportional Representation is your choice. Obviously my bias is showing but you knew that already.
You can get a lot more detail about each of these through the voters’ guide you got in the mail and online at Elections BC, but the details may be less important than a general sense that they are all aiming at the same outcome – proportional distribution of seats according to the proportion of votes.
There’s an on-line survey that matches your values with the different systems, including the choice between PR and FPTP. I took it an at the end it matched my voting choices exactly so I recommend it. Here’s the link for that survey.
1. Party bosses will choose the candidates. Well, actually, isn’t that pretty much want happens now under FPTP where candidates are vetted by parties? That’s not a bad thing and parties will continue to vet candidates under proportional systems. Independents are still independent.
2. The door will be open to a government take-over by extreme parties. CCPA research shows that, “Historically speaking, whenever we have seen the emergence of far right and neo-Nazi parties, it is clear they are a product not of the electoral system but of neoliberal policies and austerity.” Consider the Trump administration in the US, the Ford Administration in Ontario, the Duarte administration in The Philippines, or the previous Thatcher administration in the UK, or the Harper administration in Canada. All have/had an extreme neoliberal agenda and all are FPTP systems.
3. It’s too confusing. Essentially this is an argument to play it safe and avoid uncertainty. Yet, the most compelling fact I heard in the very unedifying debate between the leaders was that, in all the Provincial elections we’ve had, only one has produced a majority government with a majority of votes. Wow!! The rest are false majorities giving 100% of the power to parties that typically have 35-40% of the vote. That's the clear unfairness of FPTP.
Remember, the proposal for PR allows us to road-test it for two election cycles before there's another referendum to re-decide. That's meant to reassure hesitant voters that there is an "escape clause." No system is completely fail-safe but PR addresses the worst grievance of FPTP, the 'false majorities' that entrench political parties that; a) depend on splitting the opposition as their means of maintaining power, and b) use their non-majority power to promote only their own view of how the world should operate. We need a system that allows voters to bring their values and not just their strategic concerns into the voting booth. We need a system that forces parties to bring their best ideas into coalitions that balance views and focus on good governance.
Thank you for reading this. I hope it's been useful.
Living in the city, it’s not every day that you get a chance to connect with nature. Spending too much time living in the concrete jungle can have an adverse effect on your health. It’s important to spend some time around nature every once in a while. That doesn’t necessarily mean that you need to pack up and go camping in the mountains once a month. You can encourage wildlife to flourish right in your backyard. Not only will this give you your own little slice of paradise, but also help to sustain crucial animal populations that are having trouble adapting to urban landscapes. Here’s how you can encourage the birds and the bees to frequent your garden and give them everything that they need to thrive.
Pollinators such as bees and butterflies are crucial to our fragile ecosystem. Many plant species rely on the movement of these pollinators to fertilize flowers, including plants that we farm. Without pollinators, the world is likely to face a global food crisis, but unfortunately, their numbers seem to be falling. You can help pollinator populations to resurge by providing them with flowers that are free of toxic herbicides and pesticides. Even if you don’t have garden space, hanging a flower box outside your window will attract pollinators and spruce up your living space. In order to conserve water, it’s a good idea to irrigate flowers using a drip system.
Birds are also an important part of the ecosystem. Not only do they help pollinators to fertilize flowers, but they also play a critical role in insect population control. Birds eat many of the pests that invade our homes, eat our food, and decimate our crops. You can encourage bird populations to frequent the city by leaving out a source of food, such as nuts or seeds, and water. Just remember not to go overboard with the water, as much of it will be lost to evaporation. Either limit the amount of water you leave out each day or conserve it by installing a drip system for the birds instead.
Encouraging wildlife to thrive in your backyard is not only good for your psyche but also your environment. Going green in a literal sense can help to maintain and even restore dwindling animal populations in urban areas. Insects and birds, in particular, are vital to the wellbeing of our environment and our ecosystem.
On a Saturday in mid-September, BC Sustainable Energy Association (BCSEA) hosted an annual event with this year’s theme focused on BC’s transition to clean transportation (learn more here). A number of representatives from the public, private and non-profit sectors excitedly came together to share past lessons learned and glimpses into the future with up-and-coming industry technology to support the all-important “greening” of the transportation sector. As a result, the day was full of meaningful conversation, sprouting ideas in pursuit of solutions while leaving an uplifting, optimistic and motivating outlook on how industry is shifting.
This seminar/conference/networking event gathered like-minded speakers, listeners and general participants all eager to learn and discuss ways to support the transition to clean transportation. Bowinn Ma (MLA North Vancouver-Lonsdale & Parliamentary Secretary for TransLink) opened the day by emphasizing how access to major transit corridors from urban developments and affordable housing will continue to provide all residents with smart and sustainable transportation options. From there, the event was broken out into four panels: (i) transportation and land use planning; (ii) barriers to wide-spread electric vehicle adoption; (iii) the future of freight; and (iv) taking pilot projects to becoming industry drivers.
This panel was meant to illustrate how municipal planners & policy makers are working with mass transit to reduce emissions. Derrick Cheung (TransLink) highlighted the need to accommodate ridership growth on public transit as 82% of new homes built in Greater Vancouver are in walking distance of transit. Tim Barton (Senior Citywide & Transit Planning Engineer, City of Vancouver) illustrated how integrated city planning can address the challenges resulting from an increasing population while maintaining alignment with city rejections of major roadway upgrades for motor vehicles. As of 2016, 50% of transportation load share was attributed to green options such as cycling, walking and transit. David Oliver (Greenlines Technology) discussed the problems resulting from impediments to implementing innovative transit solutions such as the lack of data sharing in North America due to safeguarding of propriety information across the industry, unlike Finland where open data sharing is now a requirement. David inferred that most people are not aware of all their transportation options since commonly used trip planning Apps default to private car mode without the ability to easily combine different transportation modes.
The second panel dealt with electric load management to allow for 100% electric vehicle (EV) ready neighbourhoods and seamless mobility. Anaissa Franca (Canadian Urban Transit Research & Innovation Consortium) explained the issues surrounding the scalability of electric mass transit as limited by infrastructure while pointing out that utilization of hydrogen fuel cells may help alleviate this problem. Neil MacEachern (Environmental Coordinator, City of Port Coquitlam) outlined how cities are requiring that new residential construction easily allow for future EV charger installation for each dwelling unit. Neil also discussed 2 major barriers to EVs and potential solutions: (i) the BC Strata Property Act makes it difficult to install EV chargers in stratified residential buildings. Therefore a “right-to-charge” provision was proposed to be included in the Strata Property Act, however the proposal was denied but an amendment was agreed upon that stratas must accommodate reasonable requests from residents for the purpose of EV charging; and (ii) the BC Utilities Commission Act only allows registered ‘public utility’ companies to sell energy. Although stratas are specifically excluded in this definition, a proposal has been submitted to exempt the reselling of electricity for specific purposes from this definition (see resolutions and responses at https://www.ubcm.ca/EN/main/resolutions/resolutions/resolutions-responses.html).
In this panel, we explored multi-modal technologies to help reduce carbon emissions resulting from the transportation of container goods via road, rail and waterways. Allan Grant (Corvus Energy) presented on exciting marine battery technology for all-electric and hybrid freight vessels. Ports across the world are starting to enact laws requiring that incoming vessels incorporate electric and/or hybrid technology in order to use the port. Allan indicated that the Port of Vancouver is responsible for 80% of the City of Vancouver’s GHG emissions from transportation. Mike Bains (FortisBC) explained FortisBC’s targets to provide 5% of natural gas supply as renewable natural gas (RNG), typically from biomass. Costs of RNG are still quite high compared to conventional natural gas but new technologies are working to close the gap.
The final panel highlighted current pilots involving smart vehicles and electric buses for low carbon transportation. Kelly Carmichael (BCIT) gave an overview of their pilot project in New Westminster to use street light electrical supplies to power curb-side EV chargers. By changing street lights from conventional high intensity discharge bulbs to LEDs, enough capacity can be re-purposed from the existing infrastructure to supply EV chargers. Eve Hou (Translink) illustrated the concept of “Mobility as a Service” and how companies in Europe are providing trip bundling services to demonstrate all mobility options and their combinations. Kristina Mlakar (Canadian Urban Transit Research & Innovation Consortium) showed a snapshot of CUTRIC’s innovative approach regarding the future of autonomous and electric mass transit, as well as existing projects to implement all-electric off-grid transit buses.
The passion for serious change was in abundance throughout the day as interactive presentations and enthusiastic conversation linked people from government, industry and non-profits. I know I felt as if my head would explode from all the interesting information but was left feeling invigorated with so many positive stories leading the way to minimize the harmful impacts of conventional transportation on the environment. I have no doubt that the event truly made critical connections to spark new collaboration in unmeasurable ways and continue the relentless pursuit of a transition to clean transportation.
I think this is especially relevant in Metro Vancouver as we approach the October 20th municipal elections and face ballots with a multitude of candidates. Most are seeking to make changes some of which could reverse the progress made to facilitate the ability of citizens to reduce their dependence on the automobile. One new party, Coalition Vancouver, is seeking to wedge their way into power with threats to tear up bike paths and create policy that favours cars. This Walrus article makes the case for a city that “prioritizes active transport, transit and intelligently planned density.” Let’s make candidates clearly indicate their stand on transportation and hold them accountable upon election.
It is an old abandoned railway building, which after 10 years of litigation was donated to the community to be a factory of collective autonomy. After 10 months of work this building was restored using mostly recycled materials or manufacturing faults. This building uses renewable energies for the production of energy. Hydronic heating system with a source of natural gas energy, also the use of Geothermal and Biomass.
You should read: “Climate Change Needs Behavior Change”, a report by Rare.
There has been a lot of sobering news on climate change recently, which has a lot of people searching for answers. If you are like me and looking for immediate action you can take, I highly recommend reading RARE’s comprehensive report on the impact individual behavioural can have on climate mitigation. They came up with 30 behaviour changes that you can do as an individual, clustered by category, and ranked in terms of plausible-optimum scenario emissions reductions. Number one? – Reducing food waste, which they found could be equivalent to reducing carbon dioxide emissions by 70.5-93.7 gigatons!
If you read the report and feel inspired to take action, SPEC’s Waste Committee will be using this report to guide their upcoming projects. Drop by the next meeting to get more involved.
There’s nothing better than the feeling of saving the environment without even lifting a finger. Or saving it by just lifting one. Using the search engine Ecosia.org you are planting trees every time you hit Search. Instead of using good ol’ Google you simply use this site and scan still find that brunch restaurant menu, check the weather forecast or find answers to any other questions you normally ask the G giant. At a rate of 45 searches per tree, this German-based foundation has already planted over 35 million trees since 2009 – and I take ownership for at least ten of those, so far. Another added bonus is that they don’t sell your data to advertisers, unlike most search engines, so not only are you making the world greener but also safer for you.
Ballots will arrive in October for the referendum on Proportional Representation (PR.) It’s an opportunity to express your point of view on whether to change our electoral system from first-past-the-post (FPTP) to proportional representation (PR).
Both Systems have their proponents and their critics. Under FPTP, “the winner takes all,” irrespective of the percentage of the popular vote. In a PR system, votes are distributed according to how people actually vote. FPTP has the advantage of familiarity. PR has the advantage of fairer distribution of actual votes.
SPEC favors PR because it allows people to 'vote their values' and it promotes parties working together. However the purpose of this writing is not to convince you, but to explain the process.
Part 1 - asks you to choose between First-Past-The-Post and Proportional Representation.
Part 2 - ask you to choose among three options for how to make the necessary changes if the majority vote in favor of PR. All three lead to the same outcome- a transition from FPTP to PR. No one is definitively superior to the others. They are unfamiliar to us but they are all drawn from the experiences of countries around the world who use PR. And they are crafted to reflect conditions in British Columbia, particularly to balance the very different sizes of populations and electoral ridings in urban and rural areas. All three options facilitate a transition from FPTP to PR.
Some people may decide not to vote because they can’t decide which of the three options they favor. That would be a mistake. You can skip Part 2 and your ballot is still valid.
1. The rules around all voting procedures in BC, (FPTP or PR), are closely supervised by Elections BC, an independent and non-partisan office of the legislature that set standards and monitors the rules around every provincial election.
Even if an ‘extreme’ group rises above the threshold of votes to reach party status, it is better to have them in government where they are accountable.
FPTP is no protection against extreme views, as evidenced by the 2016 election in the United States.
Around the world, there is more evidence of extremism in FPTP than in PR systems.
The three options in part 2 of the referendum ballot are the most confounding for people. Here is an unbiased resource on the three options from ElectionsBC.
In the Next newsletter, we will take a closer look at the three options.
Fireworks. I found myself consciously not watching the fireworks this year. A couple of decades ago in the early years of this annual event, I went with friends to Vanier Park to see the fireworks. I was hoping to reconnect with an awesome experience in 1976 in Riverside Park, New York City, where a huge crowd watched the fireworks celebrating the US bicentennial above the Hudson River. Those fireworks were decidedly less pyrotechnic than now but it was a profound gathering of the community with great love of country fueling a remarkable civic experience. It left an indelible impression on me.
The event at Vanier Park started off well enough but within 10 minutes I could no longer see the full effects of the fireworks looking up through a great stagnant haze of smoke. It totally shifted the experience for me. The most memorable and pleasurable part of the evening was the stimulating night biking back to our W. Point Gray home. I’ve had very little appetite to rejoin the crowds in subsequent years. Since then, I’ve occasionally enjoyed the fireworks from the distance of our front balcony where we had a clear view between the trees, but the inevitable and lingering cloud of haze over the city has produced a mild aversive reaction in me. That’s a slightly precarious thing to say about an event that attracts over a quarter of a million people at every showing. Yet this year, I feel compelled to say a couple of things about this annual event.
The fireworks this year took place when the whole Metro Vancouver region is in stage III drought conditions, under an air advisory alert, and under serious threat of fires. Over the years, as the summer draught and fires have worsened, I’ve wondered if we can do this much loved celebration in a way that takes account of and adds to public awareness around the seriousness of these threats?
I heard an interview recently with the owner of the Christine Lake Lodge, currently threatened by fires. She spoke simply and matter-of-factly of the necessity to revamp their schedule so that August is not a time in which the lodge depends on tourism for its operation. I admired her capacity to take stock of realities and revise accordingly.
With this on my mind we went to Victoria for the August long weekend, breaking a longstanding tradition of staying home over holiday weekends. On Sunday evening we went to the inner harbour to hear the Victoria symphony and view the fireworks. I hadn’t mentioned to my partner my misgivings about fireworks and was going along with his plans for an enjoyable evening. And, indeed, it was! I stood in a large crowd where we luckily found a place to tuck in with a perfect view and good listening range. A family of three, also from Vancouver, tucked in beside us. The fireworks came just as a gorgeous sunset gave way to dark and the orchestra stopped, giving way to a collective silence broken by appreciative gasps of visual pleasure. It lasted about ten minutes and we turned to our neighbours, all gushing agreement, “that was just the right amount of fireworks!!” The haze was just starting to form but not the murky cloud of smoke. Rick and I mused as we walked home on the felt sense of a coming together into the commons.
I’m not expecting an avalanche of support and indeed I may get an avalanche of disagreement that we need to do any Rethinking of our Vancouver annual fireworks event. If it’s going to continue, which is almost a certainty, is there a way to do it that is less likely to collide with the draught-air pollution-fire triad that is now a predictable feature of Vancouver summers? I think it’s worth examining.
An inside look on how Emily Carr Elementary completely revamped their waste system and diverted 800 pounds of recyclables from the landfill.
Cadine (left) with the team of student volunteers that sort classroom waste and recycling.
Emily Carr Elementary School is on a mission. Two years ago, the school took the Zero Waste Challenge to divert recyclables away from the garbage bin. Over the next 730 days, students saved approximately 800 pounds of plastic, foil composites, styrofoam, felts, and glue sticks from the landfill.
The idea started with school and student support worker Cadine Boechler. Looking around the school, with all the preventable garbage being sent to the landfill, she saw both an opportunity and a necessity to change the current waste system.
She built new waste sorting stations for the hallways and classrooms using recycled materials, and created signs with waste items glued on so the kids could recognize where their waste was supposed to go. Every station has separate bins for garbage, blue-bin recyclables, organics, soft plastics, and foil composites—like chip bags and granola bar wrappers. In addition to these bins, classrooms also have bins for felt pens and glue sticks.
Cadine built this waste sorting system in the main hallway.
Once the waste sorting systems were in place, it was time to get the students involved. In order to make sure all students were participating, Cadine recruited a team of student volunteers to go to each classroom and teach about the new system and how to correctly sort waste into the bins. Throughout the school year, as classes produce and sort their waste, every month a couple of students from each class bring their bins outside to a recycling collection area. Another team of regular student volunteers sorts through the classroom bins to make sure there is no contamination, then adds the recycling to the appropriate bins. These bins are then collected and transported by Pacific Mobile Depot once a month for $30/month.
Two student volunteers sort classroom recycling into blue bins.
We got the chance to visit Emily Carr Elementary and chat with Cadine, the mastermind behind this project, about the new waste system and the impact it is having on the students.
What made you decide to do this Zero Waste Challenge?
I decided to do this Zero Waste Challenge when I noticed that the school landfill bin was full of packaging that could be recycled. I thought that the program fit into our school’s environmental goals and connected well with our curriculum, which teaches about taking care of the environment and social responsibility. It just seemed like the right thing to do considering the state of the planet, and a great way to teach the students that it is possible to create solutions.
How has the sorting system impacted how the students recycle and think about waste?
The system has been really transformative for the students. When the grade 5 group went to camp they decided, without any instructions from the teachers, to save all their packaging and bring it back to the school.
I have had feedback from parents about how the program has really impacted their home life in a positive way. They now save all their packaging and do drop-offs on the weekends! One of our students in grade 2 even spoke to his strata council about increasing the recycling in his building and another has implemented some zero waste practices in her guide group!
What advice would you give to teachers hoping to start a similar program in their school?
My advice for staff who would like to implement a similar program at their school is to have the program be student-led and run. I believe that the success of our program is due to the fact that we had peer educators teach the students workshops about the program and why we are doing it. Our students are also the ones who facilitate a monthly collection and take bins out and back at lunch and recess, so they really own the program and feel proud of what they are doing. I would also say to keep trying new ideas – our program has evolved a lot over the last few years – and to keep acknowledging the students’ participation. I keep track of how much we have saved from the landfill and we just celebrated our 2-year anniversary and, in that time, we saved about 800 pounds from the landfill – an amount that can fill our school office from the floor to the ceiling!
If you have questions about starting a similar system in your school, or about general sustainability in Vancouver schools, please contact the VSB’s Sustainability Office at .If you have questions about starting a similar system in your school, or about general sustainability in Vancouver schools, please contact the VSB’s Sustainability Office at sustainability@vsb.bc.ca. | 2019-04-18T23:00:37Z | https://spec.bc.ca/SPEC-Blog |
Art has many forms and traditions that is why you will find a variety of types of art teachers. Any creative art is far more expressive compared to just text or still another gimmick. Individual art may be your job completed independently on your time, also ought to represent your own personal interests.
If you would like to create an application for a teacher’s job, you need to keep at heart that you are perhaps not exactly the sole real person employing for the precise identical. Another thing you’re ready to study from teacher resume samples is the phrases are vitally crucial whether you need to increase the interest of your own crowd. Select the instructor resume template that is related for your circumstance. The instructors failed to enjoy this. Art educators need to be encouraging and can inspire pupils to exercise skills that might be uncomfortable at first. An art teacher should be in a position to showcase their work and enable pupils to do exactly the exact identical. A great art teacher tries to get students that produce work in most class which is unique.
Elementary universities furnish the simple foundation of comprehension for children. Show them that you’re eager to benefit that specific faculty and that their acceptance has become the most important thing on our entire world for you. Personal universities might also have a religious or group association that affects the form of teaching that can occur place. There can be a huge selection of more people which are aspiring to eventually become a portion of this school and also you may possibly want to face a rigid contest with them. In the end, stem the college you at which you are employing. Show the school that you’re plugged in.
Every one appears at an important teacher and they would like to be an improved teacher, they desire to be a better learner, better yet, they’d love to be a better man. A excellent teacher can produce greater difference into a young mind than the usual superior parent. Elementary teachers often make a long-lasting influence to pupils because they’re individuals who have introduced specific topics and techniques.
If individuals want to learn to create artwork teacher resume that they often don’t incorporate almost all of their relevant experience and achievements. Art instructors aren’t only educators nevertheless performers. An art instructor is liable for any variety of the specific obligations as regular education educators. The upcoming artwork teacher goes to be asked todo observation hrs and student teaching over the design of this degree. A superb art teacher doesn’t want one to be fearful of failure, however contain the tenacity of a inventor.
No matter the instance, the final outcome of one’s resume should be both professional, practical and productive. The resume objective announcement should take the structure of the job-focused description of what it can lead into this organization. Start with figuring out whom you are most very likely to deal with the letter to. In the event that you’d really like to make sure lucky one you will want to get an eye letter which may cast its spell up on the selectors.
In the event of instructing job it is rather much essential to handle a class because the youngsters are generally very much knotty. Ofcourse you need to produce well however, it doesn’t need to be perfect. Make certain you highlight most the teaching applicable courses and certifications. Eventually, you need to set your experience. Possessing the chance to observe the kiddies grow and learn is still amongst the most important areas of the job. Inch advantage for companies to online resumes is the appreciable cost saving compared to conventional hiring processes.
You will always seek out the best rates on art supplies. So, to obtain the interview call is very tricky. To put it simply, teaching keywords are buzz-words that indicate you’re the absolute best candidate for your own the employment. Whether you’re running out from innovative tips to enhance your resumes or simply searching for a library of free resumes, then our large amount of samples will probably develop very convenient that you create the best restart. Doing what you will find interesting does not signify that you need to eschew using a career narrative or establishing your very own personal brand. The very first thing will be to choose the sort of resume you would like to create, and the way it may incorporate your prior working experience, occupation background and sturdy things, while still reflecting the needs of the tasks applied for.
If you are thinking about developing a job, whatever the form of marketplace you are currently in or perhaps the occupation that you hold today, you would like a resume that represents you at the most greatest fashion. You’re going to be ready for a livelihood to get a Internet Developer, and we’ll supply you with the tools and help find your very first career. Additionally, there really are a range of tactics to generate your resume a lot far a lot more interesting and catching some job you desire. The exact first thing you would like to do would be go back and inspect the task that you’re applying to get and then determine the intended target audience. The job was not precisely what I had at heart after I imagined my own upcoming career, however, nevertheless, it might have already been much worse. Bear in your mind your focus is always to discover that instruction occupation. So in anticipation to this meeting, your resume could provide you with a chance to thoroughly think through the scenarios you need your employer to understand regarding you personally.
Along with explaining your expert qualifications and level of experience, your resume could be the ideal location to highlight your own abilities. A targeted resume is utilized to emphasis your work search towards a particular career purpose, executed in a certain marketplace, and to get a certain enterprise. When searching for a job which you should always employ a specific Resume, in other words, a restart designed for a certain place.
Resumes are available in many formats, although they share typical forms of information along with attributes. If your restart exceeds just one particular page, then make certain the name and contact information are listed on top of every web page. Broadly speaking, you will find just three specific assortments of resumes that are well accepted in the organization. As reported by a recruiter, the absolute greatest resumes are the ones that are clean, nicely structured and organized. Reverse chronological resumes are also all good for everyone with an ordinary job history seeking a conventional occupation.
Concentrate to the newest 5 to ten decades of work experience especially related to the occupation that you are applying for. You only should put jobs on a restart that link into the role reachable. Additionally, you CV ought to be produced depending on the kind of career that you are applying. Hunting a new occupation could be a very intimidating undertaking, but should you have the chance to craft a resume targeted towards the specific endeavor, you can get the healthcare records pro place you desire.
Once you’ve found a project that you would like to turn in an application for only paste and copy elements of your Guru Digital Resume to create an acceptable resume that is targeted. The exact final thing you prefer to accomplish would be receive a job that you can’t really do. Simply because you’ve got zero knowledge or it is your very first job.
Simply make sure, whichever format you pick on, so which you’re focusing on it for the occupation which you are applying to. It is cool that you’re seeking a job to get a income, however, also you will require some difficulties with restart. You will find varieties of general resume type s it will be possible to follow based on what type of method you would like your resume to possess applying for the favorite job.
When you format your resume you wish to make sure that your leave enough margin space to permit for printing. Moreover, the structure needs to be chosen sensibly since it plays a big part your producing plan. You ought to comprehend that resume structure is a must, since it may raise your chances to obtain invited for a scheduled appointment. At period, it will not really furnish the very best format for people individuals who have zero knowledge.
The most hard step is always to choose which resume format is fit for you personally. To be certain your resume is of supreme quality, then you also ought to be capable of employing the most effective resume format. Now that you’re attentive into the absolute best format and styling strategies to get a resume, you can start flaunting them onto your resume.
In case it comes to most useful resume arrangement, know that reverse chronological is virtually always a excellent stake, thanks to the way it is on the list of most frequently occurring and well-known resume formats. Even in the event you decide on a format, the plan of this structure might be substituted to some certain business to simply greatly help you to create your resume stand out. If you’re interested within a info graphic arrangement, then listed here are quite a few infographic samples to look out for there. In that instance, then your reverse chronological format could be perfect for the resume!
Just take a turn to determine that which format you want touse. As mentioned before, you wish to choose a resume format which is suitable for a private profile. Each restart format includes got their own set of gains and disadvantages for various sorts of work seekers, so therefore make sure to choose wisely. This was made to boost your chances to get the job in 2018. The resume format needs to be more consistent throughout. Part of producing an effective resume is always selecting the best structure to inform your personal story.
Additionally, there are three leading kinds of universally-acknowledged restart formats for example numerous manners of presenting your resume-relevant information as outlined previously. Then consider a few basic queries to allow you to clarify that arrangement could be perfect for you personally. Before choosing your Resume Format you would like to choose exactly what your objectives are everywhere. If it is cluttered and unclear, an expected company gets possibly hundreds of resumes from different applicants to look through so they isn’t going to spend time trying to make awareness of this and also you also may miss your likelihood for an interview.
Below you’ll get lots of sample resume cover letters. Following is your sample resume template to spell out howto write a CV for producing a work application. Sample Resume The very best method to get a notion of things you desire to placed on your own resume will be to check in samples. Whenever you have your resume sample in place, you then are able to create alterations in the form of deletions or improvements according to any specific requirement. If you’ve downloaded a few samples, then be certain that you personalize them into the positions you’re searching for. If you should be searching for sample resumes and other resume writing assistance, you have attained the suitable site. Before you start, start looking at various samples and examine them.
Businesses utilize societal webs. Your prospective employer has the time nor the interest in sifting through plenty of phrases expecting to start looking for what is relevant for their purposes. The possible employer will probably know that you’re serious if you write the letters with caution. There is likely a excellent digital employer for your own experience and techniques.
Don’t forget to personalize just about every Sample Resume aims for every position you’re applying for. Once you are requesting to get a specific location, it is wise to write a resume that has a resume intention in addition to the exact page. State your purpose and also why you’re interested at the job position. If possible, make utilize of the company and also the employment placement’s terminology.
My expertise consist of things including organizing, typing, submitting and having the capability to communicate with other individuals. Together with that, the talents and also knowledge also has to be recorded. The abilities a chronological resume could possibly be unable to to highlight come in a posture to become emphasized in a operational restart. Add the remaining part of the skills or competences from your first list into a table or grouping on top of one’s executive resume.
You are one of just a million individuals going to your the employment. When you’re looking for function, you will have to mail a resume cover letter with your resume. Therefore, if you are trying to get a project (maybe not just any work, but the task you want), then be certain to complete things right and learn to make a resume that is outstanding. If it is not related to the occupation that you want to find out more concerning, skip it. As you’re trying for fresher jobs, chances are that there will be a couple candidates for one vacancy. What’s more, you must be project special whilst adding the details and also prevent the frequent grammatical and grammatical mistakes. If you’re searching to get a fresh occupation and shifting professions, then talk temporarily the work experience along with processes that can be useful within the business even if they aren’t straight pertinent.
You’ll find a good deal of announcements one can utilize to generate an effective restart. There are special matters connected in producing an astonishing objective statement. The correspondence also needs to succeed and show why there’s a curiosity in a specific business. As you take a look at the sample letters, you must not find inch mis spelling or grammatical error within them. The sample resume cover letter needs to demonstrate a specific job standing that some one wishes to employ for. If you don’t know exactly what things to publish, you will require to find yourself a sample cover letter.
Sample cover letters are excellent manuals to work with for your job hunts. The employment cover letter for a work software is currently considered as a member of their task program. Sample cover letters are traditionally utilized to how letters for different kinds of work. Please be aware whenever you are having a review of sample cover letters they aren’t of necessity legal you copy. Assessing an example cover letter will aid the candidate to understand how they truly are assumed to write your own letter. It is some thing you could use as a direct as a way to write a productive letter when applying for the your own employment.
Usually, designers specialize in a particular category or kind of client. However a graphic designer restart is only the very first important step in landing your fantasy posture, it is frequently the thing that might make it break it in all states of your own job. No matter whether you’re looking for skilled or fresher graphic designer restart, the internet always has got the decision to offer you satisfaction when it regards the group of designer resumes.
For the design restart to really excel, you have to trust watchfully about exactly the way which it is designed as well as what is written. The master plan is still fairly straightforward but it uses a creative navigation. In addition, the overall design has a well-thought appearance with lovely subtle animations. It really is easy yet attractive layout and style that can magnetize each and every attention. When analyzing howto make a picture design resume, it is crucial that you bear in your mind the simple actuality that the future employer can probably present your resume a speedy look to get out what makes you different from hundreds or dozens of different applicants that compete for precisely the exact position. It does not have a equivalent accrediting team.
A developer could be licensed in Photoshop, but that will not signify they are creative. That you really don’t will need to be worried regarding your graphic designer restart. A movement picture designer resume needs to comprise matters such as the suitable picture designer job description and also the above template will be able to let you get one of the most suitable description depending on your necessity. So, the Graphic Designer Resume has to possess the right experience stated that there along with the field of expertise. Graphic designers have to keep updated with all the most recent applications and computer system technologies to remain competitive. Freelance graphic artists get the chance to unite technology and art to be able to speak thoughts with a big audience.
Graphic creating can be just a project of imagination, that means it takes a whole lot greater than only your moment. For instance, many make the images found in packaging for various assortments of retail services and products, although some may possibly do the job with the visual layout utilized in a book jacket. Beautiful images are used here so as to acquire upon the advice at a fine manner whilst displaying mcdougal’s abilities.
You should think about applying the chronological format if you are in possession of a solid work record and instructional achievements. Your restart formats should comprise an outstanding font. Before it’s likely to understand which of their most truly effective resume formats may probably do the work best for you it is essential that you comprehend the purpose of all each of the formats. Contemplating the aspects in the list above a number of those resume formats are now standardized. You can also observe the Resume Templates. Every restart template has been made to aim a particular occupation profile. The magazine-style Resume template may be the ideal choice.
For a skilled graphic designer, then the very best section would be that the assignments that you’ve obtained on your livelihood. The requirement of picture designer resume does occur if you don’t know exactly the best option for the demand. The total principle for graphic design resumes will be to put in a URL to your site or internet portfolio.
Resumes are important for obtaining virtually any occupation and about picture designing Resume illustrations, they must be distinctive and creative. As it’s to perform resumes for graphic artists, samples will be the ideal way to know just what is due to you. So it is imperative to locate a way to generate your resume stand out of tons of distinct hints, particularly when you are in designing. Infographic-style resumes are becoming common, and they are sometimes effective when done effectively. Your resume or CV can be on the list of most crucial projects you design.
The bulk of the moment, whenever you employ to find work, your resume will need to be followed with a covering letter. Thisbeautiful project restart sample is specially made for the audio sector. The coolest high-paying tasks will visit the best of the best.
You will be ready to pick and choose what kind of operate feels better for you. Entire each entrance using a fast description of the project you completed. Freelance perform can be an easy procedure to bring in money if you know the ideal place to appear.
There’s such a wide group of tasks to pick from, that it’s merely about impossible perhaps not to discover act after you start looking. If you’re using for several tasks, you need to build various resumes, each concentrating on a specific role and the kind of knowledge and expertise the future employers want to get. Well-paying work in graphic design aren’t easy to find. You will be landing which fantasy design job at no time.
Without vision an individual cannot start functioning. Who knows, you could easily get involved with a few very fascinating work or get operate. If you have any part time work, that will go a means towards an exemplary adventure section. Your job restart department is not the only matter which things about your resume. Imagine should you couldn’t locate volunteer job within your area of interest.
Provided that it is related to the job, faculty projects are okay when you’ve obtained zero job experience. It’s mandatory that you convince him that now you are mature enough and hunt for a well balanced task. You may have a few distinct forms of occupations or industries that you expect applying to.
Unfortunately, you’ve got to get a job to find knowledge. In the same manner, a student who excelled reluctantly does not always mean someone who will do well at work. Or maybe you’ve been in just the same endeavor for a couple of years. Just don’t forget, earlier tasks are a vital part of your livelihood. Realize that it isn’t only from inch occupation into another. Be sure to validate your language policies and spellings with care misrepresent any advice on your own resume because it can cost you a project. In the event you really don’t are focusing on function on your present-day business, you have to produce certain that the qualifications describe precisely what you did because work title likely will not.
Who knowsyou might have work through someone who you meet while volunteering. Don’t develop to some shrieking shrew when you’re not offered the job instantly. Be certain to demonstrate how each encounter is associated with the job and the way your participation contributed into the event or organisation. Lets have a glance at everything you wish to complete as a way to locate a entry level occupation. You should change your resume for every position you are applying to with the use of key words found in the work requisition of that location, differently, you’ve hardly any chance to be canvassed for an internet ranking you may be a perfect match for based on your abilities. For unique places, you can work with a restart.
Computer skills are an invaluable part of many jobs now, therefore including the programs you’re conversant using is really a great idea in the skill department. To start out with, analyze the work description to check if it signals the sort of abilities the company is searching. You may associate your chosen expertise from your aforementioned occupations into this present job skills. A very clear announcement concerning the manner in which you’re likely to utilize your most powerful relevant abilities and professional experiences to fulfill exactly the specific job you’re searching for.
If your knowledge exceeds 10 years, then it is definitely going to be tough to abide by a single page without the chance of foregoing important details. Finding work expertise could possibly be drawn-out training. As you have merely study, composing a superb work experience on your resume is not overly hard.
Now you have to learn just how to compose a resume with no experience that is persuasive and identifying, ideal for a senior high school restart or perhaps even a beginner’s resume for most teens. It truly is desired that you have any experience in the specialization you’re trying to get into. Adhere to this hints over, and also you’ll have resume that begs for that lack of wisdom and provides you with the meeting. Work Expertise assists pupils to come up with a practical comprehension of this field of function. You absolutely need to have some work experience if you may want to obtain an entrylevel standing. It is imperative to clearly show your prior work experiences and accomplishments.
The use of the livelihood goal is to not share with the choosing manger what you wish to flee the provider. Rather, it is to showcase your own skills and capabilities that’ll allow to successfully fulfill the duties of their position. A job objective is typically a declaration about what the candidate would love to do or perhaps the specific occupation they are looking for. A solid career goal will make you distinguish oneself from the audience.
When looking at the work description comprised in the advertising, search for key words related to the position. The exact final thing they would need is to experience a very more protracted outline of their job position before you go throughout the scope of tasks. The 2nd part is actually a short job description of the overall tasks that had been involved.
Resumes should not be cookie cutter” due to the fact one size wont ever match all positions you’re working to get. The ideal place to start when writing a restart is always to go to the SJC Careers Blog. Exceptional resumes reveal instead of tell.
Together with meeting all their specifications, you should also comprise what distinguishes you in various educators. Most educators should listing each of their certificates, or any time they expect receiving them. They perform in a conventional class room environment. So, your elementary teacher restart have to be at a position to easily reveal that you love young children and care to generate a constructive difference in your own own lives. If you’re a basic teacher resume, observe a basic school teacher is at fault for helping youngsters with emotional and educational development inside the beginning of these academic decades.
You didn’t make a decision for a teacher as you wished to develop into prosperous, you achieved it as you own passion for education. Beyond all what’s needed that you have inquired for, you’re discover I’m most likely one of the absolute most energetic educators you met. Superior teachers have been famed due to their vivacity and vibrant disposition. The primary instructor restart webpage lists an variety of different samples which can also offer you thoughts about how to draft your own version once you are getting looking at to submit an application for a teaching post that interests you. Even experienced teachers want to reestablish their permits every fixed couple of years, and lots of enroll in supplementary instruction or greater education programs to improve their livelihood. Show them that you are a true professional on-line teacher.
The sample resume underneath would be meant to meet the needs of the man that has only finished earning their diploma or teaching certification and who is searching to get an initial schooling job. In the event that you simply want a restart that is certainly professional, you can secure a sample for that too. You would like to locate a sample for your job you’re likely to be applying for this it is possible to ensure it’s written accurately.
The very first thing that you should do, is to understand what restart format you wish to use, which form of template is better to opt for, what positioning to-use and several more. Each structure is both exceptional now we’re likely to discuss each of those separately. You have to understandthat restart arrangement is important, because it can certainly boost your chances to have invited for an interview. The absolute most hard step is to figure out which restart format is ideal for you. What resume structure to utilize at 2017 and the way that it’d increase your odds to obtain the work. Each resume arrangement has been produced to improve your chances to come across the job in 2018. Examine to see perhaps the school carries a specific format.
The major issue is always to realize exactly just what the schools want to possess, and you also need to produce a resume cover letter for each application you send. Yes, even take some time to enable the faculty know you’ve see certain requirements and the way you matchup together with them. In the event you are a school teacher restart, think about being truly a great school-teacher pro is quite somewhat a lot greater than needing comprehended certificates, in addition, it depends a whole lot about the way you’re, how you are able to boost employer’s institution and enrich the lifestyles of the students.
Be sure that your resume is both crystal clear clear and informative and concentrated to the particular teacher occupation potential. Knowledge abroad demonstrates you are adaptable as well as independent. Should you not have any teaching expertise, then you have to prove to a potential employers you are an expert in your preferred instructional area and also you have the capability to educate. In the event you have little teaching experience, then include volunteer positions and co-curricular pursuits that demand teaching in some manner.
Without owning the crucial credentials, it can appear unreasonable to apply for employment. Along with conveying the important qualifications and characteristics to the job you’re applying for, a resume has to stick . Due to the fact you’ve got zero expertise or it really is your very first job. It is cool that you’re hunting for a job to get some funds, however, you want any problems using restart. Teaching jobs usually need specific amounts and certificates, so be sure to emphasize your own education.
Emphasize capabilities, experience and traits particular into this job which you’re applying for. In the event that you’d really like to be taken seriously to your job that you are applying for, then be sure you meet all of the precise demands. Whenever you’re working in your existing occupation you are maybe not stressed, seems like what goes sleek and with no issues. When you’ve discovered that your once-rewarding and satisfying occupation no longer offers you the exact enthusiasm and excitement, it could function as the possibility to think about a career change.
When you begin trying to locate jobs as a instructor, have some chance to evaluate your own goals and also techniques. If that’s true, your resume may still be quantified, and offer the hiring manager a more concrete notion of the selection of your abilities and talents. Infographic resumes appear nice, however in addition, you need to be concerned with candidate monitoring system computer software.
In the event you don’t know how to develop or exactly what exactly to include inside a template, you may make use of the online template services to successfully construct an individual. For this reason, you are going to need the make a template that reflects a superior degree of professionalism of the small business. Prior to starting commence developing the template, then you’ve got to have note of the great deal of things. After there really certainly are several basic guidelines that may be implemented to any invoice template that may make your using them more effective. A sterile statement template is merely a template in which total specifics of an item may be full of transform it into a statement.
Just by earning your template public every documented user may use your template. Applying an effortless template additionally provides you using something that is not difficult to prepare and know, of use for both you personally and your acquaintances. For that cause, it really is vital that you just designing your template carefully. The statement template could be used to get any kind of firm where you’re predicted to send the bills for the customers. More than 321 totally free invoice templates that you may download and print. Fortunately, are complimentary statement templates easily available that you use which ought to stay an position to work with you to offer that sort of view.
Invoice can be an industrial record. Invoices are utilized by organizations along with individuals to keep a listing of trades made in business in addition to privately life. Your very first couple bills are completely liberated. That means you can produce fashionable, formal, proper invoice for the company venture.
Invoices are available in all different types. Our Freelance invoice is just one more way you can separate your self from the remaining part of the field having its own unique, clear-cut design and personalized coloring alternate options. Customizing an invoice can be plenty of fun . however, it really is a little of a trial and error practice. Choose the Sale Layout you will likely use and pick either the MYOB plain-paper bill or some Pre-Printed Invoice you will Customize.
At this time you know why invoice really matters and also the way it influences your business enterprise venture growth. After you compose an invoice for consultancy services, make sure it’s in contract with the contract which has been initially signed. So statements are incredibly critical for practically any sort of enterprise. A proforma invoice a part of what will lure the purchasers to purchase the things that they need from your company. Invoices are indispensable approaches to supply us information in regards to a particular purchase. Provided that the invoice doesn’t have plenty of graphics, you should be at a position to attach it to the email. If you’re also on the watch for many pro designed with free from cost statement to prepare your own business invoice, it is possible to get a free price Invoice Template from our website.
After you get either of our invoices, you should look for the preferences tab. It will be potential for you to create the statement fully your own, so altering the template to follow together with your shifting needs. The statement is that the prior announcement about the worthiness and also high quality of work offered by the business. The statements additionally cite that the purchase value of the automobile. After you ship the statement, you are going to find a way to track it to make certain your buyer receives and also viewpoints that the invoice. Spreadsheet123’s services statement, is well prepared to use spreadsheet, which requires minimum customization and certainly will help get you planning less period which you’ll need to earn a java.
It’s possible to easily make your bills by applying bill template. You require an invoice that’s likely to make your business seem professional and isn’t tricky touse. During the aid of the blank bill template you can efficiently make a statement that is simple to read and also know and also that is going to satisfy each of one’s own requirements. It really is quite problematic without a statement about becoming paidoff. An invoice is a document that exhibits the quantity of dollars that an individual has got within a definite time. It will be potential to merely share an all-inclusive invoice via a contact using the cost link, and the purchaser could be rather content to find the method of payment hassle free.
You will save invoices, clients and company environment by making a merchant account. An invoice is actually a superb destination for a start. A bill is basically a reception or an invoice, or a statement which indicates your client or customer owes you cash for services that you have left. Through the support of the blank bill template it isn’t hard to publish and create prompt invoices. Or, additionally, you’ll find generic billing invoices that you can readily purchase out of your regional bookstore. | 2019-04-23T02:34:29Z | http://jerseysbuyonline.com/13-eine-bewerbung-schreiben/ |
Best Essay Crafting Services By The Professionals Buy Essay Now! – Trion-Bau Kft.
Best Essay Crafting Services By The Professionals Buy Essay Now!
Write my paper for me.
Moreover, given that many of our custom essay and custom research paper buy essay online writers are still active in academia, they are on the cutting edge of the research methodologies which your professor likely expects in assigning you this paper. Students can’t find out enough time to complete essays, term papers, research papers and theses that have been given as homework. You should read the kerching casino review to choose the best site. Thankfully, this does not have to be a barrier to getting your research published after having worked on a major experiment or project. White papers serve a similar function today, and they usually recommend a where to buy essays online specific product or service as the solution.
Are you finding it difficult to write a well-constructed, highly researched, and grammatically correct essay, research paper i don’t want to write my essay, or another academic paper? Many companies have started introducing paper writing services and this has also given root to some scam paper writing companies that have started consuming students’ time along with money by writing papers that are of very low quality and have been plagiarized. In general, a research paper incorporates an abstract, introduction, determining the problem, analyzing the problem, presenting solutions to the problem and stipulating new aspects for future research that may enhance the proposed solution buy college essays online.
Students can’t find out enough time to complete essays, term papers, research buy college essay papers and theses that have been given as homework. Sometimes they often think of someone who can write my research paper for me or help me write my research paper and that support can only be provided by best research paper writers who are available only at different research paper writing company or research papers writing service.
states essays usually! It is only through this that I know that I will score a good grade. Topic their colleges in receive students part, the most due. The core attention to the writers is the key success factor of any good service where you can say, �write my homework� and get a solution.
When you deal with buy essay a rude writer, it is better to cancel the order ASAP and find another service. Because I have a challenge of expressing my thoughts, I always want my assignment to be worked on by someone who possesses excellent communication skills. THE BEST RESPONSE TO �WRITE ESSAY FOR ME� OR �WRITE MY ESSAY� INQUIRY.
I simply had to thank you so much yet again. I’m not certain the things that I might have implemented in the absence of the type of techniques provided by you about this area. It previously was an absolute challenging circumstance in my circumstances, nevertheless being able to view a specialised avenue you treated that took me to cry with gladness. I’m just grateful for this help and then hope you find out what an amazing job that you’re undertaking teaching most people all through your web page. I know that you have never got to know any of us.
My spouse and i were really fortunate when Chris could finish off his analysis through your precious recommendations he got out of the blog. It’s not at all simplistic to just find yourself giving away things which a number of people could have been trying to sell. And we all see we have the website owner to thank for this. The specific explanations you made, the easy web site navigation, the relationships your site help to create – it’s many extraordinary, and it’s letting our son and our family recognize that that issue is satisfying, which is very vital. Thanks for all the pieces!
I simply wanted to jot down a simple message to appreciate you for all the fabulous ways you are showing on this website. My time intensive internet research has at the end of the day been rewarded with reputable ideas to exchange with my good friends. I would suppose that we visitors are unquestionably fortunate to live in a notable network with very many awesome individuals with great secrets. I feel pretty fortunate to have seen your website page and look forward to tons of more amazing minutes reading here. Thanks a lot once again for all the details.
I simply want to tell you that I’m all new to blogging and truly savored you’re web blog. Likely I’m planning to bookmark your site . You certainly have great well written articles. Thanks for sharing your webpage.
I actually wanted to type a small message so as to thank you for some of the precious tips and hints you are posting on this website. My long internet search has at the end of the day been rewarded with reliable insight to exchange with my family members. I ‘d say that we readers are quite lucky to be in a magnificent website with very many wonderful people with valuable tactics. I feel extremely grateful to have discovered your entire web site and look forward to many more awesome moments reading here. Thanks once again for everything.
I definitely wanted to write a brief message so as to thank you for some of the amazing concepts you are giving here. My extended internet look up has now been compensated with high-quality strategies to share with my companions. I ‘d declare that many of us site visitors are undeniably endowed to live in a useful place with many brilliant individuals with helpful tips. I feel truly blessed to have discovered your web pages and look forward to some more excellent minutes reading here. Thanks once again for a lot of things.
I not to mention my friends appeared to be looking through the best techniques on your website while instantly I had an awful suspicion I had not thanked the site owner for those tips. All of the women were definitely as a result very interested to see them and already have honestly been making the most of these things. Appreciate your indeed being really helpful and then for figuring out this sort of fantastic tips millions of individuals are really desperate to know about. Our own honest apologies for not expressing gratitude to you sooner.
Needed to send you that little observation just to thank you very much as before regarding the magnificent advice you have provided on this website. This is particularly open-handed of people like you giving unreservedly all a lot of folks might have sold for an ebook in order to make some cash on their own, specifically now that you could have done it in the event you decided. The pointers as well served to become great way to recognize that other individuals have the same interest just as my own to figure out very much more when considering this problem. I believe there are a lot more fun moments in the future for individuals who find out your blog post.
I intended to put you that little remark to be able to thank you so much again for these gorgeous suggestions you’ve shown above. It was certainly unbelievably generous of people like you to grant without restraint exactly what many of us would have distributed as an e book to generate some bucks for themselves, even more so given that you might well have done it if you considered necessary. These things also acted as the easy way to realize that most people have the identical keenness much like my personal own to learn a lot more on the topic of this issue. I’m sure there are millions of more pleasurable periods in the future for folks who read your blog.
I happen to be writing to make you know what a terrific discovery my friend’s child developed visiting the blog. She mastered some things, which include what it’s like to possess a very effective teaching heart to get most people very easily thoroughly grasp certain complex matters. You truly surpassed her expectations. Thank you for rendering the insightful, trustworthy, explanatory and in addition cool tips about your topic to Mary.
I as well as my buddies happened to be going through the excellent advice found on your web page and then then developed a horrible feeling I never thanked the website owner for those strategies. Those young boys ended up so very interested to study them and have now certainly been making the most of those things. We appreciate you genuinely quite thoughtful and also for having this sort of notable things most people are really desperate to know about. My very own honest apologies for not expressing appreciation to earlier.
I have to convey my passion for your generosity supporting men who require help with that content. Your special dedication to passing the solution up and down became exceptionally practical and has encouraged regular people like me to get to their dreams. Your informative suggestions indicates this much a person like me and still more to my peers. Many thanks; from everyone of us.
I definitely wanted to develop a quick word to express gratitude to you for some of the nice information you are giving on this website. My long internet search has at the end been paid with reputable facts to go over with my visitors. I would mention that many of us website visitors are undeniably fortunate to exist in a really good community with many wonderful professionals with insightful opinions. I feel rather fortunate to have seen the web site and look forward to so many more excellent minutes reading here. Thanks a lot once more for everything.
I actually wanted to post a comment so as to say thanks to you for these great techniques you are sharing at this website. My particularly long internet investigation has at the end of the day been rewarded with reputable concept to exchange with my friends and family. I would say that most of us visitors are really lucky to live in a magnificent place with so many awesome people with interesting tactics. I feel pretty happy to have seen your web page and look forward to so many more entertaining times reading here. Thanks once again for all the details.
Thank you for your whole effort on this site. Kate takes pleasure in participating in internet research and it is easy to understand why. My spouse and i learn all of the lively medium you provide vital thoughts via this website and therefore cause response from visitors about this subject plus our favorite simple princess is always being taught a whole lot. Take pleasure in the remaining portion of the year. You are carrying out a pretty cool job.
I needed to post you the little remark so as to give thanks as before with your unique ideas you’ve documented in this article. It was really incredibly generous of you to present publicly what many of us could possibly have marketed for an ebook to make some money for themselves, chiefly given that you might well have tried it in the event you desired. These advice also served to become fantastic way to understand that other people have a similar keenness similar to mine to grasp somewhat more in regard to this issue. I know there are several more fun occasions ahead for individuals who start reading your blog.
I would like to convey my love for your kindness in support of those people who need help with this particular subject matter. Your very own dedication to getting the message all over has been extraordinarily useful and have regularly enabled guys and women like me to arrive at their targets. Your invaluable useful information entails so much to me and substantially more to my colleagues. Best wishes; from each one of us.
I and also my guys ended up reviewing the good tips on your site then the sudden I had a horrible suspicion I had not thanked the site owner for those tips. These young boys ended up absolutely excited to see all of them and have now extremely been using these things. Thank you for really being really considerate and for deciding upon such really good guides millions of individuals are really desirous to know about. Our own honest apologies for not expressing gratitude to you sooner.
I wish to express my appreciation for your kind-heartedness for people that require help on this important topic. Your personal dedication to passing the message throughout came to be especially powerful and has surely empowered folks much like me to realize their objectives. Your amazing warm and friendly hints and tips entails this much to me and much more to my mates. Many thanks; from everyone of us.
I enjoy you because of all your work on this web site. Gloria take interest in engaging in internet research and it’s easy to see why. A number of us notice all concerning the lively mode you give invaluable guides by means of your web site and as well as strongly encourage participation from the others on this idea plus our favorite princess is really starting to learn a great deal. Take advantage of the rest of the year. You are always doing a remarkable job.
I wish to show some thanks to you for rescuing me from this type of matter. Because of browsing throughout the the net and obtaining techniques that were not powerful, I assumed my life was done. Existing devoid of the approaches to the issues you’ve sorted out through your guide is a serious case, and those that could have adversely damaged my entire career if I had not encountered your web page. Your own competence and kindness in touching the whole lot was priceless. I’m not sure what I would’ve done if I had not discovered such a solution like this. I can at this point look ahead to my future. Thanks for your time very much for the expert and result oriented guide. I won’t be reluctant to endorse your web blog to any person who would need tips about this area.
I have to express some appreciation to this writer just for bailing me out of such a difficulty. Just after scouting throughout the internet and meeting tricks which are not productive, I assumed my life was over. Living devoid of the solutions to the difficulties you’ve sorted out by means of your article content is a serious case, and the kind which could have in a wrong way affected my entire career if I hadn’t come across the website. Your good skills and kindness in dealing with a lot of stuff was very helpful. I’m not sure what I would’ve done if I hadn’t come upon such a thing like this. I can at this moment look ahead to my future. Thanks very much for the high quality and results-oriented guide. I will not be reluctant to propose your web page to anyone who needs and wants tips on this matter.
I would like to get across my love for your kindness giving support to folks who must have help with this particular subject. Your personal commitment to getting the message all over turned out to be surprisingly invaluable and has constantly encouraged girls like me to reach their goals. Your own insightful advice can mean a whole lot a person like me and especially to my office colleagues. Thanks a lot; from everyone of us.
My husband and i have been now glad when Emmanuel could carry out his inquiry from your ideas he obtained in your web page. It is now and again perplexing to just always be handing out helpful hints which usually the rest may have been trying to sell. And now we consider we have you to thank for that. These explanations you have made, the straightforward blog menu, the relationships you assist to promote – it is most excellent, and it’s really letting our son and the family do think the topic is pleasurable, and that’s wonderfully important. Thank you for the whole lot!
My husband and i ended up being quite fortunate John managed to carry out his preliminary research because of the precious recommendations he gained from your weblog. It’s not at all simplistic just to choose to be handing out guidance other folks could have been trying to sell. And we grasp we have the blog owner to appreciate for this. The most important explanations you made, the straightforward site menu, the relationships you can make it easier to foster – it’s all superb, and it’s making our son in addition to us recognize that the matter is entertaining, and that’s really mandatory. Thank you for all!
I definitely wanted to construct a quick comment to appreciate you for the nice pointers you are showing here. My time-consuming internet look up has now been paid with excellent insight to talk about with my neighbours. I ‘d mention that many of us readers actually are undoubtedly endowed to live in a decent place with very many outstanding professionals with very helpful basics. I feel extremely grateful to have discovered the website and look forward to so many more fabulous minutes reading here. Thanks once more for all the details.
I wish to convey my gratitude for your kindness giving support to folks that really want help with that content. Your special commitment to getting the message along had been especially insightful and have constantly encouraged guys just like me to achieve their pursuits. Your entire informative publication implies so much a person like me and further more to my peers. Thanks a ton; from everyone of us.
I wish to voice my affection for your generosity giving support to individuals who really want guidance on this niche. Your real commitment to getting the solution around turned out to be rather advantageous and has surely encouraged guys just like me to achieve their goals. The interesting useful information denotes much to me and much more to my colleagues. Thanks a ton; from everyone of us.
I am also commenting to make you know of the excellent encounter my cousin’s daughter developed checking yuor web blog. She came to understand numerous details, with the inclusion of what it is like to have a marvelous coaching mood to make other folks without problems gain knowledge of specified multifaceted things. You actually exceeded her desires. Many thanks for displaying such warm and helpful, healthy, informative and also fun thoughts on your topic to Julie.
I’m just commenting to make you be aware of what a exceptional discovery my cousin’s daughter had reading your blog. She came to find some issues, which include what it’s like to possess an incredible helping mindset to let a number of people smoothly know precisely certain tricky topics. You actually surpassed our own expected results. Thank you for rendering the interesting, trusted, informative and in addition cool thoughts on that topic to Ethel.
I must convey my respect for your kind-heartedness for persons that absolutely need help with the issue. Your special dedication to passing the solution all over had become remarkably advantageous and has in most cases permitted people like me to get to their objectives. Your own warm and helpful useful information indicates a lot to me and somewhat more to my colleagues. Best wishes; from everyone of us.
I wanted to write you the very little word to say thanks a lot again with the exceptional thoughts you’ve contributed on this website. This has been certainly shockingly generous of people like you to provide publicly exactly what a few individuals would have sold as an ebook to make some money for their own end, specifically considering that you might have tried it in the event you considered necessary. These suggestions additionally served to become a easy way to fully grasp other people have the identical dream much like my very own to know the truth lots more with regard to this matter. I think there are several more pleasant times up front for folks who take a look at your site.
I wanted to put you that tiny remark just to give thanks yet again for these gorgeous advice you have discussed in this article. This is really unbelievably generous of people like you to make publicly exactly what a number of people would have offered for sale as an ebook to help with making some profit for themselves, especially considering the fact that you might well have tried it in case you desired. The points additionally acted to provide a good way to recognize that other people online have the identical dreams just like mine to know the truth a lot more in respect of this matter. Certainly there are some more fun situations up front for individuals that start reading your blog.
I would like to get across my gratitude for your kind-heartedness in support of folks who must have assistance with the concept. Your very own dedication to passing the solution up and down came to be exceptionally functional and have surely helped regular people like me to achieve their ambitions. Your new insightful help denotes a lot to me and substantially more to my mates. Best wishes; from all of us.
Thank you a lot for providing individuals with an exceptionally marvellous chance to read critical reviews from this website. It can be very excellent and full of a lot of fun for me and my office peers to visit the blog a minimum of thrice in a week to read through the new tips you have got. Not to mention, I am also at all times motivated with your dazzling things you give. Certain 2 ideas in this posting are absolutely the very best we have all ever had.
I simply wanted to thank you so much once more. I do not know the things that I might have undertaken in the absence of the actual basics provided by you relating to my situation. It absolutely was an absolute alarming condition in my opinion, however , considering a new expert mode you handled the issue forced me to leap for joy. Now i’m thankful for the support and thus hope you are aware of an amazing job you are undertaking educating many others by way of a web site. Probably you’ve never got to know any of us.
Thanks a lot for giving everyone such a brilliant opportunity to check tips from this web site. It’s usually so amazing and also jam-packed with a good time for me personally and my office colleagues to visit the blog nearly thrice in one week to read the latest items you will have. Of course, we are always satisfied concerning the striking strategies you give. Some 3 ideas on this page are in fact the most impressive we’ve had.
I am only writing to make you understand of the beneficial experience our girl undergone studying your webblog. She learned too many issues, which include what it’s like to have a marvelous teaching style to have other individuals without problems gain knowledge of a number of complex subject matter. You really exceeded visitors’ expectations. Many thanks for imparting the necessary, safe, educational and even cool guidance on your topic to Ethel.
Thank you a lot for giving everyone an exceptionally splendid possiblity to read in detail from this site. It’s always very pleasing and as well , stuffed with a lot of fun for me personally and my office friends to search your site the equivalent of three times per week to learn the latest tips you will have. And lastly, we’re at all times pleased concerning the dazzling solutions served by you. Certain two ideas in this article are absolutely the most effective we’ve had.
I needed to create you one little note to be able to say thanks the moment again relating to the exceptional things you have featured above. This has been simply pretty generous of you to provide openly precisely what many of us would’ve distributed as an electronic book to help make some dough for themselves, particularly considering the fact that you might have done it if you ever decided. These basics additionally served as the great way to fully grasp most people have the same dreams the same as my own to grasp a whole lot more when considering this problem. Certainly there are numerous more enjoyable times up front for those who scan through your website.
Thank you for all your valuable effort on this website. My niece really likes participating in investigation and it’s simple to grasp why. A lot of people know all regarding the dynamic way you make useful information via the web site and in addition invigorate contribution from other people on that area of interest so our favorite princess has been becoming educated a lot. Take advantage of the remaining portion of the new year. You’re carrying out a good job.
I simply needed to thank you so much again. I am not sure what I might have worked on without the entire aspects shown by you directly on such subject matter. It became an absolute fearsome circumstance for me personally, however , noticing your specialised strategy you dealt with the issue forced me to cry with fulfillment. I am thankful for the assistance and then wish you find out what a great job that you’re getting into instructing the rest all through a web site. I’m certain you have never got to know any of us.
Needed to send you this very little note to help thank you so much yet again on the pleasant opinions you’ve featured above. It has been so wonderfully open-handed of you to deliver freely all a number of people could have offered for an electronic book to make some cash for their own end, principally given that you might well have done it if you ever wanted. These principles likewise served as the good way to comprehend many people have the same dream like my very own to figure out lots more with regard to this issue. I’m certain there are some more enjoyable periods ahead for individuals who examine your blog.
I must express some thanks to the writer just for rescuing me from this predicament. Just after checking throughout the world wide web and getting suggestions that were not pleasant, I was thinking my life was well over. Existing minus the strategies to the difficulties you have sorted out all through your main posting is a crucial case, and the ones which may have adversely affected my career if I hadn’t discovered your blog. Your mastery and kindness in dealing with all areas was priceless. I am not sure what I would have done if I hadn’t encountered such a solution like this. I am able to now look ahead to my future. Thanks so much for your high quality and result oriented help. I will not hesitate to suggest your site to anyone who would like recommendations about this area.
I simply wanted to jot down a brief message in order to appreciate you for all the precious tactics you are posting at this site. My extensive internet investigation has now been compensated with beneficial know-how to go over with my family members. I would assert that we website visitors actually are truly blessed to exist in a remarkable network with very many special individuals with valuable tricks. I feel very happy to have used the website page and look forward to tons of more exciting times reading here. Thank you once again for a lot of things.
Thank you for all of your work on this site. My mum take interest in setting aside time for internet research and it is easy to understand why. All of us hear all about the dynamic manner you offer great guidance on the website and as well as invigorate response from other ones on that article while our own daughter is truly being taught a lot. Take advantage of the rest of the year. You’re the one carrying out a glorious job.
Needed to put you one bit of note in order to say thank you once again just for the fantastic solutions you’ve shared on this site. It is really wonderfully open-handed of you to make unreservedly exactly what a number of us would’ve made available as an e book in order to make some money on their own, notably given that you could possibly have done it in the event you decided. Those pointers likewise acted like a easy way to know that other people have a similar fervor much like mine to realize lots more with regards to this issue. I am certain there are lots of more pleasant opportunities ahead for many who take a look at your site.
Thanks a lot for providing individuals with an extremely special possiblity to read articles and blog posts from this site. It’s usually so nice and as well , full of amusement for me and my office friends to visit your website at a minimum 3 times in one week to study the newest secrets you have got. Not to mention, I’m also at all times fascinated considering the gorgeous hints you serve. Certain 4 ideas in this posting are surely the most suitable I’ve ever had.
I want to show my affection for your kind-heartedness in support of folks who really want help with this content. Your personal dedication to passing the message up and down ended up being really effective and has frequently helped people like me to arrive at their aims. Your new valuable help and advice indicates so much to me and additionally to my office workers. With thanks; from all of us.
My spouse and i felt more than happy that Emmanuel managed to finish off his web research through the entire ideas he obtained from your very own web pages. It is now and again perplexing to just choose to be giving out procedures the others could have been making money from. And we also already know we’ve got you to thank for this. The most important illustrations you’ve made, the easy blog navigation, the relationships you help foster – it’s got most sensational, and it is facilitating our son in addition to us understand this topic is pleasurable, and that is unbelievably indispensable. Many thanks for everything!
I wish to convey my affection for your kind-heartedness for people that require help on your concept. Your special commitment to getting the message throughout appears to be really advantageous and has always empowered folks just like me to reach their endeavors. Your new interesting hints and tips implies much to me and further more to my colleagues. Thank you; from each one of us.
My wife and i ended up being quite contented Chris could round up his researching through the ideas he got out of your site. It is now and again perplexing just to find yourself giving freely methods which often many people could have been making money from. And we realize we need you to appreciate because of that. The type of explanations you’ve made, the straightforward web site navigation, the relationships your site give support to instill – it’s got many terrific, and it’s letting our son in addition to the family do think that idea is fun, and that’s especially indispensable. Thank you for the whole thing!
Thank you a lot for providing individuals with a very spectacular possiblity to read critical reviews from this web site. It really is so awesome and as well , packed with a lot of fun for me personally and my office colleagues to visit your site minimum three times per week to read through the new issues you will have. And lastly, I’m also usually satisfied concerning the beautiful tricks you give. Selected 4 points in this posting are surely the most effective we’ve ever had.
I intended to compose you the little word in order to thank you the moment again for these wonderful secrets you’ve discussed in this article. This has been certainly unbelievably generous of you to present freely precisely what numerous people might have supplied for an electronic book to get some cash for their own end, most notably considering that you could possibly have tried it in the event you desired. The strategies also served like a fantastic way to comprehend most people have a similar dreams really like my personal own to know the truth way more with reference to this problem. I am sure there are millions of more pleasurable opportunities ahead for people who read carefully your blog post.
skfvhh,If you are going for best contents like I do, just go to see this web page daily because it offers quality contents, thanks!
I simply wanted to make a brief note to be able to appreciate you for the splendid tips and hints you are showing on this website. My extensive internet look up has now been rewarded with pleasant tips to exchange with my neighbours. I ‘d assert that many of us site visitors are very much blessed to exist in a great website with very many special professionals with interesting tricks. I feel quite fortunate to have seen your webpages and look forward to so many more cool times reading here. Thanks a lot once again for everything.
A lot of thanks for your entire work on this web site. My daughter take interest in conducting investigations and it is obvious why. All of us know all about the lively means you offer very helpful guides on your web site and in addition attract response from people on that situation then our own simple princess has been starting to learn so much. Have fun with the rest of the new year. You are always conducting a glorious job.
I together with my pals have already been taking note of the good hints from the website and so immediately came up with a terrible feeling I had not thanked the site owner for those secrets. All the young boys appeared to be as a consequence stimulated to learn all of them and have now really been taking pleasure in them. I appreciate you for turning out to be well kind and also for pick out this sort of beneficial information most people are really desirous to discover. My very own honest regret for not saying thanks to you sooner.
A lot of thanks for your whole efforts on this web page. Debby really likes participating in investigations and it’s really obvious why. A lot of people notice all about the compelling manner you give helpful secrets on this website and attract response from other individuals on the subject matter then our princess is actually starting to learn a whole lot. Enjoy the rest of the new year. You’re performing a splendid job.
I needed to draft you that little note to finally thank you as before for your marvelous pointers you have documented on this page. This has been certainly tremendously open-handed of people like you giving unhampered all that a number of us could have advertised for an ebook to end up making some money on their own, most importantly since you might well have tried it if you ever desired. These smart ideas also worked like a easy way to recognize that other people have the same interest just like mine to find out a lot more on the subject of this matter. I am certain there are lots of more pleasant periods in the future for individuals who looked over your website.
Needed to write you a very small note to help thank you once again for these unique views you’ve discussed in this article. It is so extremely open-handed of you giving openly just what a lot of people would have distributed for an electronic book in order to make some money for themselves, precisely considering the fact that you could possibly have done it in case you considered necessary. Those things additionally served to be a good way to know that many people have the identical eagerness really like mine to figure out significantly more concerning this condition. I know there are several more pleasurable sessions in the future for those who looked at your site.
Needed to draft you this little bit of remark in order to give thanks the moment again relating to the precious knowledge you have shared on this website. It’s extremely generous of people like you to deliver publicly just what many of us would have sold as an electronic book to help make some bucks for themselves, principally now that you might have tried it if you desired. These things additionally worked as the fantastic way to know that someone else have a similar interest much like mine to grasp more and more concerning this condition. I believe there are lots of more pleasant occasions up front for individuals that examine your blog post.
I not to mention my guys ended up studying the excellent tips and tricks on your website and so then developed a terrible suspicion I had not expressed respect to the website owner for those strategies. These women appeared to be as a result very interested to study all of them and have in effect in truth been loving those things. Appreciation for being very kind and also for having variety of useful tips most people are really desperate to learn about. Our own sincere regret for not expressing gratitude to earlier.
I as well as my friends were checking out the good tips and hints located on your web blog while suddenly developed an awful feeling I had not thanked the web blog owner for those tips. The young men are actually absolutely thrilled to study them and have in effect surely been tapping into them. Thank you for really being very thoughtful and then for pick out these kinds of good resources millions of individuals are really eager to discover. My sincere regret for not expressing gratitude to sooner.
Thanks so much for providing individuals with an extremely remarkable opportunity to discover important secrets from here. It is always very beneficial and as well , stuffed with a good time for me personally and my office friends to visit your website particularly thrice in one week to read the newest secrets you have got. And lastly, I’m so certainly fascinated with all the special opinions you serve. Certain two tips in this post are in reality the simplest we have all ever had.
My wife and i were really more than happy that Albert managed to carry out his researching while using the ideas he grabbed through the site. It is now and again perplexing just to be handing out tricks which often other folks might have been selling. And we all figure out we now have you to thank for that. The type of illustrations you have made, the straightforward blog navigation, the friendships your site give support to foster – it is everything astounding, and it is facilitating our son in addition to us reckon that the issue is amusing, which is certainly really vital. Thanks for all the pieces!
I not to mention my buddies came studying the excellent secrets on the website and then unexpectedly got a terrible suspicion I had not expressed respect to the web blog owner for those techniques. Most of the people became certainly glad to read all of them and have now unquestionably been having fun with these things. We appreciate you being so kind as well as for making a choice on these kinds of important guides millions of individuals are really eager to be aware of. Our own honest regret for not saying thanks to you sooner.
I truly wanted to write down a simple message to be able to say thanks to you for all the remarkable tips and tricks you are writing on this website. My considerable internet search has finally been honored with good strategies to talk about with my partners. I would express that most of us readers are undeniably blessed to be in a perfect place with very many wonderful individuals with helpful tips and hints. I feel rather grateful to have encountered your entire web page and look forward to tons of more excellent moments reading here. Thanks once again for all the details.
I enjoy you because of each of your effort on this site. Debby takes pleasure in participating in investigation and it’s really simple to grasp why. We learn all relating to the dynamic means you offer effective tactics by means of the web site and therefore encourage response from website visitors on this article while my princess has been discovering a whole lot. Take pleasure in the remaining portion of the year. You are always carrying out a great job.
I would like to express my passion for your kindness giving support to men who require help with this important study. Your special commitment to getting the message across had been definitely functional and has continuously made men and women like me to realize their aims. Your amazing important information means a whole lot a person like me and somewhat more to my mates. Best wishes; from everyone of us.
I together with my guys came going through the good ideas located on the blog and then suddenly I got an awful suspicion I never expressed respect to the web blog owner for them. The young boys are actually stimulated to learn them and have very much been having fun with these things. We appreciate you turning out to be quite considerate as well as for making a choice on some helpful subjects millions of individuals are really desperate to understand about. My personal sincere apologies for not expressing gratitude to sooner.
My spouse and i felt very fulfilled when John managed to do his research through the ideas he received through your blog. It’s not at all simplistic to simply happen to be giving away secrets and techniques the others may have been selling. We really already know we have got you to appreciate for that. All the explanations you have made, the easy website navigation, the relationships your site make it easier to engender – it’s mostly impressive, and it’s facilitating our son in addition to our family know that this content is pleasurable, and that is extraordinarily essential. Thanks for the whole lot!
presentation but I in finding this matter to be actually something that I believe I would never understand.
looking forward on your next publish, I will try to get the cling of it!
Thanks a lot for giving everyone such a nice opportunity to check tips from this site. It’s usually very good and as well , packed with a great time for me personally and my office colleagues to search your website particularly 3 times per week to see the new things you have. And definitely, I’m so actually amazed considering the good information you serve. Some two points on this page are in reality the simplest we have ever had.
I enjoy you because of every one of your effort on this web page. Kim really loves managing investigation and it’s really obvious why. We all know all of the compelling way you offer rewarding guidance on this blog and even improve participation from visitors on the matter so our own daughter is without a doubt being taught a lot. Take advantage of the rest of the year. Your doing a fantastic job.
lovers however this post is actually a pleasant article, keep it up.
My wife and i ended up being very lucky when John managed to complete his reports using the ideas he acquired from your very own weblog. It’s not at all simplistic to just continually be handing out steps which some other people could have been selling. And we all acknowledge we have the website owner to thank for that. The specific explanations you’ve made, the simple website navigation, the relationships you will make it possible to instill – it’s got many great, and it is aiding our son in addition to the family consider that this topic is fun, and that is extraordinarily serious. Thanks for the whole thing! | 2019-04-24T06:59:12Z | http://trion-bau.hu/2018/06/29/best-essay-crafting-services-by-the-professionals-buy-essay-now/ |
Although many accounts of the famed Antinium Wars (or the Incursion Wars as they are sometimes referred to) have been written, and countless [Tacticians], [Strategists], and even [Commander] classes have detailed countless analyses of the ensuing battles, no one singular narrative has as of yet been compiled. It is this lowly [Writer]’s hope that this historical patchwork will serve as a first step for future accounts to be compiled.
Many first-hand reports of the First Antinium Wars are based on hearsay and the often inaccurate recollections of [Soldiers] and [Adventurers] who fought on the front lines. While insightful, these testimonials will be omitted so as to provide a retelling based only on written accounts.
With that said, these brief accounts are by no means to serve as a guide to the lifestyle or nature of the Antinium, or even as a guide from which future strategies and tactics may be derived. It is simply history, which must be remembered.
Issrysil has survived two wars with the Antinium and the tenuous peace we have forged has lasted for nearly a decade as of my writing this. But we must never lose our vigilance. For if the Antinium should feel bold enough to begin a third war, I fear that this continent and those within will be swept away by their ceaseless numbers.
It must first be noted that despite the outcome of the First Antinium Wars, the Antinium’s defeat was not so much due to their lackluster performance or any particular strength of opposition. It could be argued that the Antinium made only one real fault during the war, and otherwise fought to the best of their abilities, displaying a level of organization and cunning that eluded the Drake, Gnoll, and Human nations that almost failed to overcome them.
The Antinium underestimated the sea.
The year is 5 B.F., and the world is still reeling from the news thundering out of Rhir. The Blighted King’s armies have been shattered in defeat after defeat, and each of his Walls have been stormed save the final one protecting his capital. Yet, the Demon King has also been pushed to the very brink of his territory, and this new species, dubbed the ‘Antinium’ has suddenly vanished from the continent altogether.
Neither the [Mages] of Wistram nor any other nation can locate the species by spell, and so every country with even a sliver of land exposed to the sea has locked its borders and watches the horizon warily, lest the Black Tide roll across their unguarded lands.
But no attack comes. The oceans are silent, and after several months of waiting, tensions ease. Wherever the Antinium may be, they are not here. And so peace resumes, as news comes that the Blighted King is rebuilding, and his armies already retake his lost kingdom.
That is when the Antinium arrive. Not with a vast army to cover the world, but with only four ships out of the two hundred vessels that launched from Rhir’s shores. Four small vessels that ground themselves on the southwestern most edge of Issrysil in the last month of winter. That is how the Antinium arrive, and they remain hidden for many months. Resting. Regaining strength.
This is how the Antinium lost the war before it began. This is their only folly.
From the few eyewitnesses who spotted the Antinium leaving, or, as it is now believed, retreating from Rhir, we know that over two hundred greatships were spotted, each teeming with Antinium and their precious Queens. This number is not in error; multiple accounts indicate these numbers are genuine.
And yet, only a few ships ever reached Issrysil’s shores. Given that no fleets reported encounters with the Antinium and the lack of any noted sea monsters, it can only be assumed that the Antinium lost nearly all their ships at sea due to storms and becalmed waters.
Fierce warriors though they may be, the Antinium are poor sailors for obvious reasons. Moreover, it can be assumed that they did not fully understand either the length of time it would take to cross such a body of water as the ocean, or the difficulties navigating, staying provisioned, etc. That led to their near complete annihilation, and it is perhaps more accurate to say it was a miracle any ships landed on Issiysil after all.
We may never know if the Queens intended to journey to this continent or not; nor do we know what they did in those few months, although we can speculate that creating a Hive and replenishing their lost Workers and Soldiers was their main focus. The next documented encounter was with the port city of Nasserous, in which the Watch Captain* details several unusual occurrences nearly eight months after the Antinium left Rhir.
*Watch Captains hold a higher position of authority than in Human cities. Among Drakes, the Watch Captain generally shares the same rank as members of a ruling Council and is usually given complete authority in local military matters.
Several days later, Captain I’sl recorded another entry.
The Watch Captain did just that, but neither adventurers nor later patrols would find any signs of these mysterious assailants. It is believed the Antinium left their position on the beach and avoided further contact while they journeyed north, into the rocky highlands. There they continued to hide until a chance encounter some two months later.
“I am writing to you to detail an unusual circumstance which has happened in my guild today. Not an hour ago, a Gold-rank [Ranger] entered my guild bearing four corpses on a litter which caused quite a commotion. He says he found these monsters hunting together on a rocky hillside and they attacked him on sight.
I have inspected the corpses myself, and I must confess, they gave me quite a stir when I saw them. These new monsters are like nothing I have encountered either as an adventurer or Guild Master. They are some kind of insect, with black bodies and tough exoskeleton, and yet have four arms and two legs and apparently walk on two legs like Drakes and Gnolls. Their blood is green, and their eyes are multi-faceted like an insect, and they have wicked mandibles with which they might bite.
Fortunately, Guild Master Jekra was able to connect the bodies of the Antinium with the rumors from Rhir and immediately raised the alarm with each of the Walled Cities, urging immediate action and mobilization of each city-state’s standing armies.
It is here that multiple written accounts of the following events begin, and so the decisions made by the leaders of each Walled City* cannot be cast into doubt. For nearly a month, authorities debated and argued against the presence of the Antinium within Issiysil. Lacking evidence of the Antinium outside of eyewitness accounts (the bodies of the slain Antinium had long since been disposed of by the time others could verify the claim), and due to the lack of any prolonged conflict, the collected authorities failed to take decisive action.
*The famed Walled Cities are not all ruled by the same methods of government. Some espouse an elected official, while others are managed by a body of powerful individuals or, in some cases, a hereditary leader.
A few leaders of Walled Cities posted hefty bounties for Gold-rank adventuring teams to explore the area where the Antinium had been sighted, but again the Antinium preferred to avoid combat where possible, and thus the adventurers returned empty-handed, emboldening the claims that this was merely a false alarm.
On the outskirts of civilization near the mountains and in the highlands, further reports of mysterious monsters and strange people moving about at night continued to appear, in growing numbers and proximity to towns and cities. [Strategists] believe that these were the first scouting groups deployed ahead of the main assault.
However, word of the Antinium’s arrival had been kept to a bare minimum of people, as the leaders of the Walled Cities did not wish to start a panic. Only a few other individuals of note knew of the Antinium’s presence, including the young Lady Magnolia Reinhart, Lord Tyrion Veltras, and General Sserys.
It is unknown how Lady Magnolia and Lord Tyrion learned of the Antinium, but it is speculated that both Humans had access to powerful magic spells which alerted them to this issue. While Lord Tyrion knew of the Antinium, he took the view that any conflict would only weaken both Antinium and the Drake and Gnoll populations, allowing the Human cities to easily crush all sides after the war ended.
By contrast, Lady Magnolia took the news of the Antinium most seriously out of all the three, and immediately began contacting other prominent lords and leaders of the Human city-states. Her actions would later impact the course of the war, but at the time, even the word of a young Reinhart failed to sway all but the most cautious of listeners in the north.
On the other claw, General Sserys of Liscor was imminently poised to deal with the situation when he was alerted to the Antinium, and he took decisive action. This is also the first instance where General Sserys’s personal diary reports meeting the Antinium, on a routine guard mission with the Liscorian Army*. He records an unusual patrol and the losses taken by his men.
*The army of Liscor is renowned as being one of the strongest forces on the continent, and most notably for selling its services to any nation who will hire them. As such, the soldiers and commanders seldom stay near their city and instead fight constantly on battlefields for pay.
“Today marks what would have been an uneventful day in our patrols around the city of Ussls. Our subjugation of the local Goblin Lord’s forces has been bloody and hard-won, but I now believe we have stamped out the last of his Chieftains and scattered the few remaining Goblin tribes to the wind. All things being normal, I would not expect more than a few encounters with local monsters, but one of my patrols has been attacked and now six of my soldiers lie dead after facing some unknown enemy.
To summarize: a patrol of twenty Drakes and Gnolls met with a group of fifteen black individuals in a forest, busy harvesting trees with crude weapons. Upon realizing they had been discovered, this strange group immediately attacked my soldiers before an overture could be had. Before they retreated, they killed six of my soldiers – running into the barrier of spears my soldiers had formed to hack apart the front rank. Thereafter, the black creatures retreated, carrying their dead. The patrol leader declined to give pursuit and immediately reported back to me.
I have sent out three forces of sixty warriors each to work with patrols to locate these creatures again, but they have turned up empty-clawed thus far and I am not confident they will find any trace of them. These creatures seem to disappear easily, and had it not been for this chance encounter our army might have passed them by completely.
I am deeply troubled by this. Equal losses against a numerically inferior foe is not acceptable, given the strength of our soldiers. Moreover, the willingness of these strange enemies to throw themselves on our spears and then their desire to remove their fallen brethren is also concerning.
General Sserys did indeed remain in the area for several days afterwards, and his worries would soon be proven extremely prescient: it was five days after this encounter and nearly six and a half months after the Antinium had landed when fifteen villages and a small town were all destroyed in a single night.
The attacks occurred almost simultaneously, and left no survivors. Merchants, adventurers, and a patrol from one of the Walled Cities found the deserted buildings and raised the alarm. Every settlement within a hundred miles was put on alert, and that allowed several survivors to escape when the next wave of attacks began.
Over thirty small villages were attacked two days after the first attack, and several high-level adventurers and groups of soldiers managed to hold back the Antinium long enough for civilians and Runners to raise the alarm. But when a retaliation force arrived, all the villages were found deserted, and both bodies and Antinium were gone.
However, multiple eyewitness accounts confirmed the worst fears of the Drake leaders. Although magic could not locate their hives, these attacks matched the first ones suffered by the Blighted Kingdom in Rhir, and the previous reports of Antinium sightings only confirmed this fact.
Faced with the inescapable realization that the Antinium had landed on their shores, the leaders of the Walled Cities reluctantly began discussing the formation of a coalition army, although several held out hope that teams of adventurers would be able to root out the Antinium by themselves. The lack of any serious attacks meant that negotiations bogged down until spring of 3 B.F., when the Antinium launched an all-out assault on the cities of Ys, Beresslars, and Washaven.
Every city had been put on alert and soldiers and the local Watch vigilantly manned the walls. However, at this point the Drakes and Gnolls had little experience battling the Antinium and made preparations as if they were in danger from a conventional force, rather than the Antinium’s unique style of tactics.
The Walled Cities nearest to the three cities received a panicked [Message] spell just past dawn, and then nothing. Although a force of riders immediately rode to the aid of the cities, it was too late. The Antinium attacked and withdrew before the cavalry reached the city, and the [Captain] in charge declined to give chase.
In less than two hours, the Antinium managed to kill or maim over 80% of the population in each of the cities. The walls and conventional defenses that make the city-states so difficult to take by conventional siege fell within seconds of the attack.
Recorded testimony by the few survivors reports a horde of black Soldiers and even Workers swarming up the walls, building living ladders and overwhelming the adventurers and City Watch by sheer force of numbers. So fierce was the assault, half of the city’s forces were caught in their beds and slaughtered there.
This was the beginning of the war in earnest. The city-states immediately declared a state of emergency and began raising as many soldiers and warriors as possible. However, each city preferred to raise their own armies and retain former alliances, rather than join together.
This was the second mistake made by the Drakes. Initially, the Antinium war force was outnumbered by the numerous Drake armies on the continent. But the separated armies and reluctance of the cities to work together allowed the Antinium to attack with local superiority and quickly overrun countless cities around their Hives.
While the Drake cities had existed in a state of enduring war and skirmishes with each other, one of the factors that prevented most of the cities from being conquered was the difficulty of taking the city before reinforcements could arrive. Even the largest of forces would take time to breach the walls and other magical defenses that guarded each city, in which time another army would surely launch an attack on the attacking force or their home city.
In this way, a city-state could easily remain autonomous or at the very least, retain much of its independence by forming alliances with nearby settlements and Gnoll Tribes. However, the Antinium’s style of attack was to overwhelm the walls by sheer numbers and relentless speed. Relief armies would find the cities already full of the dead or find the Antinium had already retreated by the time they arrived.
In less than a week, eight cities had fallen and the Drake city-states had realized the magnitude of their error. But while all agreed a coalition army was needed, no city wanted to send their armies past their walls, for fear the Antinium would attack while they were undefended. And while they hesitated, the Antinium swarmed over their walls and slaughtered them regardless.
Only a few armies achieved any success against the Antinium during these initial assaults. A few city-states with superior forces pushed back the Antinium and General Sserys’ army achieved several definite victories before retreating in face of overwhelming numbers.
“…While these ‘Antinium’ do not appear to have any individuals within their ranks with unique Skills, I believe their warriors are the equivalent of any Level 15 [Warrior], and are perhaps even stronger when fighting in tandem.
There are two types of Antinium I have observed: the massive Soldiers and the smaller Workers. Of the two, the Soldiers are vastly more dangerous. They fight hand-to-hand and charge into pikes and magical traps without regard for their lives. They will continue to attack even when mortally wounded, and they are capable of bludgeoning even the most well-armored warrior to death given time.
Their shells are as tough as any leather armor and the Antinium fight and move together like a professional unit. Our army was only able to achieve victory by using our superior vantage point and numerous area of attack spells to decimate their formations. Our elite soldiers carved through many of the Antinium, and it appears the lack of magic and any high-level warriors is their only weakness.
The Antinium have no mages, and their ranged weapons are primitive bows and crude stone arrows. Nevertheless, their numbers and efficiency more than make up for this gap. It seems even the “Worker” class can use a bow to fire arrows, so their ranks of archers are capable to matching even our best divisions in terms of sheer output of missiles.
The most troubling advantage the Antinium had over both Drakes and Gnoll species was their ability to tunnel. Entrenched positions with vulnerable elements such as command headquarters or areas with high concentrations of [Mages] or [Archers] would find themselves under attack by teams of burrowing Soldiers and Workers who would inflict as much damage as possible and then retreat.
These surprise attacks led to a diversification of valuable soldiers, and a standing policy among Drake armies to never have more than one Level 30+ soldier stationed in a squad at one time. This policy is still enforced within all Drake standing armies to this day.
However, even with their mages hidden and protected, there were never enough with levels high enough to turn the tide of battles. The Antinium gladly sacrificed thousands of their Soldiers and Workers to kill even one high-level individual. Slowly, the mercenary armies retreated, forced to abandon their client cities as their forces were gradually worn down.
Sserys made several overtures during this time to local cities, sending requests for their soldiers to join with his to repel the Antinium’s advance, but he was rebuffed and eventually led his soldiers far to the east as cities fell around him. Thanks to his slowing of the Antinium’s advance, several cities evacuated all their civilians and soldiers, but in terms of the overall map of the war, the Antinium were barely slowed as they continued to rampage across Izril.
One month after the start of the First Antinium War, the Antinium paused. It is believed they spent a week replenishing their lost troops and reinforcing their armies, and perhaps, digging and constructing more Hives. No army dared to launch an assault, and the few places where the Antinium had been stopped remained locked in semi-constant combat.
The Black Tide of the Antinium began to march once more, sweeping east, south and north with such ferocious speed that any hope of mobilizing a response force was lost. In an instant, the Antinium had captured nearly thirty percent of the southern half of Issiysil and seemed to be poised to sweep across the rest. However, they met their first obstacle as they encircled and began sieging the Walled City, Zeres.
The Antinium had successfully bypassed four of the Walls built by the Blighted Kingdom in Rhir, but they found the superior construction of the Walled Cities a different challenge*. A huge army began to lay siege to Zeres, but after a week of day-and-night warfare, the Antinium found themselves rebuffed with extreme casualties on their sides and virtually no losses by the defenders.
*The famed Walled Cities bear an entirely different type of fortification than smaller Drake cities. Their origin dates past recorded history, and the magic that allows the three-hundred foot walls to stand hardens the stone and even allows it to repair itself given time. No army has ever taken one of the remaining six Walled Cities by siege, although several coups and betrayals from within have seen the famed cities fall over the millennia.
The living ladders the Antinium used were far too short to reach the battlements of the Walled City, and the defending archers and mages could rain down fire with impunity, as the Antinium found that it was impossible for their arrows to reach the defenders from their superior vantage point.
Indeed, the ground around the Walled Cities was impenetrable by conventional tools or equipment due to the magical enchantments radiating out from the walls. This frustrated the Antinium, and several watchers from the walls observed the Workers digging at the ground until their limbs broke and their digits were bloody and raw.
Zeres stood, and the Antinium were unable to abandon it lest the army fall upon their backs. This, along with the sieges of several other Walled Cites occupied a large part of the Antinium’s army, slowing their advance.
If there was a disadvantage to this situation, it was that while the Antinium took heavy losses in their initial assaults, they quickly retreated out of range and maintained a passive siege, hoping to wear down the Walled Cities’ supplies.
This would take years, given the massive stockpiles each Walled City maintains and their ability to grow produce and even herd animals within their massive confines. But so long as the Antinium maintained their siege the armies of each Walled City were forced to remain behind their walls, leaving the smaller city-states to fend for themselves.
The Antinium legions might have swept across the entire southern half of the continent unchecked, were it not for two groups which threw back their armies in unprecedented defeats.
While the city-states slowly evacuated and fell to the Antinium, another force entered the swamplands and grassy plains belonging to the Gnoll tribes, burning and killing everything in their path. However, the Gnolls of Issiysil built no cities like the Drakes, and unlike their scaly rivals, their opposition to the Antinium was far more successful.
The Gnoll tribes of the plains and swamps reacted to the Antinium threat swifter than any of the factitious Drake city-states, and over a hundred tribes sent their warriors to form a massive army – the same kind that successfully repelled even the greatest vanguards during the wars between Gnolls and Drakes of previous centuries.
In their first major engagement with a vast force of nearly eighty thousand Antinium, an army of twenty thousand Gnolls managed to route the entire force in a bloody battle that lasted only a day. It is suspected that this army was not comprised of normal Gnoll [Hunters] and [Warriors], but rather of elites chosen out of every tribe.
Casualties were high on both sides, but the Antinium army was nearly completely destroyed and a much larger force of over a hundred thousand Gnolls assembled over the course of the next week. This main army, supplemented by several ‘hunting packs’ of tens of thousands of Gnolls, successfully fought off every Antinium advance into Gnoll territory.
The Gnollish resistance likely had much to do with the Antinium’s inability to overwhelm any one front later on in the war. They continued to fight the Gnoll Tribes in increasingly costly battles to both sides, but never penetrated further than fifty miles into the Gnoll heartlands at any time. Nevertheless, the Gnolls never sent any armies out to attack the Antinium in retaliation, preferring instead to guard their scattered tribes and holdings.
Given time, it is possible the Antinium could have taken the Drake settlements and encircled the Gnolls with overwhelming numbers, but their advance east was stopped at the Shivering Falls Pass by the first coalition army formed during the war.
General Sserys had pulled back the Liscorian army far east, looking to rally the cities. Initially he found no help, as the cities distrusted the mercenary nature of his army and feared betrayal. But as it became clear the Drakes would perish alone, more and more soldiers and high-ranking officials began to engage in private communication with Sserys in direct defiance of their city’s governing bodies.
As the sieges of the Walled Cities began, the Black Tide separated and sent a massive force towards the Shivering Falls Pass, one of the strategic locations separating the eastern and western part of the continent. This vanguard army numbered over a hundred thousand, and every city in its path evacuated, fleeing towards the Walled Cities which found themselves swamped by refugees.
Only one [General] refused to retreat. Sserys believed that the loss of Shivering Falls Pass would allow the Antinium to establish a foothold which would be impossible to shift. He instead called every [Commander] leading an army of over a thousand soldiers in the area to join him to defend the pass. The reputation of the Liscorian Army and Sserys’s own high level persuaded countless mercenary groups and smaller armies to accept his gamble and join with his forces which engaged with the Antinium in the center of the pass.
General Sserys’ coalition army met the Antinium in the center of the pass, fighting in the narrow confines of the rocky canyon while the Drake [General] led his soldiers from the front.
He personally led fifteen charges against the Antinium. True to his word, General Sserys refused to retreat. Instead, he set up forward lines in the center of the Antinium formations, pushing their numbers back rather than allowing them to regroup.
His overall strategy consisted of forming heavy ranks of soldiers with defensive classes with [Tacticians] and [Strategists] assigned along each column, using their active abilities to reinforce their position. Archers dueled with Antinium at range and mages blasted the clustered Antinium, who had no way to return that kind of destructive power.
Forewarned by previous battles, Sserys actively collapsed tunnels that appeared behind his lines, but his success was also due to his relentless advance; the Antinium never had time to dig underneath his forces as they overran their formations, much as the Antinium had done so effectively in previous engagements.
Using kill-teams of high-level warriors, Sserys sent them in to devastate Antinium lines and retreat with few or no casualties while lower-level warriors pushed the Antinium further and further back. While each Antinium Soldier was stronger than the average freshly recruited [Soldier], Drakes and Gnolls above Level 20 were able to slay countless Antinium before being forced to retreat.
After nearly two days of continuous fighting, the larger Antinium force retreated with less than a quarter of its original numbers. General Sserys’ forces took very few casualties by comparison; the extensive quantity of healing potions, [Healers], and skills of [Commander] classes combined with rotation of wounded soldiers saved thousands of lives on the battlefield.
This victory was the first major defeat of any Antinium army on the continent. News instantly spread to every city-state and with it, both Drake and Gnoll populaces experienced a surge of morale. The Antinium could be defeated. They could be stopped.
The defeat at Shivering Falls was not a significant one for the Antinium hives in terms of either soldiers or strategic importance, but the loss did surprise the Queens commanding the war. Even in Rhir, Antinium had seldom suffered defeat until their departure, and this decisive loss must have alarmed the Great Queen.
Although several additional armies could have joined up to engage Sserys’ army a second time, the Great Queen declined to do so. Instead, she sent additional armies north to assault Liscor while the rest withdrew to maintain their sieges and hold over claimed territory.
This proved to be an error, as Sserys’ victorious army began attracting support and new recruits on an unprecedented scale. The [General] rallied the east, reaching out towards the two Walled Cities not directly in line of the Antinium’s advance for support. Desperate for a leader capable of defeating the Antinium, they sent all the arms and soldiers they could muster.
Sserys’ communications with the leaders of both cities is largely of a diplomatic nature; his reassurances to both leaders are mainly personal and it is likely he avoided any references to his overall strategy save one exchange. Initial requests from both cities were for Sserys to act defensively and hold off the Antinium advance, rather than move to attack as he wished.
Victory can only be won by meeting the Antinium face on. Cowardice will only doom us faster. We will assault them and rally our kind or die fighting. This is our only chance.
Do not try to dissuade me from this course again. Drakes do not run.
The next day the First Coalition Army of Liscor launched a full-scale counterattack on the Antinium forces laying siege to the Walled Cities.
This is the first part of the May monthly Patreon side story. It’s only ~5,000 words or so due to it being split up into two parts. The second one I’ll post tomorrow.
It’s interesting in several ways. For one thing, this is a different style of writing than I’ve used before, but more importantly, it reveals some interesting information for readers. Patreon people read this a long time ago, but the other readers might look back on certain chapters with new eyes after digesting some details.
Anyways, hope you enjoy, and the next monthly side story should be out on Patreon tomorrow…I hope.
Write down your typos and correct history!
The continent is misspelled sometimes. And in the end the short fom is used, which is no mistake as you have already established, but to me it feels odd that a [historian] would do such an incongruous thing.
He’s low-level and a disgrace to his class. On my list of things to fix!
The problem is that when you decscribe why the Soldiers are more dangerous than the Workers, you mention that they keep attacking no matter how injured they are.
This implies that the Workers don’t act like that, which isn’t true at all. Every Antinium, regardless of their suitability for war, would attack their enemies, no matter in which state they are.
So, I would add that characteristic of the Antinium when you keep speaking of them in general and not referring to specific castes.
One more thing, how did he even come up with the name “Worker”?
Shouldn’t he view BOTH of them as Soldiers/Warriors, as both of thme were fighting and not just one of them, and that one group is superior than the other one.
It was just mentioned that the Workers were using weapons, but that doesn’t even mean that they were the ones who built them. Only ONE time was it mentioned that they built something (“..Workers swarming up the walls, building living ladders …”), but that hardly outweights the times when they were seen fighting.
So, in my opinion, IF you plan to revise this side story at one point, you shouldn’t use the word Workers, at least not when mentioned by people who have no knowledge regarding the caste system of the Antinium; when it is done by the narrator than it can stand.
I think ‘the city’ should be ‘them’.
To be more specific, hearsay and inaccurate recollections are different categories. Hearsay is distinctly 2nd hand.
You certainly hit the tone perfectly. I’m not a massive fan of historical texts (boo, GCSE History memories) but this remained fairly engaging nonetheless.
Question for the author: as you haven’t commented on the map posted a while ago on the main page I’m wondering which level of accuracy it provides in your opinion? Because I use it as reference since discovering it a few days ago and it gives me a certain amount of enjoyment.
And a funny thought: as I embarked on this journey here, I couldn’t get enough of the story, and fast. Nowadays I’m more content to wait for another chapter. But it is not because I’m getting bored, but on the contrary, the story is so rich that I’m spending the time inbetween thinking about it and trying to sort all the details, and emotional turmoil that it provokes, out.
Oh–I think I did respond to the commenters, just in a post in one of the chapters. In terms of accuracy, it gets some things right like where Liscor and the mountains are in proportion to the rest of the continent and in others, not so much.
For instance, the walled cities number six, and they’re spread out all over the southern half of the continent. Not the artist’s fault; it hadn’t been revealed yet in the story.
Like I said, that’s one of the things to do on my list, and I’m actually debating putting it up instead of a side story. Semi-detailed maps, but I’m just not sure if I can do them justice.
Furthermore, the location of both the new and old locations of Erin’s inn are unknown, as the direction/distance from liscor varies from chapter to chapter (truly a wandering inn, eh) – for example, when they rebuild the inn in a new location, they state that it is roughly twenty minutes walking distance from the inn, however in a recent chapter it was said to be only ten minutes away.
Also, the Blood Fields, while hinted to be near both the High Passes and the Floodplains, are probably not *that* big – In hindsight, I suspect (although no textual evidence) that the passes are diamond-ish shaped – starting from a very similar point, seperating, and later meeting at two very close areas.
Unfortunately I am not pirateaba so everything I know is guesswork from what is repeated often in the text.
I’m pirateaba, and all I know is guesswork from what is repeated often in the text. A map is on my list, I swear! Just…ah, I’m out of excuses.
But to pirateabas defends, it happened before she came up with the names of the continents. So, it’s not that she used Izril earlier and then screwed up.
So again, it depends on who said it, if they were mentioned by the same person, then it’s lkely pirates mistake.
I believe you mean “rout”.
So info-dumpy… hard to read.
That led to their near complete annihilation, and it is perhaps more accurate to say it was a miracle any ships landed on *Issiysil after all.
For nearly a month, authorities debated and argued against the presence of the Antinium within *Issiysil.
In an instant, the Antinium had captured nearly thirty percent of the southern half of *Issiysil and seemed to be poised to sweep across the rest.
However, the Gnolls of *Issiysil built no cities like the Drakes, and unlike their scaly rivals, their opposition to the Antinium was far more successful. | 2019-04-19T06:51:34Z | https://wanderinginn.com/2017/05/28/s02-the-antinium-wars-pt-1/ |
A new oil refinery zone is to be built in Magwe Division, a regional government minister announced this week.
The decision to establish an oil refinery zone was made after a series of seizures of illegal refineries across the region, Minister for Natural Resources, Forestry, Electricity and Energy for the Magwe Division, Myint Zaw, told DVB on Monday.
“We decided to allow the running of medium to small oil refineries that produce good quality fuel oil for vehicles after negotiating with the Union government,” he said.
On August 17, 18 and 19, illegal oil refineries in Pauk Township in Pakokku District were confiscated.
Regional police seized 78 oil refineries in three days, and confiscated 2,805 gallons of crude oil and 1,270 gallons of diesel, said Major Soe Win, the Magwe district police force chief.
Although there are two licensed oil fields in Myaing Township and Pauk Township, Pakokku District, Magwe Region no oil refining process has been permitted until now.
“The Union government has informed us that we can grant permits to operate oil refineries in Magwe Division and the regional government will allow to establish oil refinery zone in Pakokku Township,” the minister said.
“The minimum quality of diesel and petrol oil from the legalized refineries shall be the same as the product from Man Than Pa Yar Kan refinery in Minhla Township. We will also negotiate with the Ministry of Electricity and Energy for the volume of the daily output,” he added.
The regional government will provide the oil refinery zone to access to water and electricity.
The tender bid is to be placed in the state-run newspapers in the near future.
Thanks very handy. Will certainly share site with my friends.
You have got incredible information on this website.
I delight in the info on your internet site. Regards!
Howdy, very good site you have going here.
Incredibly individual pleasant website. Huge information available on couple of clicks on.
I treasure the details on your internet site. Thank you!
Wonderful webpage you’ve got going here.
I precisely needed to appreciate you yet again. I do not know the things that I could possibly have carried out without those advice provided by you concerning this problem. It previously was an absolute hard difficulty for me, nevertheless spending time with your specialised avenue you resolved the issue made me to jump over joy. I am just happier for the support and thus have high hopes you find out what a great job you happen to be accomplishing teaching the others by way of a web site. Probably you haven’t come across any of us.
Thanks for all your hard work on this web site. Ellie really loves engaging in investigations and it’s really easy to see why. My spouse and i know all of the compelling manner you offer informative things on the web site and as well encourage participation from other people on this article and my princess is really understanding so much. Have fun with the rest of the new year. You’re the one doing a useful job.
Terrific web page you’ve got in here.
Thanks so much for providing individuals with a very special chance to read from this site. It can be so cool and full of amusement for me personally and my office peers to visit the blog minimum three times in one week to learn the fresh things you have got. Not to mention, I am just certainly impressed with the breathtaking ideas you serve. Selected 1 facts in this post are really the most impressive we have all had.
My wife and i have been now more than happy that Louis managed to finish off his inquiry from the ideas he grabbed through your web pages. It’s not at all simplistic to simply happen to be freely giving thoughts which many people have been making money from. We really discover we’ve got the blog owner to thank for that. Most of the illustrations you made, the straightforward website menu, the relationships your site assist to promote – it’s got mostly extraordinary, and it’s leading our son and us believe that this concept is pleasurable, and that’s especially pressing. Many thanks for the whole lot!
I needed to put you one bit of word to help say thanks a lot again for those wonderful tips you’ve documented in this article. It’s really seriously generous with people like you to grant without restraint all that most people would have made available as an ebook to make some money for their own end, primarily since you could possibly have tried it if you decided. These solutions additionally acted like a great way to understand that most people have the same passion similar to my own to learn significantly more on the topic of this problem. I know there are numerous more pleasant sessions ahead for folks who examine your website.
I wanted to draft you the bit of word to finally give thanks as before on the magnificent things you’ve contributed at this time. It’s pretty generous of people like you to convey easily precisely what many people could possibly have distributed as an e book to make some dough for themselves, precisely considering that you might have done it if you ever decided. Those tactics in addition worked to be a easy way to comprehend the rest have a similar passion like my personal own to realize very much more in terms of this problem. I think there are lots of more pleasant situations in the future for folks who go through your blog post.
If you desire to increase your familiarity just keep visiting this website and be updated with the latest news update posted here.
I would like to show some appreciation to the writer for bailing me out of this dilemma. Just after searching through the internet and meeting things which were not pleasant, I was thinking my life was gone. Being alive devoid of the answers to the difficulties you’ve resolved through this site is a critical case, as well as those which might have adversely affected my career if I hadn’t encountered the website. Your own capability and kindness in playing with a lot of things was valuable. I’m not sure what I would have done if I had not discovered such a step like this. I can at this moment look forward to my future. Thank you so much for the high quality and results-oriented guide. I will not think twice to endorse your web site to anyone who should receive counselling on this subject.
I enjoy you because of all of your efforts on this web site. My mom really likes working on investigations and it’s easy to see why. Most of us know all of the dynamic means you present useful solutions through this web site and attract response from visitors about this matter while our own simple princess has always been learning a lot of things. Enjoy the rest of the new year. You are performing a dazzling job.
I enjoy you because of your entire efforts on this website. Gloria loves working on research and it’s easy to understand why. All of us know all relating to the powerful way you convey efficient suggestions through this web site and as well recommend participation from visitors on that issue while our favorite simple princess is becoming educated a lot. Take pleasure in the rest of the new year. You’re the one performing a really great job.
Thanks for all your valuable labor on this web site. My niece enjoys going through research and it is simple to grasp why. My spouse and i know all about the dynamic ways you produce very helpful guidelines via this website and increase response from other ones about this idea plus our girl is now understanding a whole lot. Enjoy the remaining portion of the year. You are always conducting a really great job.
I definitely wanted to send a message to appreciate you for all the superb items you are giving out at this site. My extended internet lookup has at the end been rewarded with reputable tips to go over with my classmates and friends. I ‘d assume that most of us website visitors actually are undeniably lucky to dwell in a very good community with many marvellous people with insightful techniques. I feel rather happy to have come across your site and look forward to really more cool moments reading here. Thanks a lot once again for a lot of things.
I enjoy you because of your own efforts on this web page. My mum enjoys making time for investigation and it is easy to see why. My spouse and i hear all about the powerful way you produce great techniques on your blog and therefore increase participation from the others on this area of interest then my girl is without question discovering a whole lot. Take advantage of the remaining portion of the year. You are performing a really great job.
A lot of thanks for your whole labor on this web page. Kate delights in doing internet research and it is obvious why. Many of us notice all concerning the lively form you provide worthwhile items by means of the website and therefore invigorate contribution from people on the area plus our favorite child is now understanding a lot of things. Enjoy the rest of the year. Your carrying out a pretty cool job.
I wanted to post a brief comment to be able to thank you for these precious secrets you are writing on this site. My incredibly long internet lookup has now been compensated with beneficial know-how to share with my colleagues. I would claim that we site visitors actually are unquestionably endowed to exist in a good community with many awesome professionals with great opinions. I feel very much privileged to have used the webpage and look forward to plenty of more cool moments reading here. Thanks a lot once more for a lot of things.
Hi, i feel that i saw you visited my site thus i got here to return the want?.I am trying to to find things to improve my web site!I guess its ok to use a few of your ideas!!
I as well as my pals were digesting the best thoughts on your web page and so all of the sudden came up with a terrible suspicion I never expressed respect to the web blog owner for those techniques. My boys are already as a consequence thrilled to study all of them and already have undoubtedly been taking pleasure in them. Many thanks for turning out to be well considerate and for utilizing this form of awesome useful guides millions of individuals are really eager to know about. Our honest apologies for not expressing gratitude to earlier.
I would like to get across my respect for your kindness giving support to persons who absolutely need assistance with this idea. Your personal dedication to getting the message around became remarkably significant and have specifically empowered workers just like me to attain their endeavors. Your amazing informative tutorial signifies much a person like me and additionally to my fellow workers. Thank you; from each one of us.
I simply had to thank you so much once more. I’m not certain the things that I might have gone through without these recommendations shared by you over such theme. This was a alarming crisis in my position, but viewing this well-written manner you solved that took me to weep with happiness. Extremely thankful for the support and in addition expect you comprehend what a powerful job your are putting in instructing the rest thru your web page. Most likely you have never met all of us.
I precisely had to thank you very much once again. I do not know the things I would have created in the absence of the tricks shared by you over that situation. It previously was a frustrating difficulty in my opinion, but observing this skilled way you treated it made me to cry over contentment. I am just happier for this help and thus believe you realize what an amazing job your are doing training many people using your site. I’m certain you haven’t come across any of us.
I precisely had to say thanks once more. I’m not certain what I would’ve done without the ways revealed by you on that situation. It actually was a very traumatic problem in my circumstances, however , taking note of this skilled mode you treated that took me to leap for gladness. Extremely happy for your advice and hope that you are aware of a powerful job you are undertaking instructing others using your blog post. I am certain you haven’t met any of us.
I in addition to my buddies came analyzing the excellent helpful tips on your web page then unexpectedly developed a terrible suspicion I had not thanked you for those strategies. My ladies were for that reason warmed to study all of them and have in effect undoubtedly been tapping into them. I appreciate you for truly being well accommodating and also for settling on this kind of impressive ideas millions of individuals are really desirous to understand about. Our sincere apologies for not saying thanks to sooner.
I wish to point out my respect for your generosity giving support to visitors who really want assistance with your idea. Your personal dedication to passing the message all-around appeared to be really insightful and have truly helped girls just like me to achieve their desired goals. Your new valuable tips and hints indicates much to me and still more to my peers. Thank you; from all of us.
These are in fact great ideas in on the topic of blogging. You have touched some good things here. Any way keep up wrinting.
Thanks a lot for providing individuals with such a wonderful opportunity to read articles and blog posts from this web site. It really is so terrific and also stuffed with a great time for me personally and my office fellow workers to search your blog at a minimum 3 times in one week to read through the latest secrets you will have. And of course, I’m so at all times satisfied with all the excellent hints you give. Certain two areas in this posting are certainly the simplest I’ve had.
I would like to show appreciation to you for rescuing me from this circumstance. As a result of checking throughout the world-wide-web and obtaining recommendations that were not helpful, I thought my entire life was well over. Living devoid of the solutions to the difficulties you have sorted out by means of your review is a crucial case, as well as the kind that would have badly damaged my career if I had not encountered your blog. Your own personal know-how and kindness in playing with a lot of stuff was priceless. I don’t know what I would have done if I had not discovered such a thing like this. I can now look ahead to my future. Thanks so much for the high quality and effective help. I will not think twice to recommend your web site to anybody who requires assistance on this matter.
I’m just commenting to let you know what a awesome encounter our princess enjoyed viewing your web page. She realized a wide variety of pieces, including what it’s like to possess an ideal teaching mindset to have many more just know precisely various extremely tough matters. You undoubtedly exceeded our own expected results. Thank you for showing these essential, trusted, educational and in addition fun guidance on your topic to Kate.
I happen to be commenting to make you know what a excellent encounter my cousin’s girl developed studying the blog. She discovered so many pieces, which included how it is like to possess an awesome coaching style to have certain people without problems learn about specified extremely tough issues. You undoubtedly exceeded our own expectations. Thanks for producing those informative, healthy, revealing not to mention fun tips about your topic to Tanya.
Greetings! Very helpful advice within this article! It is the little changes that will make the most important changes. Many thanks for sharing!
I intended to send you that very small observation so as to say thanks a lot yet again on your great views you have shared here. It’s tremendously generous of you to allow without restraint what most of us would’ve made available for an ebook in order to make some dough for their own end, especially since you might have tried it if you considered necessary. Those smart ideas in addition worked as the good way to recognize that many people have the identical fervor similar to my personal own to realize lots more concerning this matter. I am certain there are millions of more pleasurable occasions in the future for folks who read your blog post.
Hello! I’ve been reading your web site for a while now and finally got the bravery to go ahead and give you a shout out from Humble Tx! Just wanted to say keep up the fantastic work!
I am writing to let you know what a fabulous discovery my cousin’s daughter developed going through your site. She picked up numerous details, not to mention how it is like to have an excellent helping spirit to have most people smoothly have an understanding of chosen problematic things. You actually surpassed her desires. I appreciate you for showing the beneficial, trustworthy, revealing and fun tips on your topic to Sandra.
We are a bunch of volunteers and starting a brand new scheme in our community. Your site offered us with useful information to paintings on. You have performed a formidable task and our whole group shall be thankful to you.
Great post. I was checking constantly this blog and I am impressed! Extremely helpful info specifically the last part 🙂 I care for such info much. I was seeking this certain info for a long time. Thank you and best of luck.
It is the best time to make some plans for the future and it’s time to be happy. I’ve read this post and if I could I desire to suggest you some interesting things or suggestions. Maybe you can write next articles referring to this article. I wish to read even more things about it!
Deference to website author, some great selective information.
I really like your writing style, good info, thanks for posting :D. “God save me from my friends. I can protect myself from my enemies.” by Claude Louis Hector de Villars.
Good – I should definitely pronounce, impressed with your web site. I had no trouble navigating through all the tabs as well as related info ended up being truly simple to do to access. I recently found what I hoped for before you know it at all. Reasonably unusual. Is likely to appreciate it for those who add forums or something, web site theme . a tones way for your customer to communicate. Nice task.
Hi there, You have performed a great job. I’ll definitely digg it and in my view recommend to my friends. I’m confident they’ll be benefited from this web site.
Do you have a spam problem on this blog; I also am a blogger, and I was curious about your situation; many of us have created some nice practices and we are looking to swap techniques with other folks, please shoot me an e-mail if interested.
I’ve been browsing online more than three hours as of late, but I by no means found any fascinating article like yours. It’s pretty price enough for me. In my opinion, if all web owners and bloggers made excellent content as you probably did, the internet will be a lot more helpful than ever before.
F*ckin¦ remarkable things here. I¦m very satisfied to see your article. Thanks a lot and i’m having a look ahead to touch you. Will you please drop me a e-mail?
Thanks for some other informative website. The place else may just I am getting that type of info written in such a perfect approach? I’ve a challenge that I am simply now running on, and I’ve been at the look out for such information.
I’m impressed, I have to say. Really rarely do I encounter a blog that’s both educative and entertaining, and let me tell you, you might have hit the nail on the head. Your concept is excellent; the difficulty is something that not sufficient individuals are talking intelligently about. I am very glad that I stumbled across this in my seek for something regarding this.
Great website you have here but I was wanting to know if you knew of any community forums that cover the same topics talked about here? I’d really like to be a part of community where I can get advice from other knowledgeable individuals that share the same interest. If you have any suggestions, please let me know. Thanks a lot!
I think other website owners should take this site as an example , very clean and superb user friendly style.
I like this website very much, Its a very nice billet to read and receive information. “I have found that if you love life, life will love you back.” by Arthur Rubinstein.
Really Appreciate this article, can you make it so I receive an email whenever you publish a fresh post?
I do trust all the ideas you have offered in your post. They are really convincing and will definitely work. Nonetheless, the posts are too short for starters. Could you please lengthen them a little from subsequent time? Thanks for the post.
Really Appreciate this article, is there any way I can get an email sent to me whenever you write a fresh update?
There is noticeably a lot to know about this. I suppose you made certain good points in features also.
Outstanding post, I conceive blog owners should acquire a lot from this web site its very user friendly.
I am glad to be a visitor of this gross weblog! , regards for this rare information! .
Throughout this great design of things you’ll secure a B+ with regard to effort. Exactly where you actually confused everybody ended up being in the specifics. You know, people say, details make or break the argument.. And that could not be much more accurate at this point. Having said that, permit me tell you what exactly did give good results. The writing is actually rather convincing and this is probably the reason why I am making an effort to opine. I do not make it a regular habit of doing that. Secondly, although I can easily see the leaps in logic you come up with, I am definitely not convinced of just how you appear to connect the ideas which produce the final result. For now I shall yield to your point but trust in the future you actually connect the facts better.
Thank you for some other fantastic article. Where else may just anybody get that type of info in such a perfect means of writing? I have a presentation next week, and I’m at the search for such info.
We absolutely love your blog and find almost all of your post’s to be exactly what I’m looking for. can you offer guest writers to write content for yourself? I wouldn’t mind composing a post or elaborating on a lot of the subjects you write about here. Again, awesome web site!
Very great post. I just stumbled upon your blog and wanted to mention that I’ve really loved surfing around your blog posts. After all I’ll be subscribing for your feed and I hope you write again soon!
Whats up very cool website!! Guy .. Beautiful .. Wonderful .. I’ll bookmark your web site and take the feeds additionally…I’m happy to seek out numerous useful info right here within the put up, we’d like develop extra strategies in this regard, thanks for sharing.
I like this web blog very much, Its a very nice billet to read and receive info . “A little in one’s own pocket is better than much in another man’s purse.” by Miguel de Cervantes.
I like this website very much, Its a real nice berth to read and obtain info . “Never hold discussions with the monkey when the organ grinder is in the room.” by Sir Winston Churchill.
It?¦s really a nice and useful piece of info. I?¦m glad that you shared this helpful info with us. Please keep us up to date like this. Thank you for sharing.
Hi, Neat post. There’s a problem with your web site in internet explorer, might test this?K IE still is the marketplace leader and a big part of folks will omit your magnificent writing due to this problem.
It’s a shame you don’t have a donate button! I’d definitely donate to this fantastic blog! I suppose for now i’ll settle for book-marking and adding your RSS feed to my Google account. I look forward to brand new updates and will talk about this website with my Facebook group. Chat soon!
Great write-up, I?¦m regular visitor of one?¦s site, maintain up the excellent operate, and It’s going to be a regular visitor for a long time.
I went over this site and I conceive you have a lot of good info , bookmarked (:.
You made some respectable points there. I seemed on the web for the problem and located most people will go along with together with your website.
Magnificent web site. Plenty of helpful information here. I¦m sending it to a few pals ans also sharing in delicious. And naturally, thanks in your sweat!
Does your blog have a contact page? I’m having a tough time locating it but, I’d like to send you an email. I’ve got some creative ideas for your blog you might be interested in hearing. Either way, great blog and I look forward to seeing it improve over time.
Great amazing things here. I?¦m very satisfied to peer your article. Thanks a lot and i’m taking a look forward to contact you. Will you please drop me a mail?
Hi there, You have done an incredible job. I will definitely digg it and in my opinion recommend to my friends. I’m confident they will be benefited from this web site.
A formidable share, I simply given this onto a colleague who was doing a bit of analysis on this. And he in truth purchased me breakfast because I found it for him.. smile. So let me reword that: Thnx for the deal with! However yeah Thnkx for spending the time to debate this, I really feel strongly about it and love reading extra on this topic. If doable, as you grow to be experience, would you thoughts updating your weblog with extra details? It’s extremely helpful for me. Massive thumb up for this weblog submit!
lewiwauv,Hi there, just wanted to say, I liked this article. It was helpful. Keep on posting!
I will immediately grab your rss as I can not in finding your email subscription hyperlink or newsletter service. Do you’ve any? Kindly let me know so that I may just subscribe. Thanks.
I was looking through some of your content on this website and I believe this site is very informative ! Keep putting up.
Hey there this is kind of of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding skills so I wanted to get guidance from someone with experience. Any help would be enormously appreciated!
rprjcidgji,If you are going for best contents like I do, just go to see this web page daily because it offers quality contents, thanks!
I truly enjoy looking at on this site, it holds great posts. “Don’t put too fine a point to your wit for fear it should get blunted.” by Miguel de Cervantes.
Good way of telling, and nice article to take data concerning my presentation topic, which i am going to convey in academy.
my permission. Do you know any techniques to help prevent content from being ripped off?
brtuuzifdwv,Some really nice stuff on this website, I enjoy it.
useful sites on the internet. I most certainly will recommend this site!
Hi there, You’ve done an incredible job. I’ll definitely digg it and in my opinion suggest to my friends.
fknjbb,Hi there, just wanted to say, I liked this article. It was helpful. Keep on posting!
It’s in point of fact a great and useful piece of info. I am satisfied that you shared this helpful information with us. Please keep us up to date like this. Thank you for sharing.
In the great scheme of things you actually secure a B+ just for hard work. Where exactly you confused me was first on the facts. As it is said, the devil is in the details… And that could not be more correct right here. Having said that, let me tell you what did work. Your article (parts of it) is definitely incredibly persuasive and this is probably the reason why I am making the effort to opine. I do not make it a regular habit of doing that. Next, even though I can easily see a jumps in reason you come up with, I am not sure of just how you appear to connect your ideas which inturn produce your conclusion. For the moment I will subscribe to your position but wish in the near future you connect your facts much better.
Sweet web site, super layout, real clean and employ friendly.
I am really inspired with your writing talents as smartly as with the structure in your weblog. Is this a paid theme or did you modify it yourself? Either way keep up the excellent high quality writing, it is uncommon to peer a nice weblog like this one nowadays..
I think other website proprietors should take this internet site as an model, very clean and excellent user pleasant layout.
I would like to show some appreciation to this writer for bailing me out of this particular challenge. As a result of scouting throughout the the net and finding techniques which are not beneficial, I assumed my life was gone. Existing minus the approaches to the issues you’ve resolved by way of this report is a serious case, as well as those which might have badly affected my career if I hadn’t noticed the website. Your own ability and kindness in controlling the whole lot was tremendous. I don’t know what I would have done if I hadn’t come upon such a point like this. It’s possible to at this point look forward to my future. Thank you very much for your reliable and effective help. I won’t be reluctant to suggest your web site to any person who ought to have support on this situation.
angles. Its like women and men aren’t fascinated until it is something to do with Woman gaga!
It’s awesome in favor of me to have a web page, which is beneficial in support of my knowledge.
I as well as my friends came checking the best information and facts found on your site and then all of the sudden developed a horrible suspicion I had not expressed respect to the site owner for those tips. Most of the boys were joyful to study all of them and already have honestly been loving them. I appreciate you for truly being simply helpful and for having some incredibly good subjects millions of individuals are really needing to be informed on. Our own honest regret for not expressing gratitude to you sooner.
I as well as my buddies were found to be studying the nice pointers found on your website and so suddenly I got a terrible suspicion I never expressed respect to you for those techniques. These ladies had been so thrilled to read them and now have pretty much been making the most of these things. I appreciate you for genuinely quite considerate and for opting for this sort of important tips millions of individuals are really needing to understand about. Our honest regret for not expressing gratitude to sooner.
Someone essentially help to make seriously posts I would state. This is the first time I frequented your website page and thus far? I surprised with the research you made to make this particular publish amazing. Fantastic job!
With havin so much written content do you ever run into any issues of plagorism or copyright violation? My blog has a lot of unique content I’ve either written myself or outsourced but it looks like a lot of it is popping it up all over the web without my authorization. Do you know any methods to help reduce content from being ripped off? I’d certainly appreciate it.
Greetings from Los angeles! I’m bored to death at work so I decided to check out your blog on my iphone during lunch break. I really like the info you provide here and can’t wait to take a look when I get home. I’m amazed at how quick your blog loaded on my phone .. I’m not even using WIFI, just 3G .. Anyways, excellent blog!
You really make it appear really easy with your presentation but I find this matter to be actually one thing that I believe I’d never understand. It seems too complicated and extremely wide for me. I am having a look forward for your next put up, I will try to get the grasp of it!
Very informative and fantastic bodily structure of subject material, now that’s user pleasant (:.
Thanks for all your valuable effort on this web site. Ellie really loves conducting internet research and it’s obvious why. A lot of people know all about the lively form you give effective tips on the web site and therefore welcome response from some other people about this content while our favorite child is without a doubt being taught a lot of things. Take pleasure in the rest of the new year. Your doing a dazzling job.
I have recently started a web site, the information you offer on this web site has helped me greatly. Thank you for all of your time & work. “There can be no real freedom without the freedom to fail.” by Erich Fromm.
and also added in your RSS feeds, so when I have time I will be back to read more, Please do keep up the fantastic b.
I want looking at and I think this website got some really utilitarian stuff on it! .
Thank you for sharing excellent informations. Your website is very cool. I’m impressed by the details that you’ve on this site. It reveals how nicely you perceive this subject. Bookmarked this website page, will come back for more articles. You, my pal, ROCK! I found simply the information I already searched everywhere and just could not come across. What a perfect web site.
Howdy! I could have sworn I’ve been to this blog before but after reading through some of the post I realized it’s new to me. Anyhow, I’m definitely happy I found it and I’ll be book-marking and checking back often!
I believe this site has some real superb information for everyone :D. “I like work it fascinates me. I can sit and look at it for hours.” by Jerome K. Jerome.
What’s up, just wanted to say, I enjoyed this blog post. It was funny.
as I provide credit and sources back to your weblog? My blog site is in the exact same niche as yours and my users would certainly benefit from some of the information you present here.
xeqvgobbgs,Hi there, just wanted to say, I liked this article. It was helpful. Keep on posting!
Have you ever considered writing an ebook or guest authoring on other sites? I have a blog based upon on the same ideas you discuss and would really like to have you share some stories/information. I know my visitors would enjoy your work. If you are even remotely interested, feel free to shoot me an email.
hi!,I like your writing very much! proportion we keep in touch more about your post on AOL?
revisiting. I wonder how so much attempt you put to make this sort of wonderful informative site.
your publish is simply nice and that i could suppose you are a professional on this subject.
Thank you for sharing superb informations. Your website is so cool. I am impressed by the details that you have on this site. It reveals how nicely you perceive this subject. Bookmarked this website page, will come back for extra articles. You, my friend, ROCK! I found just the information I already searched everywhere and simply couldn’t come across. What a great web site.
Thanks for the marvelous posting! I definitely enjoyed reading it, you might be a great author.I will ensure that I bookmark your blog and will often come back at some point. I want to encourage that you continue your great writing, have a nice morning!
Nice read, I just passed this onto a friend who was doing some research on that. And he just bought me lunch because I found it for him smile Thus let me rephrase that: Thanks for lunch! “Do you want my one-word secret of happiness–it’s growth–mental, financial, you name it.” by Harold S. Geneen.
I really like looking at and I conceive this website got some truly useful stuff on it! .
I’ve read several excellent stuff here. Certainly value bookmarking for revisiting. I surprise how so much effort you put to make one of these great informative site.
However, think about this, what if you were to write a awesome headline?
except it’s one thing to accomplish with Woman gaga!
Thankfulness to my father who stated to me about this webpage, this blog is in fact remarkable.
I am getting experience daily by reading thes nice content.
encourage yourself to continue your great writing, have a nice weekend!
and effort to put this information together. I once again find myself personally spending a significant amount of time both reading and posting comments.
Hello there! I simply want to give you a big thumbs up for the excellent info you have got here on this post. | 2019-04-26T06:14:09Z | http://dvb.com.mm/news/oil-refinery-zone-to-be-permitted-in-magwe-division/81320 |
Here's a wrap-up for the past week.
2. I also had lengthy negotiations with an author and her publicists re a book giveaway of the cookbook, Simply Quince by Barbara Gazarian. The cookbook is the first of its kind to focus on the fruit, quince, and its many uses in jams, jellies, desserts, and meat recipes.
Look for the giveaway which will be posted along with an interview with the author early this week. The author wanted to include a jar of her artisan quince jam along with the giveaway, but we decided on two books only. The interview will have details on where to buy her quince products.
3. Getting over a cold, but still had time for a quick visit to the library, where I borrowed Christopher G. Moore's Paying Back Jack, a thriller set in Bangkok.
4. Also speed read yesterday another library loan, The Cellist of Sarajevo by Stephen Galloway, a book I would recommend for its writing and its moving story of people under the strain of the war in Bosnia.
5. I was disappointed that my review post of Denise's Daily Dozen: Lose up to 12 Pounds in 2 Weeks didn't get viewers! It's an excellent and easy book to follow - exercises, eating tips, and recipes. Hope you check it out!
6. The Japanese Literature Challenge 3 ended yesterday. It has 241 book reviews posted by many, many different reviewers! I have 2 more books I started and will enter as a carry over to the next challenge, which will begin early summer.
7. Last day to enter a giveaway of a signed copy of The Last Surgeon, a medical thriller by Michael Palmer. Click on the book title to enter. Good luck!
A news article printed yesterday by Reuters says what most of us readers, writers, and book bloggers can agree with.
NEW YORK (Reuters Life!) – During tough economic times when U.S. consumers are trying to cut back, the indulgence they can't seem to live without is books.
Three-quarters of adults questioned in an online poll said they would sacrifice holidays, dining out, going to the movies and even shopping sprees but they could not resist buying books.
Dining out came in a far second with only 11 percent of Americans naming it their top indulgence, followed by shopping at 7 percent, vacations at four and movies, which was chosen by only 3 percent of Americans.
"The recession highlighted the downside of greed, indulgence and giving in to temptation, but we noticed a shift back to life's simplest pleasures," said Michelle Renaud, a senior manager at Harlequin Enterprises Limited, which conducted the poll.
Okay, so the poll was done by a book publisher, Harlequin Enterprises Limited, but it still has to be done scientifically and presumably accurately for it to make the news.
Biochemists and epidemiologists, those who study diseases, and those concerned about climate change in the Arctic, would love this thriller. I liked it too though I have only a general knowledge of biology. It was a happy find during my stroll through a recent bookstore sale.
Summary: There is something out in the Arctic that killed 3 scientists doing research in that hostile and freezing environment. There are scientists from several countries working on projects in the Trudeau Research Station, built on land that is part of Canada.
Jessica has to deal with her complex investigations and more victims while making time for her personal life - keeping email contact with her young son back in the U.S. and being involved in a new and surprising love affair at Trudeau Station.
Comments: Throw in post-Cold War politics, global warming effects on Arctic fauna and flora, Inuit and Aleut native cultures, submarine lore, and you have a mix that makes this thriller fascinating as well as informative.
Definitely a 5 star novel. The Trudeau Vector: A Novel is published by Viking Books.
The little Chihuahua, Humberto, walked past Dino.
"Hey, Mr. Private Eye. How are you doing?"
Publisher''s description: "an alternate-reality version of New York City, in which talking dogs interact regularly with humans. The hero, Dino Vicelli, is a private investigator who just happens to be a sharply dressed Italian greyhound with a great fondness for cigars. He takes on what initially appears to be a routine missing person case but soon finds himself in the midst of a sinister plot that involves kidnapping, murder, and bizarre scientific experiments aimed at controlling the world. As he investigates this strange case, Dino repeatedly encounters mortal danger, while also finding romance with a beautiful blonde Afghan dog."
I've read mysteries featuring dogs and even talking cats, but this is my first mystery read with talking dogs! A little unusual yes, but the author Lori Weiner owns an Italian greyhound, Dino, who is the inspiration for the hero of her book.
Dino may be a greyhound but he talks, walks, dresses, and acts human. He has no doggie traits, so this is definitely not a "pet mystery."
I'm disappointed that Dino doesn't chase criminals on four feet as a greyhound might. He really is a human PI in disguise!
The book was published by Dorrance Publishing Co., Inc., 2009. Paperback, 91 pages. Author Lori Weiner lives in Rancho Mirage, California, and is interested in show dogs. She owns an Italian greyhound named Dino.
Thanks to Carol Fass Publicity for a review copy of the book.
Things come in simple 12's in Denise's Daily Dozen: The Easy, Every Day Program to Lose Up to 12 Pounds in 2 Weeks.
I liked the simplicity of this exercise and diet book by Denise Austin. I found it easy to follow and the exercises basic enough for me to remember and try!
2. A daily eating plan which I found useful and uncomplicated! And a checking list to keep you on track.
3. A daily exercise regimen, meal plan, recipes, and shopping list for each weekday, Monday through Sunday. I liked some of the food and fruit combinations: chopped oranges combined with blueberries; a wheat pita sandwich of turkey, sliced apples, baby spinach and a dollop of honey mustard!
- 12 Healthy Rewards for Your Hard Work.
If I can't follow the day to day regimen set out by the book, for whatever reason, I'd definitely still use this as a reference book for quick exercises and healthy recipes.
Thanks to the Hachette Book Group for providing a review copy.
Barbara Ghazarian has created a community of quince lovers, Team Quince, and directs us to her website, Queen of Quince, which offers quince food products. Ghazarian is also author of Simply Aremenian: Naturally Healthy Ethnic Cooking Made Easy.
For a link to an interview with Barbara and a February GIVEAWAY of two copies of Simply Quince, click here.
Disclosure: This book was provided free of any obligation by Publishing Works, Inc. No monetary or any other form of compensation was received. Publishing Works, Inc. is offering a 20 percent discount at the website, http://www.publishingworks.com/ At checkout, include the Coupon Code BLOG for a 20% DISCOUNT, courtesy of Publishing Works, Inc. and their continued support of book blogging! Happy reading!
Who would think that a group of five knitters would have murder and mystery on their minds, not only once, but now for a second time?
Knit, Purl, Die by Anne Canadeo is the second book in the Black Sheep Knitting Mystery series.
Synopsis: Gloria Sterling had everything, as far as everyone could see. A very goodlooking woman, she had a young husband she playfully referred to as her "trophy" husband, money and property inherited from former husbands, a large and luxurious modern home, and social standing in the community.
Gloria is even a good knitter. She befriends the five members of the Black Sheep Knitting Club - Maggie, Lucy, Dana, Suzanne, plus Phoebe, a college student working at Maggie's knitting shop - so that she might join the group.
When Gloria is found floating facedown in her swimming pool, the five knitting club members become convinced her death is not suicide but foul play. They do some investigating on their own to find out the truth about their new friend, Gloria.
Inbetween discussing, planning,and solving the crime, the group spend their time as regular knitting club members might, with their social chatter, plans to knit a blanket for charity, sharing knitting tips and cooking recipes, and discussing their personal lives.
Comments: This mystery fits the bill of a cozy - there is no "blood and gore", the murder takes place "off scene," and the sleuths are amateurs, not professional investigators. Knit, Purl, Die is also an easy-to-read and entertaining whodunit. Never mind that you might guess the culprit before the very end of the book. The true motives behind the crime will remain a mystery till the end.
Pocket Books Blog Tours: Thanks to Sarah Reid of Simon and Schuster for a copy of the book for review and for making this possible.
GIVEAWAY for U.S. only : To enter to win one of two copies of this book, 1) leave a comment with your email address so I can notify winners, and 2) tell us the title of one of your favorite mystery novels. For an additional chance to win, become a follower. Pocket Books will mail directly to the winners. No P.O. boxes please. Contest ends Feb. 4; winners must respond by Feb. 6, after which new winners will be chosen.
Teaser Tuesdays is a weekly bookish meme hosted by MizB at Should Be Reading. Choose two sentences from your current read, and add the author and title for readers. Anyone can join in.
"The group will be returning to Calgary in November, and he wants to see me. I would like to see him but I don't know if it's a good idea to take on a third lover, especially one from Havana."
(from the Oct. 23 journal entry, 2006).
My comments: What I thought would be a light book on Cuba turned out to be an unusual travel memoir and more - add personal experiences behind the scenes, some away from the main tourist attractions. The author doesn't do only tourist jaunts. She has some good experiences but also some unpleasant ones, unhappy love affairs, and mixed encounters with tourists and expatriates from various countries.
The author travels back and forth from her home in Calgary, Alberta, Canada to Cuba and writes this book as a journal that runs from September 2006 to January 2007. Canada has formal diplomatic relations with the Caribbean island, so Canadian citizens have no difficulty traveling there.
Author Wanda St. Hilaire is a sales and marketing rep as well as a traveler and writer. She lives in Calgary, Alberta. This book was published by iUniverse in 2009.
Thanks to Paula of AME for a review copy of this book.
The Youngest Son: Memoirs from the Homeland is more than a diary of a professor in a foreign land. Written from the heart with a good dose of humor, this memoir recounts a very special and wonderful time in Oreste LeRoy Salerni's life – a pilgrimage to the motherland.
The book is the product of a 6 ½ month sabbatical in Italy at the University of Pisa, which was a way for Salerni to pay tribute to his Italian immigrant parents. The completed sabbatical marked the fulfillment of a dream, full of joys, anxieties, travels, new friends, humor and the frustrations the Italian bureaucracy had with him.
My comments: This is a delightful and informative account of Prof. Salerni's six months sabbatical at the University of Pisa in Tuscany, where he lectured, wrote research papers, and helped to edit scholarly publications in his field of pharmacy and medicinal chemistry. He and his wife Marti made numerous trips to other parts of Italy to visit relatives, sightsee, and to act as host to many visitors from the U.S.
I learned a lot about the cities in Tuscany - the mountain top villages in Abruzzo where Oreste Salerni's parents were born, and the little town of Marlia near Pisa where the Salerni's lived during the sabattical. The travel memoir also took you to Florence, Siena, south to Naples and the Amalfi coast, and further south to Sicily.
Half of the book is about his experiences as a visiting professor at the University of Pisa, where he made many friends among professors and students alike. Throughout the book are references to friendly people, the food of Italy, and the hospitality he enjoyed, even from strangers.
I came away with a vision of a country with good food and a lot to see - historical buildings, countless churches and Roman ruins, breathtaking scenery. Oreste Salerni did a superb job of selling his parents' native country, giving wonderful descriptions and detailed information from his diary. He based his book on a journal he kept of his sabattical in Italy.
I love traveling and this book satisfied my curiousity about parts of Italy I've never seen as well as my love of a good narrative.
Thanks to Paula and Peppertree Press for the review copy of this book.
I finished the Mystery Read-A-Thon this past weekend but have to confess I did not spend 12 hours reading mystery novels as planned!
The Golden Globe Awards, chores, and other activities ate into my time! But I did finish Knit, Purl, Die by Anne Canadeo and started Pilikia Is My Business by Mark Troy.
I'd love to do this read-a-thon again, on a longer 3-day weekend!
I'm working on the Mystery Read-A-Thon which ends today, and tackling a book I've been meaning to read, Pilikia is My Business by Mark Troy, a mystery set in Hawaii. I've finished reading another mystery, Knit, Purl, Die by Anne Canadeo.
I'm also working on finishing a travel memoir by Oreste leRoy Salerni, The Youngest Son: Memoirs from the Motherland, a personal account of a professor on sabbatical in Tuscany for six months in 2003-2004. I'm thoroughly enjoying it. Makes me want to see the parts of Italy I missed on a trip I took years ago after college! I visited Florence and Pisa in Tuscany, but haven't seen Naples, Mount Vesuvius, the picturesque Amalfi Coast, or Venice - places visited in this book.
This past week, I reviewed and posted a giveaway of The Last Surgeon and an interview with author Christina Sunley, reviewed the cozy mystery, Truly, Madly, and shared a Japanese woodblock print and Chinese classical music on the blog.
What have you posted on your blog this past week?
1. I wake up at 5 a.m. in the mornings unless I have a hangover. 2. I love sweets 3. I remember my bichon frise dog with great fondness. 4. I'm a secret gardener with a garden blog. 5. I'm a pack rat when it comes to books, especially mysteries!
Knit, Purl, Die by Anne Canadeo.
Pilikia Is My Business by Mark Troy, a book I've had for about a year now, but couldn't get past the tiny print. I understand it first came out in electronic format.
Finish two books within 12 hours, then do a review of book one for Wednesday.
No, only because I just found out about it.
5) If this is your first Mystery Read-A-Thon, how do you plan to go ahead?
I'm finishing up the first book and hope to finish the second, which is 213 pages of very fine print!
A good plot, fast paced action through quick dialogue, and an entertaining and suspenseful read throughout.
A doctor with a heart of gold is pitted against a ruthless psychopath who has been hired as a contract killer by an unknown group. The killer thinks he is being humane by using bloodless and painless methods of dispatching his victims, but uses psychological terror nonetheless. Dr. Nick Garrity, in contrast, uses his talents to give medical care to the homeless and to war veterans. How their paths will cross, what far-reaching plot is behind the contract killings, and who will come out the winner are questions that kept me reading. Definitely an adults-only thriller, which builds suspense through psychological threats. Certainly not for the squeamish.
Publisher's description: "Everyone told Gillian Coates that her sister's suicide was just that: a suicide.
Everyone told Dr. Nick Garrity that his best friend, Lt. Umberto Vasquez, had simply disappeared, battling the demons of post-traumatic stress disorder.
Gillian doesn't believe it. Nick doesn't believe it. And soon, they discover a chilling connection between these two seemingly random events...a common denominator that will lead a killer to the next victim...and the last surgeon.
GIVEAWAY: Author Michael Palmer has offered a signed copy of his book to a U.S. reader. To sign up for a chance to win, enter a comment on this post by Jan. 31 and leave your email address; no P.O. boxes please. For an extra chance to win, follow me on Google Reader.
GIVEAWAY UPDATE: On Feb. 1, Randomizer chose entry #1 - stacibuckeye as the winner of the giveaway. She will be notified by email and has two days to respond before another winner is chosen. Congrats Stacy!
Published by St. Martin's Press; release date, Feb. 16, 2010. Thanks to author Michael Palmer for providing an ARC for an objective review.
Challenges: 100+, Thriller and Suspense, Chill Baby, Chill!
Q: Welcome to Book Dilettante, Christina! We'd love to hear how you came to write your first novel.
Christina Sunley, author of The Tricking of Freya: A Novel will discuss her book on Iceland and its history and culture. The daughter of Icelandic immigrants, her interest in history started with stories she heard from her mother.
Can you tell us the most interesting stories that prompted you to write the book?
Christina: There were two stories that my mother would tell me that especially struck me as a child. The first was of my grandfather as a young child in Iceland waking up to a morning sky black as night -- a volcano had erupted and caused widespread devastation in the area where he lived. The next story came from the following year in my grandfather's life, in 1876: impoverished by the volcanic disaster, his family set off on their shaggy horses under the midnight sun, crossed a river, and rode to the nearest seaport, where they took a ship to Scotland and then to Canada to join the "New Iceland" settlement. My mother also told me many stories about my grandfather's early experiences in the settlement, where they lived under harsh conditions as pioneers. I found those stories especially fascinating, and somehow haunting.
Q: What about the research you did to write the book - the time spent, the places you visited, etc?
• Floating in a boat on a glacial lagoon – the same lagoon with its dramatic icebergs that years later is now featured on the cover of my book.
• Watching a sheep with spiraling horns climb on the ruins of the turf-roofed farmhouse where my grandfather had been born in another century.
• Sampling hákarl, an Icelandic delicacy consisting of fermented shark meat. Enough said.
• Riding a snowmobile over Vatnajökull, Europe’s largest glacier, and trying not to panic when it broke down in the midst of the vast icy wilderness.
• Trekking a still-steaming lava field in the north, where astonishing ribbons of lava seemed frozen in midstream, gleaming with the colors of undiscovered planets.
• Driving for hours by myself in a rented jeep and never seeing a single car or house or road sign along the way.
• And, of course, writing down absolutely everything I saw, smelled, heard or imagined in my notebook.
On my second trip to Iceland, I spent a month in Reykjavik taking an intensive language course in Icelandic. The next year, I spent a month as a writer-in-residence at Klaustrið (The Monastery), living alone in a stone farmhouse bequeathed by one of Iceland's most famous writers. It was just downstream from where my grandfather had been raised. I arrived at the beginning of May in the middle of a tremendous blizzard. It was so stormy most of the time I could hardly venture outside without getting blown over. There was nothing to do but write. I got more writing done in that one month than I had in the whole previous year.
Q: Is the town of Gimli in Manitoba, Canada a real place? Are any of the characters in the novel based on real people?Christina: Gimli is a very really place – in fact, it was one of the first places the Icelanders named when they arrived at Lake Winnipeg. Gimli refers to a kingdom in heaven in Norse mythology. Today Gimli is a tiny Canadian fishing village with strong Icelandic roots. They still hold a large Icelandic Festival there each summer, which I write about in my book. Only one of the characters in my book is loosely based on someone real. Freya’s family friend, Stefan, was inspired by an Icelandic-Canadian historian and genealogist named Nelson Gerrard, whose research and publications are a great inspiration for me. You can learn more about his work at Nelson Gerrard.
Q: You mentioned that only about 5 percent of your historical research findings went into The Tricking of Freya. How do you plan to use the other 95 percent?
Christina: Probably what I meant to say is that only about 5% of the historical material that I wrote ended up in the book. There were several chapters of historical fiction taking place at different points in Icelandic history that I ended up cutting out of the book. Although I’m not sure I’ll ever be able to recycle those chapters anywhere, it did leave me with a longing to write a historical novel about the Icelandic immigration.
Q: Have you always wanted to be a writer? At what point did you make this decision?Christina: My mother wrote my poems down for me before I knew how to write! I’ve always loved writing and started making “books” of stories and poems when I was about nine years old, but it’s something else entirely to declare oneself a writer and then manage to get writing done while living life and making a living….
Q: What are some of the books and authors that have influenced you over the years?Christina: I love Michael Cunningham, Michael Ondaatje, Virginia Woolf, Annie Proulx, Paul Auster, Halldor Laxness, to name a few. To the Lighthouse is probably my favorite novel of all time.
Q: Is there anything else you would like to add for readers?
Christina: I’m heading to Iceland for a book tour in June, where the book has been released in an Icelandic translation called Freyjuginning. Very exciting! At the end of March the paperback will be coming out in the US and Canada, from Picador, with a new cover and a readers guide for book groups in the back. I love talking with book groups, so if you have a group and are interested, please contact me through my website at Christina Sunley.
Thanks for the interview, Christina, and have fun in Iceland on your book tour in June! It should be beautiful during summer there.
Synopsis: Young Freya has been tricked more times than she likes, both in big and small ways. The biggest trick begins with an unexpected trip, when she is enticed by her aunt Birdie to travel with her for three weeks to the land of their ancestors, Iceland, supposedly to find the lost letters of their grandfather, the famous poet Olafur, Skald Nyja Islands.
Freya normally lives in Connecticut with her mother Anna and only travels every summer to the small New Iceland community in Manitoba, Canada where her aunt and grandmother live. Freya is intrigued by her temperamental aunt Birdie, an aspiring poet who has manic highs and lows. In her good moods, Birdie teaches Freya the complex grammar of the Icelandic language and its folklore.
Following that first trip to Iceland with Birdie, a disastrous summer trip that seemed like a wild goose chase, Freya visits Iceland again many years later after Birdie's death, this time alone and to find answers about the past, the identity of a mysterious relative, and about the biggest trick of all that had been ongoing over the years.
Comments: I found this wonderful book at the library and borrowed it twice. The rich array of fictional characters created in the Icelandic community in Canada and in the homeland - from traditional to progressive to manic personalities - makes this an engrossing story, expertly told.
I came away with a better understanding of Icelandic culture, the land and language, its folklore, and the history of Icelandic immigration to Canada beginning in the 1870s. The Tricking of Freya was published 2009 by St. Martin's Press.
Other reviews of the book: Rose City Reader and The Boston Bibliophile.
(To have your review listed here, leave a comment with your link).
Lucy Valentine is psychic - she can't see people's auras as her father can, but she can find lost objects and see into the future, just by shaking someone's hand.
The plot for this cozy mystery is unique - Lucy takes over her father's successful and well known match-making business while her dad recuperates after heart surgery. She matches couples by the color of their auras noted by her aura-seeing father in each client's personal file.
Synopsis: When Lucy gets a new client, shakes his hand, and sees a vision of the ring he has lost, she literally freaks out. The ring just happens to be on the finger of a skeleton buried in a grave in a forest preserve.
How Lucy solves this mystery and determines who-dunit is the basic plot of the book. Along the way, she plays Cupid to several other couples, both clients and friends, and does her father proud as an asset to his matchmaking business. She also finds the love of her life.
Comments: The book has all the elements of a nice cozy - the murder takes place off scene, the mystery is light and easy to read, only the bad guys get hurt, and everything is hunky dory at the end. Love blooms throughout, so make this book a cute romance as well.
I'm looking forward to more Lucy Valentine books - she is a very likeable and lively character with psychic as well as sleuthing abilities and a personality you'll just love.
(ARC made available through LibraryThing Early Reviewers). Submitted to the Thriller and Suspense Reading Challenge 2010 and to the 100+ Reading Challenge.
Other reviews of Truly, Madly: Just One More page...Or Two, Crazy for Books, and Alexia's Books and Such.
To celebrate reaching the 100 mark for followers of my blog, I've created an Asian theme with a Japanese woodblock print of a woman in a kimono and with links to a traditional Japanese celebration and to classical Chinese music. Hope you will enjoy them.
The print above is courtesy of Dover Publications. Today, the second Monday in January, is Coming of Age Day in Japan, a holiday when 20 year olds officially reach the status of adult and are able to vote, among other pprivileges.
In Japanese Customs and Traditions, Muza-chan has posted pictures of 20-year-olds dressed in colorful costumes to celebrate their coming of age. Though in formal kimonos, the young women chose bright, flowery patterns and have pinned flowers in their hair! There is also a video of a Coming of Age ceremony held in a Shinto shrine.
For Asian music, there are two videos of Classical Chinese Music performed in the Golden Hall in Vienna with traditional instruments such as the two-stringed erhu. Hope you enjoy them.
I did only one book review last week: Map of Paradise, but it satisfied three different reading challenges I'm doing this year: The China Challenge, the Chill Baby, Chill! review challenge, and the 100+ Reading Challenge. I love when one book counts for more than one!
I started a cozy I got from LibraryThing, Truly, Madly by Heather Webber - a mystery/romance novel, which I am liking very much - humor, good plot, clever writing.
Haven't gotten an answer back from author Christina Sunley re the Q & A interview I planned, so that may not happen, though I hope she's not too busy and may yet come through!
Posted a Wordless Wednesday photo of red berries, which many people liked - a spot of color in the winter white.
I finally bought The Wind-up Bird Chronicle by Haruki Murakami, a novel which has to be savored and cannot be read in a hurry. I'm savoring it at leisure.
New book to be reviewed: Dino Vicelli, Private Eye in a World of Evils by Lori Weiner. The hero is a private detective who just happens to be a nattily dressed Italian greyhound. Beats the talking cats in that other mystery series.
For next week, I hope to do two book reviews and start reading a new memoir, The Youngest Son: Memoirs from the Motherland by Oreste LeRoy Salerni, about a teacher's sabbatical year in Italy.
What have you done this past week?
though the leaves have now gone. They stand out in the snow.
The bush is a rockspray cotoneaster, identified for me by Jodi of Blooming Writer: Gardening in Nova Scotia. Click on the picture to enlarge it, and click on the link to visit Jodi's wonderful garden blog.
A Map of Paradise: A Novel of Nineteenth Century Hawaii by Linda Ching Sledge, author of Empire of Heaven.
Publisher's description: With its green cliffs and silvery waterfalls, Hawaii offers radiant hope to Rulan and Pao An - exiles from China, immigrants with the will to succeed despite hardship and prejudice and enemies from their homeland. But his proud couple's hardest struggle will be with their own child - Mulan, called Molly.
Born in Hawaii's sacred hills, Molly grows to despise the old Chinese ways. Locked in perpetual combat with her parents,she is drawn into a dangerous love affair with a glamorous but decadent poet, a protege of the (Hawaiian) king. And even as he family's fortunes rise, Molly's mother watches in sorrow, fearing that her child will realize too late that happiness lies far closer to home.
Beautifully told, A Map of Paradise offers the colorful sweep of history with the satisfaction of characters intimately revealed.
My comments: The Chinese immigrant Pao An worked in California before joining his wife Rulan and their daughter in Hawaii, called the Blessed Isles. There they built a life for themselves and formed a community with other immigrants. The core of the novel are the love stories of young Pao An and his wife Rulan, of their daughter Molly and the half-Hawaiian poet she lived with and loved, and of the quiet boy Lin Kong, whom Molly had grown up with and many times spurned as an adult.
This historical novel describes the arrival of the Chinese as laborers for the sugar plantations in Hawaii in the mid 1800s, and of their gradual integration into the island economy as farmers, traders, and businessmen. The novel tells of the exhaustive work in forming a Chinatown community out of the two warring groups of Chinese - the Punti and Hakka clans.
The book also details the history of the Hawaiian kingdom and the dying off of important members of its royal family in the latter part of the 19th century, giving way to increasing American and British influence and control of the islands.
Rating: I gave this novel five stars for its descriptive storytelling and its detailed historical content on the Hawaiian kingdom and the settling of immigrants there in the late 1800s.
A Map of Paradise was printed in 1997 by Bantam Books. I read this book as part of a reading challenge, which requires 10 books on China or by Chinese authors, now through Sept. 1, 2010: The China Challenge. I also submitted it for the Chill Baby, Chill! review challenge and the 100 + Reading Challenge.
Happy New Year everyone! A new blog name for the new year - from Book Bird Dog to Book Dilettante. Hope you'll stay with me!
What is The Sunday Salon? Every Sunday the bloggers participating in that week's Salon get together--at their separate desks, in their own particular time zones--and read. And blog about their reading. And comment on one another's blogs. You can join in, too!
1. This past week I got very little reading done over the New Year holidays! I posted a review of The Tricking of Freya, a novel of Iceland by Christina Sunley, on Dec. 27 and then a Teaser Tuesday on Dec. 28 with my New Year's resolution to follow the healthy eating advice in the book, Japanese Women Don't Get Old or Fat.
2. Am almost through reading A Map of Paradise, a book of Hawaii in the late 19th century. It was the only book I managed to sneak in during the week.
3. I sent a list of questions for an interview with author Christina Sunley re her book, The Tricking of Freya, and I hope to post her answers this week. I also finished reading The Last Surgeon, a thriller by Michael Palmer, and still have to write a review.
4. Returned from Canada yesterday after five days of visiting and eating and found in my mailbox, appropriately enough, Denise's Daily Dozen: The Easy, Every Day Program to Lose Up to 12 Pounds in 2 weeks, a book from the Hachette group. This should go a long way to help with my new resolution for 2010 - losing all the pounds I gained the last three months in 2009!
and Chill Baby Chill! Reviews (this one runs to March 19, 2010)!
Good luck with your reading in 2010! | 2019-04-24T02:17:23Z | https://bookdilettante.blogspot.com/2010/01/ |
Well, the week has ended and we are back at home. The drive was not too bad, except for heavy traffic on I-64 from Hampton to Richmond. We left at 10 a.m. and stopped for lunch in Richmond right after noon at Red, Hot and Blue. We love RH&B, with good blues playing in the background and great barbecue. When traveling I usually like to get a quick lunch and get back on the road, but this was worth the extra time. We pulled into the driveway at 5:45.
Yesterday was a good relaxing day, with some beach time and just hanging out on the porch/deck on a beautiful day. Dinner was at a place called the Board Wok, and featured, as you might have guessed, Asian cuisine. It was decent, but not special.
On the way we reviewed the things we talked about doing, but didn’t do. I think that is always the way it is, at least for us. As much as I liked having the kids with us, they stay up late and get up late, and that shortens the time to do things. We could have made a better effort, though. That just gives us a reason to go back some day.
So, now it’s back to the usual ranting, I guess. Stay tuned.
Thursday was an active day, even with the late start we’ve been getting all week. We got out around noon and went to lunch at Panera Bread, a really, really good sandwich place that has several locations here in the eastern US, and maybe elsewhere, too.
After that we made our way to Norfolk, Va., which is Navy central, with multiple bases in the area, the Norfolk Naval Station, the Norfolk Naval Shipyard, the Little Creek Amphibious Base, the Oceana Naval Air Station, all in the nearby area. There are other military installations here, as well, with three Army bases, and Langley Air Force base, close by.
Norfolk houses Nauticus, a nautical museum that features exhibits and information on area naval activities from the days before the Civil War. It’s a very interesting place, and has the battleship USS Wisconsin on display for touring. We spent more than an hour there before heading to the Virginia Beach boardwalk, which as I said before bears no resemblance to the boardwalk I remember from my Air Force days when my band spent so much time playing in the beach clubs (no remnant of which can be found today).
We then headed to Bella Monte, an Italian place recommended by my high school and college classmate Betty Todd Howes, whom I haven’t seen since 1966. She and her husband Peter, and the five of us had a good dinner and some long-overdue catching up.
Diane had Osso Bucco, lamb shanks in a dark sauce; Ryan had Lobster Ravioli, which he didn’t like; Katherine and Christen had something, but they were at the other end of the table and I don’t know what it was. Me, I had one of the specials, a split lobster tail with crab meat over risotto. This was the best dinner of the week. We got home about 10 p.m.
Friday, we are hoping and expecting to be able to go to the beach for a while without being sliced to ribbons by blowing sand, and the weather forecast give us hope that we can. Saturday morning will be glum, as we have to pack and hit the road for home.
I’m no fan of Hillary Clinton, but this recent flap about her citing Bobby Kennedy’s assassination in June of the campaign season has gotten way more attention and created way more vitriol than it deserves.
Sen. Clinton definitely deserves criticism for making a dumb remark, but charging her with suggesting that Barack Obama might be assassinated, or worse, that he should be, is even dumber than the original remark.
What she should have said, and what she most likely meant, was that anything can happen at any time, and for her to drop out of the race when she is still winning primaries isn’t smart. We can argue with her logic or her estimation of her chances if we like, but we really can’t argue that it just isn’t possible to know what the near-term future holds for either of those candidates. And recent history fully supports that view.
Only a few months ago Clinton was the presumptive nominee from a fairly large field. Then, Obama came out of nowhere to take a substantial lead. Then, Obama’s dopey minister’s racist and anti-America remarks became public, and the Illinois Senator took a hit in the polls. Clinton has made a few gaffs of her own, along the way.
I saw a post somewhere featuring a video of Keith Olberman in a tirade against Clinton that is as good an example as I’ve seen of over-the-edge reactions, which are not at all uncommon these days. I can’t say I was surprised by Olberman’s goofy video; he’s nothing special, in my view, other than especially dopey.
Another example is the reaction to John McCain’s comment about a US presence in Iraq for “a hundred years.” Complicating that one, however, is the fact that this comment was taken out of context and the meaning deliberately twisted by McCain’s opponent, Obama, and other of McCain’s detractors.
Politics is serious business, and it deserves to be viewed and treated as the serious mechanism that it is for choosing our leaders. These childish, schoolyard reactions and tactics don’t help us figure out which of the imperfect candidates is likely to inflict the least harm on the country.
One of the reasons this vacation is different is that the kids stay up pretty late and get up pretty late. Di usually hits the sack between 10 and 11, and I stay up a little later watching TV with Ryan, or playing his new PS3 baseball game, which has wonderful graphics. Anyway, that means that we don’t get going as a group until lunch. The wind was even stronger this morning than yesterday and it was in the low 60s and raining, so our options for activities were somewhat limited. Today, even lunch was too early for the kids, so Di and I went out alone to hit the Target nearby and get some lunch.
We had lunch at a Mexican restaurant called Señor Fox, which was staffed entirely by Mexicans (as most are) we were seated in a booth near a young family with three little ones (over my left shoulder) and two local white guys (over Diane’s right shoulder). The staff was very attentive and very competent, and our food was delivered unbelievably quickly. It was good, on top of all that.
Along the way, one or more of the young ones let out an ear-piercing scream or two, which is always unpleasant, and at one point one of them was running around the place. They had been there long enough that they left when we were about half way through our meal. We heard one of the local guys talking to one of the staff: “Not all Americans are like that,” he said. The staff person cleaning up the table appeared not to hear him, so he repeated his comment. That caused us to look over at the table. You would not believe how much food, crumbs and other stuff was on the floor around this table.
After hearing our groans about the disgusting mess, the guy said that his mom and dad would have cleaned up a mess on the table, and on the floor, if there was any. I agreed. I commented that the younger generation has been brought up without common levels of manners and consideration for others. He agreed.
Now, I don’t believe that the whole generation is thus poorly reared; I know my four got a heavy dose of “you’d better not do that” along the way. But I think a fair portion of that generation is self-consumed and undisciplined. It’s another example of how our culture is moving slowly (or not so slowly) into the dumper.
I subscribed to Classmates.com a year or so ago to see who of my former schoolmates I could find. I have found quite a few, some of them used to good buddies. One of them lives in Virginia Beach, so I was trying hard to connect up. We have been emailing for the last couple of days and our families are going to get together for dinner tomorrow. This should be interesting, as Betty and I haven’t seen each other since 1966.
Tonight we headed out to dinner with no particular idea in mind, other than Katherine’s objection to going to any restaurant that we have at home, like Chili’s or Outback Steakhouse. We found a place that we hadn’t seen before, a Cuban restaurant called “Havana.” It was the best meal of the week, so far. I had a Paella de Mariscos, which has shrimp, scallops, littleneck clams mussels and fish all sautéed with chorizo and a trio of bell peppers tossed in sofrito rice. I don’t care for mussels or clams, so they left them out and added more scallops and shrimp. It was very good, and the chorizo was highly spicy. Diane had the Filet de la Casa, which is beef tenderloin served over a dark rum and peppercorn sauce served with garlic mashed potatoes and house vegetables. Ryan had Ropa Vieja, which is roasted shredded pork, Manchego cheese, black beans rolled in a flour tortilla and served on sofrito rice and finished with jalapeno queso and green enchilada sauce. Katherine had the Caribbean Mojo Marinated Flank Steak, which is grilled medium rare, thinly sliced and served with a chipotle beurre blanc, garlic mashed potatoes and house vegetables. And Christen had Coconut and Plantain Encrusted Atlantic Salmon, served atop sofrito rice with house vegetables and finished with a guava beurre blanc. There were a couple of appetizers and also desserts. All in all, a great meal.
Summing up: weather – not good; food – great.
Tuesday started early, about 6:50 a.m., reluctantly. I filled the morning with some reading, some writing and some surfing and a little breakfast. Had a bunch of “business” email to deal with. It wasn’t a restful night; up late and up early.
We finally made it to the beach in the afternoon, and even though it was still windy, it was a good, if short, span of relaxation. It was in the mid- upper-80s this afternoon; the sand was hot, but the water was cold. Very cold.You can see some debris on the beach, evidence of some recent stormy weather. We took a short walk on the beach, and that was nice, but the best part was just lying in the sun. There’s something about baking in the sun listening to the surf that just takes all the tension away. About a half-hour or 40 minutes was all of the sand blasting we could take, and then we headed back to the condo, for more reading, writing and surfing.
We hooked up with a former student of the college where Diane works who had been a work/study student. He lives nearby and is working on a masters degree, and he and his fiancé had dinner with the five of us in what is known as “downtown Pungo.” A decent restaurant called Seacrest served up a nice fried seafood platter for me, surf and turf for Ryan, drunken clams for Christen, chopped steak for Kath, and fried shrimp for Di. Good company and decent food.
We headed back to the condo and after a ride along the beach road looking at the beach houses we called it a day.
Today probably sounded like a wasted day, but it was really better than it sounds. But it’s been a little bit of an odd vacation, so far.
You regular readers will note that a frequent theme here at Observations is dissatisfaction with the major media, which does a lousy job of informing the public. It does a wonderful job of misinforming the public, however.
Recently, the subject of this institutionalized misinformation is in the realm of economics, including the national economy in general, and the housing market and the price of gasoline in particular.
Thomas Sowell had a great explanation for why more people do not accept the economist’s explanation for high gasoline prices: It’s because their reaction to the high prices is an emotional one, and an economist’s explanation does not satisfy the emotional need. Unfortunately, the politician’s explanation does satisfy that need, when in the effort to attract votes politicians place blame on the oil companies and the oil futures market, and promise to take care of all your problems if you will just elect them to office. The current Democrat presidential candidates are a case in point. This is the wrong answer to the question of why oil prices are so high, according to Sowell, but it is much more satisfying to blame “someone” for the problem, hence “big oil” is a villain as are greedy oil speculators.
Just to be sure that my instincts were correct about the high price of oil and the effects of speculation in the oil market on that price I did a good bit of research. I don’t claim to be an expert on this phenomenon, but I have been able to determine through reading that while speculators may, and I repeat “may,” have an effect under certain circumstances, that effect is small and other less emotionally satisfying factors have far more to do with the high price of oil. Unsatisfying answers like supply and demand, for instance.
That research produced a couple of interesting pieces, which I have included below. Unfortunately, I managed to somehow lose the sources for these, so while I can’t tell you who wrote them, I can tell you that I didn’t write them, except for a little rewording here and there.
We hear a lot these days about how gas and oil prices are at historical highs. But what we don't hear much about is how personal income is also at historical highs. Per-capita personal income has almost doubled in the last 15 years, from about $20,000 in March of 1993 to almost $40,000 in March of 2008.
Measured as a percent of per-capita personal income, gas prices through March 2008 aren't even close yet to the historical highs of the early 1980s, when 1,000 gallons of gas cost between 10-13% of per-capita personal income for 36 consecutive months, much higher than the 8.2% of per-capita income in March 2008.
The peak price of gas as a percent of income was in March 1981, when 1,000 gallons of gas cost 13% of per-capita disposable income. Gas today would have to reach a price of about $5.13 per gallon, before it would be an historical high adjusted for income.
Democrats are proposing to protect the American people from “greedy oil traders who manipulate the market.” Senator Barack Obama wants price gouging by oil companies to be a federal crime.
Everyone wants lower prices, but many politicians seem unable to understand that speculators actually smooth out wild swings in prices. Speculators make profits by buying oil when the price is low and selling it when it is high, and doing that protects consumers. Tensions rose last week because of Venezuela financing Columbian terrorists. Columbia looked like it might retaliate and send troops into Venezuela, the world’s sixth largest oil exporter.
There was an obvious risk that Venezuela’s oil exports could be stopped. Oil prices increased immediately. They didn’t wait for the war to actually break out. By buying oil now in order to set it aside if supplies are interrupted if the conflict escalates, is good for consumers. Storing oil for then will prevent what would have been even higher prices. Politicians obviously thought speculators were unjustified to start bidding up prices. After all, war might never occur. Yet, if speculators didn’t do that and Venezuela's shipments are halted, the much bigger increase in oil prices would surely cause politicians to really call for the scalps of everyone in the oil business.
The speculators are taking a real risk with their own money. If no war occurs and prices fall, few in congress are going to shed tears over the money that the speculators would lose. If war breaks out and prices only rise a fraction of what they otherwise would have gone up, who is going to thank the speculators for a job well done?
Speculators are actually extremely accurate in predicting the future. But it is not just in oil prices.
Monday wasn’t a special day, at least in terms of our activities. It was special, of course, inasmuch as it was Memorial Day, a day to remember those who have sacrificed their bodies and their lives so the rest of us can live in relative comfort and freedom. Actually, it is to memorialize all military service personnel, but as one who served but did not see action I can say with some authority that the people really deserving of our respect are those that did see action.
The kids got up relatively late and we didn’t hit the road until around noon. We had a decent lunch at a place called the Tiki Seagrille and Bar, where I had a burger with a crab cake on top and some O rings. we headed toward the Virginia Beach strip. Back in the day, that was a place of action, with beach clubs where the bands I was in played. Places like the Peppermint Beach Club and the Top Hat. Believe me when I say that if someone had blindfolded me and dropped me off on Atlantic Avenue, when I took off the blindfold I would have had absolutely no idea where in the world I was. Forty years changes everything. No more beach clubs and quaint hotels. It’s all modern new building without even a trace of the places of the good old days.
We spent the afternoon in a couple of malls. Yeah, I know: that’s sad.
We got back to the condo about 6:30, had some wine on the porch and watched the sun go down. Very pleasant, except for a stiffer-than-desirable breeze, as witnessed by the flag in the photo.
I actually found myself shouting obscenities at some bikers today. Those blasted things are louder than anything reasonable; just plain obnoxious, breaking the serenity of the area with that absurd racket. Maybe I just don’t understand bikes, but it seems to me that you ought to be able to have a fine machine that gives you the pleasure you seek without deafening those poor souls with the misfortune to be nearby when you decide to head off into the wind.
My first encounter with a motorcycle was when I was pretty young, about 8 or 10, or maybe 12. The guy who lived up the alley had a green Indian that suitably impressed us youngsters. Bill was his name, and he was a good guy. I don’t remember his bike being deafeningly loud. The next encounter involved three guys in high school, Tommy, Bobby and Freddy. Two of them had Harley Hummers and the third one that had a Zundapp. It was a German bike. None of them was loud, even the Harleys, but the Zundapp just kind of purred. I hitched a ride with those guys a time or two.
When I was in the Air force, my friend Jim had a Honda 425 (I think), and I actually rode that one by myself. It was quite a kick.
For dinner, we walked across the street to the Baja Restaurant, where a pretty good dinner was had by all. My choice: Sea food au gratin, green beans and roasted red potatoes. Diane had BBQ ribs, Ryan had crabbed flounder, Kath had the Thai chicken skewer, and Christen had just some chowder (she is tiny and has a small apetite). Good fare for all.
Hopefully, tomorrow is a beach day.
Sunday was a kind of “lay-around” day. We just looked around the place, and Diane and the kids went driving and looked at some model homes. Not that we are looking to buy anything, but just to look.
They have a bunch of Viking grills on the premises, really nice grills, and we had bought some ribeyes and chicken breasts for dinner, so we fixed those for dinner.
The owner of the condo dropped by to check on some irregularities that we had discovered in talking with him. He's VERY concerned about his place and how people who get paid to take care of it are doing. A great fellow.
We had a better view of the sunset this day, but it wasn't substantially better than Saturday.
After that very busy few days last week we had scheduled a week away, and it may be the last one the four of us will have together, since the kids are getting to the point where they are headed in different directions than we are, and in different directions than each other. It is increasingly difficult to find something that the four of us all want to do that lasts more than a day at a time.
So, the four of us and Katherine’s friend Christen set out for Virginia Beach Saturday. That’s where I spent a lot of time playing in bands while I was stationed at Langley AFB a few years ago. Actually, it was about 40 years ago. Back then, Sandbridge was a deserted beach; today it is covered with beach houses and one big condo complex.
The trip down wasn’t too bad, until we got to I-64 south from Richmond. The traffic was pretty heavy, and the speed was up and down a lot, with no apparent cause, other than the inability of people to know how to drive on the Interstate. Then, we got to the Hampton Roads Bridge Tunnel, and that was a royal pain. It took about 45 minutes to go three miles to the HRBT, and another few minutes to get across/through the thing. But when we finally got to the destination on Sandpiper Road about an hour later, things were much better.
The place we are staying is fantastic. It’s belongs to a couple who already live nearby and bought this place, but haven’t been able to sell their home, and are renting this out until they can sell the house. The unit we are in faces the Back Bay rather than the ocean, but that is just fine.
After unloading the car and getting somewhat settled, we headed out to get some dinner and go to the grocery store. There was some information about a pizza place in the materials furnished with the condo, so we went there. D and I had a Portuguese Pizza, which was very good, with tomatoes, onion, peppers and garlic with an oil based white sauce. K and C had some kind of wrap, and Ryan had fish and chips. Made as quick a trip as possible so we could get back for the sunset, which was pretty much over by that time.
Diane and I were not too far from here not too long ago for a wedding, and we spent a little time looking around at the old haunts, but not enough. My goal: relax, and spend some time looking at the places where I spent four years of my life. Try to get on Langley, which we weren’t allowed to do last time; find the old apartment and house where I lived, which we did do last time, but didn’t have time to really get a good look; find the old places where we played; find an old schoolmate who lives here, and see if any of the guys in the bands are still here. I guess we’ll go to the beach today, if only to look at it. It’s still a little cool in the mornings—it’s about 65 now—and this afternoon promises only about 71.
There are a couple of new entries on A Little Levity that you may enjoy.
The US Constitution sets up a government of, for and by the people, and state constitutions are modeled after it. The recent decision by the California Supreme Court to overturn a ban on homosexual marriage challenges this paradigm.
Homosexual marriage does not appear in the California constitution, because if it did someone would have discovered it before now. Where, one might justifiably ask, did the California Supreme Court find this right?
Californians have consistently expressed their opposition to and voted against recognizing the idea of homosexual marriages. No Congress or state legislature has ever voted to declare homosexual unions a marriage, an idea that has also been universally rejected at the ballot box. In the 13 states where it was on the ballot in 2004, it was defeated by at least 58 percent of the voters, and by 85 percent of them in one state.
In our system of government the people determine how their country will function through their elected representatives. This point seems lost on four members of the California Supreme Court: Chief Justice George, and Justices Kennard, Werdegar, and Moreno. These four justices created the right of gay marriage out of thin air, and in doing so overturned the expressed will of the people.
In her dissent, Justice Corrigan said: “In my view, Californians should allow our gay and lesbian neighbors to call their unions marriages. But I, and this court, must acknowledge that a majority of Californians hold a different view, and have explicitly said so by their vote. This court can overrule a vote of the people only if the Constitution compels us to do so. Here, the Constitution does not.” Justice Corrigan gets it, and deserves to be applauded for adhering to judicial restraint, putting her personal desires behind her duty to uphold the state constitution. Justices Baxter and Chin also dissented.
This is not about whether anyone approves or disapproves of homosexuality, whether it is right or wrong, whether it is a sin or not, or whether it is a natural part of mankind. This is about government officials—judges in this instance—using their positions to impose their ideals on the rest of us. That is wrong, and cannot be ignored.
When judges violate the will of the people, and mangle the governing document in doing so, they must be removed from office. To restore the California Supreme Court to its proper role, Justices George, Kennard, Werdegar and Moreno should be removed from the bench by the people of California.
There is so much misinformation, misunderstanding and ill will surrounding the price of gasoline these days that some clarity is demanded.
The first point is that the primary reason gas costs so much is that there is more demand than supply, and the increase in demand comes from the expanding economies of China and India. OPEC could produce more oil, but it isn’t in its interest to do so.
The second point is that the U.S. has no one to blame but itself for its idiotic opposition to drilling for domestic oil, building new refineries, and failing to develop other sources of energy.
Perhaps the worst and most dishonest aspect of all of this is the condemnation being heaped on the oil companies, claiming they are making indecent profits. Hogwash! If you understand how businesses operate, you realize this is just so much foolishness. The trouble is, however, that most people do not understand how business works, and politicians trying to get elected and the media that helps them seize upon that ignorance to demagogue the issue and produce votes. Truth be told, many politicians and journalists also don’t have a clue how business works. Businesses—corporations—exist for one purpose only: to make a profit. Without a profit, a business cannot continue to operate and produce whatever it produces, food, medicine, clothing, music, energy products, etc., and it also cannot continue to provide jobs for its employees.
Everyone got all excited about Exxon-Mobile’s $40 billion profit in 2007. But looking just at the amount of the profit—the number of dollars—doesn’t provide you with enough information to discuss the issue of whether that profit is “indecent.” In order to have made $40 billion (that’s $40,000,000,000) in profits, Exxon-Mobile needed revenues of more than $404.5 billion (that’s $404,500,000,000), of which $334 billion ($334,000,000,000) goes to cover costs. By the way, Exxon-Mobile paid about $30 billion ($30,000,000,000) in taxes in 2007.
Oil company profit margins haven’t increased above their modest level recently. What has increased is the cost of buying crude oil, which increases the cost of gas at the pump and also increases the number of dollars of profit. Translation: Oil companies aren’t making any more money on their investment now than in the past.
The greenies and other liberals try to make the oil companies look like the bad guys on the price of gasoline, when in fact it is primarily their fault that gas prices are as high as they are. Drilling domestic reserves and increasing refining capacity would have increased the amount of crude oil and refined petroleum products in the hands of US oil companies, and that would have kept prices lower. But heavy regulation and an outright ban on drilling for our own oil, courtesy of Congressional Democrats, have prevented that.
I'm halfway through this demanding week, which is good, but the most difficult is still ahead, which is not good.
I have lots of ideas, just no time to deal with them.
In place of real ideas, I have posted some more "Levity" for your weekend enjoyment.
A few days ago when I looked out the patio door up at the spot where Mama Duck sat so stoically every day, I noticed that I couldn’t see her head. So, I ventured up there to take a closer look, and sure enough, she was gone. I ruffled the leaves a little, looking for eggs or broken shells, and found neither. A little later I saw that she had returned.
The last couple of days have been extremely busy, and I didn’t get many chances to check out whether she was there or not, but I did see her once or twice.
Yesterday, I noticed that Mama appeared to be gone, but it was raining most of the time I had a chance to go look. This morning, I ventured up there to find eggs that are broken open, and no sign of little ones. I guess I just missed the big events, hatching and hours later the march to the water. I hope the family is doing okay.
I’ll check out the nest more closely when I get a chance.
It seems like May is destined to be the busiest month in my life. Last year was frantic, and this year is perhaps a little more so.
Enough whining, though. I haven't been able to put anything on Observations lately, but I did find time to put a funny up on A Little Levity that you might enjoy.
In 1968, Professor Paul Ehrlich predicted there would be a major food shortage in the U.S. and "in the 1970s ... hundreds of millions of people are going to starve to death," Ehrlich forecasted that 65 million Americans would die of starvation between 1980 and 1989, and by 1999 the U.S. population would have declined to 22.6 million. Ehrlich's predictions about England were gloomier: "If I were a gambler, I would take even money that England will not exist in the year 2000."
In 1972, a report was written for the Club of Rome warning the world would run out of gold by 1981, mercury and silver by 1985, tin by 1987 and petroleum, copper, lead and natural gas by 1992.
Gordon Taylor, in his 1970 book "The Doomsday Book," said Americans were using 50 percent of the world's resources and "by 2000 they [Americans] will, if permitted, be using all of them."
Harvard University biologist George Wald in 1970 warned, "... civilization will end within 15 or 30 years unless immediate action is taken against problems facing mankind."
That was the same year that Sen. Gaylord Nelson warned, in Look Magazine, that by 1995 "... somewhere between 75 and 85 percent of all the species of living animals will be extinct."
In 1885, the U.S. Geological Survey announced there was "little or no chance" of oil being discovered in California, and a few years later they said the same about Kansas and Texas. In 1939, the U.S. Department of the Interior said American oil supplies would last only another 13 years. In 1949, the Secretary of the Interior said the end of U.S. oil supplies was in sight. Having learned nothing from its earlier erroneous claims, in 1974 the U.S. Geological Survey advised us that the U.S. had only a 10-year supply of natural gas. The fact of the matter, according to the American Gas Association, there's a 1,000 to 2,500 year supply.
In 1970, when environmentalists were making predictions of manmade global cooling and the threat of an ice age and millions of Americans starving to death, what kind of government policy should we have undertaken to prevent such a calamity? When Ehrlich predicted that England would not exist in the year 2000, what steps should the British Parliament have taken in 1970 to prevent such a dire outcome? In 1939, when the U.S. Department of the Interior warned that we only had oil supplies for another 13 years, what actions should President Roosevelt have taken? Finally, what makes us think that environmental alarmism is any more correct now that they have switched their tune to manmade global warming?
Over 95 percent of the greenhouse effect is the result of water vapor in Earth's atmosphere. Without the greenhouse effect, Earth's average temperature would be zero degrees Fahrenheit. Most climate change is a result of the orbital eccentricities of Earth and variations in the sun's output. On top of that, natural wetlands produce more greenhouse gas contributions annually than all human sources combined.
Of course, the true believers in the “man causes global warming” theory and the idea that we are facing the most serious problem since Eve bit into that apple won’t be persuaded by anything so basic as logic, but it behooves us to objectively analyze both sides of this important but unsettled issue before we follow Al Gore’s lead into one of the biggest mistakes man has yet made.
A patron saint for George W.
By Wesley Pruden - Davy Crockett is the patron saint of every politician who ever left Washington with a bruised ego and a broken heart. When he was bounced out of Congress in 1830, Davy told the folks on the banks of the Nolichucky River in Tennessee: "I'm going to Texas, and the rest of you can go to hell."
"If the polls are right, more than half of you don't regard yourselves as 'my fellow Americans," so I'll cut right to the chase. I'm getting out of Dodge. Before anyone gets in a lather about me quitting to avoid impeachment, let me assure you that no laws were broken, the Constitution is intact. I'm quitting because I'm fed up with you people. You have no interest in what's actually going on in the world. Most of you are too lazy to do your homework and figure it out.
"Let's start local. The politicians and pundits have persuaded you that the economy is in the tank. That's despite record numbers of homeowners, including record numbers of minority homeowners. Minority business ownership is at record levels, too. Our unemployment rate is as low as it ever was during the Clinton administration. The stock market has rebounded to record levels and more Americans than ever own stocks. But all you can do is whine about gasoline prices, and most of you are too dumb to realize that the price of gasoline is high because the Chinese and the Indians are driving cars now, and because Al Gore and a handful of wacko greenheads are more worried about polar bears and their beachfront property than they are about you.
"I'm tired of this 'blood for oil" crap. If I were trading blood for oil, I would have seized Iraq's oil fields a long time ago. And don't give me this 'Bush lied, people died' crap, either. I could have planted chemical weapons planted all over Iraq to be 'discovered.' Instead, I owned up to the fact that the intelligence was faulty. The rest of the world thought Saddam Hussein had the goods, too, same as me.
"Fools don't understand that we face a unique enemy. The 'soldiers' of our new enemy, unlike our old Soviet enemies, are actually eager to die. That's OK with me, and good riddance, as long as they aren't trying to take as many of you with them as they can. But they want to kill you in the name of what I generously called 'the religion of peace' (not that I ever believed it any more than you do). You all should be grateful that the Islamists haven't killed more of us here in the United States since September 11, but you're not. That's because you've got no idea how hard a small number of intelligence, military, law enforcement and homeland security people have worked to make sure of that.
"I warned you that this would be a long and difficult fight, but most of you think 'a long and difficult fight' amounts to a single season of 'Survivor.' You won't look through the long lens of history, the way our enemies do.
"The facts are easy enough to find. They're all over the Internet, along with a lot of stuff that ain't true. You have to pay attention and sort it out, but most of you would rather watch 'American Idol'. I could say more about your idiotic belief that government, not your own wallet, is where money comes from. But it would sail right over your heads.
"So I'm going back to Crawford. I've got an energy-efficient house down there that Al Gore could only dream of. Oh, and by the way, Cheney's quitting too. That means Nancy Pelosi will be your new president. God bless what's left of America. Some of you know what I mean. The rest of you can kiss my you know what."
We might well think he wants to say all that. But of course presidents would never say such things.
I have been checking on Momma Duck periodically to see if we have a family in the nest yet, and as of today we do not. Momma is patiently sitting in the nest, but there is no sign of little ones as of this evening.
I have noticed pairs of Mallards in the neighborhood, and I reported a while back that there was a male and a female together in our driveway several days ago, and thought the female was Momma. More recently, there was a female on the porch steps, and I have concluded that neither of those females was Momma. Or, perhaps, it might have been Momma, and another female was sitting on the nest.
I don’t know anything about how ducks handle this situation, but Momma has to get food and water sometime, somehow.
Maybe Jules can enlighten us.
An organization of which I am a member is participating in the CHOICES program to talk with 9th grade students for about an hour on two successive days about their future. So, on the night of the North Carolina and Indiana Democrat primary elections, I am studying how to present this material to these young people the next two days.
I attended the training session on Monday, expecting to have at least a week before I was thrust before these young people. But, as fate would have it, I ended up with only two days to get ready, and really only one day, as I found out today that tomorrow is the day. Since I am trained as a teacher, I suppose I have a couple of steps on someone who hasn’t had that experience, so I guess I ought to quit complaining and get busy reviewing the materials.
I am looking forward to this experience, and I think it will be a positive thing, both for the students and for me, but I really wish I had more prep time.
Well, tonight was the first Deck Night of the season. We did some yardwork this afternoon, getting rid of shrubs that had outlived their usefulness and were causing problems, still fighting the leaves of fall, and then got ready to fix dinner. We grilled some nice, thick pork chops treated with a Calphalon Steak and Chop rub, had some asparagus, corn on the cob and ciabatta toast, and, of course, some wine.
We have spent a little time on the front porch, just sitting there talking and taking in the out of doors, but tonight was the first Deck Night of the season. We pulled out the cushions, cleaned off a small table, dusted off the chair frames, and had dinner on a plate in our lap on the deck. It wasn’t the full scale deal, with the big table and taking the stereo out there, but it was still very relaxing and comfortable.
The back deck is mostly private, blocked off from the street to the south and no neighbors within sight to the north. The house is to the east and the only possible “spy” is the lady that lives on the hill above the tiered back area to the west; you know the one, the one that collects all the leaves in the fall. The lady that lives up there—the house is about 30 feet away and 20 higher than the deck—is elderly and we never see her in the yard, so she isn’t a factor. So, we can sit out there and enjoy the birds and the trees and whatever else is going on without human interference. The photo is from two years ago; we haven't gotten this far yet this year.
The deck is one of my favorite places to spend time. I sometimes take the laptop out there and work on the Web pages I manage, or write the newsletter that I edit, and do other tasks. It ain’t fancy, but it sure is comfortable, and I’m glad that it’s that time of year again.
He’s right about the amount of savings. A person driving 30 miles a day for the 92 days of June, July and August would use 138 gallons of gasoline in a vehicle that gets 20 miles per gallon. The federal tax on 138 gallons of gas is $25.39, and that works out to a savings of 28 cents per day. But if all taxes are removed, the savings approaches 50 cents per gallon, nearly tripling the savings through the summer months.
But what Obama is missing is that you either believe gas prices are too high, or you believe they aren’t. If you believe they are too high, then reducing the price is desirable, the cutting a gallon of gas by 18 cents has to be a positive, and cutting a gallon of gas by 50 cents is even better. So, what difference does it make whether that is done through removing the federal tax on gas, or lowering the price per gallon by some other means?
Obama fears the effects of the loss of tax revenue, and that is a factor. However, any other way that government employs to reduce the price of gas will also have an effect, although the fallacious concept of “windfall profits” as something sinister and greedy has convinced many people that punishing oil companies is acceptable, and even good.
The real problem with any of these ideas is that it requires government to directly intervene in lowering the price of gasoline, and that is wrong.
High gasoline prices are the result of a few factors, primary among which are the amount of oil for sale, the amount of oil needed, the fact that the United States does not drill for and collect its domestic reserves, and the fact that the U.S. has insufficient refining capacity, and has made building new refineries so expensive that the oil companies can’t do it.
There is a greater demand for crude oil than there is the supply to fill it, which drives up the cost of crude oil, and crude oil is by far the largest factor in the price of gasoline. If environmentalists had not opposed allowing U.S. oil companies to drill in the Gulf, off the California coast and in ANWR, there would be more oil on the market, thus lowering crude oil prices, and American companies would own the crude oil they drilled.
If environmentalists had not opposed the building of new refineries and supported regulations that made building refineries too expensive, refining costs would be lower, more oil would be refined in the U.S., there would be more gasoline available, and the price at the pump would be lower.
Democrats are the primary opponents of both domestic drilling and refinery building, and now Democrats propose as solutions for high gasoline prices putting a windfall profits tax on oil companies, who would gladly have done the things necessary to reduce our dependence on foreign oil and keep prices down if only the Democrats had allowed them to, and whose profits have grown precisely because the Democrats didn’t allow them to drill and build refineries, and forced them to buy more oil for foreign sources at much higher prices.
"A Little Levity" has been updated with some new jokes.
Stop by and get yourself a laugh or two.
Two Republicans made public statements today. One of them was right, and one of them was wrong.
President George Bush said today that gasoline prices are high because Democrats have consistently opposed efforts to drill for domestic oil and build new refineries, which is true, that worldwide demand is up but supplies are static, which is also true, and that when demand for something exceeds supply, prices go up, and that, too, is true. He also said he expects the economy to rebound, and the data tends to support that, as well. The quarterly productivity number was positive, not negative as the definition of “recession” requires, job losses were lower than last month, and unemployment fell back to 5.0 percent, which is defined as full employment.
Senator John McCain, on the campaign trail, told his audience that he will strive to make the U.S. energy independent by developing alternative energy methods, which is a good goal, but he said that this would make it unnecessary for the U.S. to ever send military personnel to the Middle East again. The clear implication from McCain’s comment is that we are in Iraq for oil. That is nonsense, and McCain knows it. If we had gone to Iraq for its oil, we would be bringing Iraqi oil to the U.S., reducing the amount we have to purchase from OPEC, et al. But even if McCain was correct, who’s to say that something else might pop up over there requiring military action, like, for example, a nuclear-ized Iran, or Arab aggression against Israel, etc.?
Watching Democrat candidates get hammered for skirting the truth apparently hasn’t sunk in on John McCain. The road to the White House is by talking straight with the American people. “Straight talk” used to be McCain’s byword. Let’s hope he wakes up and smells the coffee, and gets back to that real soon. | 2019-04-24T16:16:17Z | http://www.jshott.com/2008/05/ |
Three children Jose, Moises and Elena lost their mother in September of 2014. Their story is incredibly tragic due to the fact that they witnessed her passing. All of them have been really supportive of their father who became the sole provider for the family. Even though he works several jobs, he can barely cover his family’s basic needs. Moises, the youngest, has told us on different occasions that he is truly thankful for all the time and help LFF has given his family.
Jose, Moises y Elena tuvieron la desgracia de haber estado presente cuando la mama se murió en septiembre del 2014. Los tres le dan un apoyo tremendo al padre, que ahora es el unico proveedor de la familia. Aunque el padre de los niños tiene varios laburos, casi no les alcanza para lo mínimo que podrían necesitar. Moises, el mas joven, nos ha contado varias veces lo agradecido que esta que LFF haya dedicado tanto tiempo y ayuda para ayudar a su familia.
I simply want to tell you that I am just newbie to weblog and seriously loved you're web-site. Likely I’m going to bookmark your blog post . You absolutely have outstanding stories. Cheers for sharing with us your blog site.
Thank you for another informative web site. Where else may just I am getting that type of information written in such a perfect approach? I have a challenge that I'm just now running on, and I have been on the glance out for such information.
Thank you for all your valuable labor on this web site. My mom delights in carrying out research and it's easy to see why. Most of us notice all relating to the lively means you provide worthwhile solutions through the web blog and in addition foster response from some others about this concept plus our princess is undoubtedly discovering so much. Take pleasure in the rest of the new year. Your conducting a brilliant job.
Somebody necessarily lend a hand to make critically posts I might state. This is the very first time I frequented your website page and thus far? I surprised with the research you made to create this actual put up amazing. Great activity!
Great website. Lots of helpful information here. I am sending it to some buddies ans additionally sharing in delicious. And naturally, thank you for your effort!
Whats Going down i'm new to this, I stumbled upon this I have discovered It positively helpful and it has helped me out loads. I am hoping to contribute & help other users like its helped me. Good job.
Thanks for any other informative blog. The place else may I am getting that type of info written in such a perfect way? I've a undertaking that I'm simply now running on, and I've been at the look out for such info.
Just desire to say your article is as astonishing. The clearness in your post is just nice and i could assume you are an expert on this subject. Fine with your permission allow me to grab your feed to keep updated with forthcoming post. Thanks a million and please continue the gratifying work.
You have noted very interesting points ! ps decent internet site . "I hate music, especially when it's played." by Jimmy Durante.
I¡¦ve read a few good stuff here. Definitely worth bookmarking for revisiting. I wonder how a lot effort you put to create this sort of fantastic informative site.
Just wish to say your article is as amazing. The clearness in your post is simply spectacular and i can assume you are an expert on this subject. Fine with your permission let me to grab your feed to keep updated with forthcoming post. Thanks a million and please carry on the enjoyable work.
great submit, very informative. I ponder why the other experts of this sector do not notice this. You must proceed your writing. I am confident, you've a huge readers' base already!
Hi, Neat post. There is an issue along with your website in web explorer, could check this¡K IE still is the marketplace chief and a big section of folks will miss your excellent writing because of this problem.
You actually make it appear really easy along with your presentation however I find this topic to be actually something which I think I'd never understand. It seems too complex and very extensive for me. I am having a look ahead in your next submit, I¡¦ll attempt to get the cling of it!
I like this weblog so much, bookmarked. "To hold a pen is to be at war." by Francois Marie Arouet Voltaire.
I intended to compose you one very little note to be able to say thanks a lot yet again over the incredible guidelines you have featured in this case. It's simply strangely open-handed with you to supply easily all a number of us could have made available for an ebook to generate some profit on their own, particularly considering that you might well have tried it if you ever wanted. Those good tips as well worked to be a great way to comprehend most people have similar passion the same as mine to figure out a great deal more on the subject of this issue. I am certain there are lots of more enjoyable occasions ahead for people who read through your website.
I simply couldn't leave your web site prior to suggesting that I really enjoyed the usual info an individual supply on your visitors? Is gonna be again frequently to check up on new posts.
Very interesting points you have observed , appreciate it for putting up. "You bluffed me I don't like it when people bluff me. It makes me question my perception of reality." by Andrew Schneider.
I truly enjoy studying on this internet site , it has great blog posts. "We find comfort among those who agree with us--growth among those who don't." by Frank A. Clark.
What i don't understood is in reality how you are now not really a lot more smartly-liked than you may be right now. You are very intelligent. You recognize thus considerably on the subject of this matter, produced me for my part imagine it from numerous varied angles. Its like women and men are not fascinated except it¡¦s something to do with Woman gaga! Your individual stuffs nice. All the time handle it up!
Thank you, I've recently been searching for information about this topic for a long time and yours is the best I have discovered so far. But, what concerning the bottom line? Are you certain concerning the supply?
I was just looking for this info for some time. After six hours of continuous Googleing, at last I got it in your website. I wonder what's the lack of Google strategy that don't rank this kind of informative web sites in top of the list. Generally the top sites are full of garbage.
What i do not realize is in fact how you are no longer actually a lot more well-favored than you may be now. You are so intelligent. You already know thus significantly in the case of this topic, made me in my opinion believe it from so many numerous angles. Its like women and men don't seem to be fascinated unless it's something to accomplish with Girl gaga! Your personal stuffs outstanding. All the time deal with it up!
I do believe all the ideas you have introduced for your post. They are very convincing and will certainly work. Nonetheless, the posts are very brief for starters. Could you please extend them a bit from subsequent time? Thanks for the post.
Great remarkable things here. I¡¦m very satisfied to see your post. Thanks so much and i'm having a look forward to contact you. Will you please drop me a e-mail?
Hello my loved one! I want to say that this article is awesome, great written and come with approximately all important infos. I'd like to look more posts like this.
Thanks a lot for sharing this with all of us you really understand what you are talking about! Bookmarked. Kindly also talk over with my web site =). We can have a link exchange contract between us!
I will immediately take hold of your rss feed as I can not to find your e-mail subscription hyperlink or e-newsletter service. Do you've any? Kindly let me know so that I may subscribe. Thanks.
I was looking through some of your posts on this internet site and I conceive this website is real informative ! Retain putting up.
I genuinely enjoy studying on this site, it contains wonderful articles . "He who sees the truth, let him proclaim it, without asking who is for it or who is against it." by Henry George.
I together with my pals ended up taking note of the best techniques on your website and so the sudden developed a terrible suspicion I had not expressed respect to the web site owner for those techniques. Those people happened to be consequently stimulated to learn them and already have definitely been having fun with these things. Thank you for being well thoughtful as well as for having certain perfect areas most people are really needing to be informed on. My personal honest apologies for not expressing gratitude to earlier.
Good ¡V I should certainly pronounce, impressed with your site. I had no trouble navigating through all the tabs as well as related info ended up being truly simple to do to access. I recently found what I hoped for before you know it in the least. Quite unusual. Is likely to appreciate it for those who add forums or anything, website theme . a tones way for your client to communicate. Excellent task..
Thanks a lot for sharing this with all of us you really know what you are talking about! Bookmarked. Please additionally visit my website =). We could have a link exchange contract between us!
This is actually a stylish blog. I mean it. Could possibly have a whole lot of understanding of this issue, so that a lot of appreciation. Moreover, you may know how to make people honestly behind it, undoubtedly on the feedback. Youve got a structure here thats not too flashy, but an amazing statement as big as which you are stating. Good job, certainly.
Its like you read my mind! You seem to know a lot about this, like you wrote the book in it or something. I think that you can do with some pics to drive the message home a little bit, but instead of that, this is fantastic blog. A great read. I'll certainly be back.
I would like to express my respect for your kindness supporting persons that really need help with the area of interest. Your real commitment to getting the message along was surprisingly effective and have surely made associates like me to arrive at their goals. Your amazing insightful advice denotes so much a person like me and even more to my colleagues. Many thanks; from everyone of us.
Magnificent goods from you, man. I've understand your stuff previous to and you're just too magnificent. I really like what you have acquired here, certainly like what you're saying and the way in which you say it. You make it entertaining and you still care for to keep it sensible. I can not wait to read far more from you. This is actually a great web site.
Hello, Neat post. There is an issue with your site in internet explorer, would test this… IE nonetheless is the marketplace chief and a huge part of other people will omit your great writing due to this problem.
Fantastic goods from you, man. I've understand your stuff previous to and you are just too fantastic. I really like what you have acquired here, certainly like what you're stating and the way in which you say it. You make it enjoyable and you still take care of to keep it smart. I can not wait to read much more from you. This is actually a tremendous website.
certainly like your web site but you have to take a look at the spelling on several of your posts. Several of them are rife with spelling issues and I find it very bothersome to tell the truth on the other hand I'll definitely come back again.
I've recently started a site, the information you offer on this site has helped me tremendously. Thank you for all of your time & work. "One of the greatest pains to human nature is the pain of a new idea." by Walter Bagehot.
Useful information. Lucky me I found your site unintentionally, and I am shocked why this coincidence didn't came about earlier! I bookmarked it.
Keep up the good work , I read few content on this web site and I believe that your blog is really interesting and has bands of excellent information.
Real nice style and wonderful subject material , practically nothing else we require : D.
I was just searching for this info for some time. After six hours of continuous Googleing, at last I got it in your web site. I wonder what's the lack of Google strategy that do not rank this kind of informative web sites in top of the list. Generally the top sites are full of garbage.
Hello there, I discovered your website by the use of Google at the same time as looking for a similar topic, your web site came up, it appears to be like great. I have bookmarked it in my google bookmarks.
Useful information. Lucky me I found your site by accident, and I am stunned why this coincidence didn't came about earlier! I bookmarked it.
My husband and i were very excited that Edward could conclude his preliminary research through the ideas he came across while using the weblog. It's not at all simplistic just to happen to be giving freely ideas which the others have been making money from. And we all see we now have the website owner to thank for this. The most important explanations you made, the simple web site menu, the friendships you can give support to promote - it's everything amazing, and it is helping our son in addition to us reason why the issue is excellent, and that's exceptionally mandatory. Thank you for the whole lot!
Thank you for sharing superb informations. Your website is very cool. I'm impressed by the details that you've on this web site. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for more articles. You, my pal, ROCK! I found just the info I already searched all over the place and just couldn't come across. What a great website.
Some truly excellent information, Glad I observed this. "I have to be myself , I can't be no one else..." by Noah Gallagher.
Thank you for sharing superb informations. Your site is very cool. I'm impressed by the details that you've on this site. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for extra articles. You, my friend, ROCK! I found just the info I already searched everywhere and just could not come across. What a perfect website.
I've read a few good stuff here. Certainly price bookmarking for revisiting. I surprise how a lot attempt you put to create one of these fantastic informative website.
You are my aspiration , I possess few blogs and occasionally run out from to brand.I conceive this site contains some rattling great information for everyone. "A kiss, is the physical transgression of the mental connection which has already taken place." by Tanielle Naus.
you are truly a excellent webmaster. The web site loading speed is amazing. It sort of feels that you are doing any distinctive trick. In addition, The contents are masterwork. you've performed a fantastic process in this matter!
It is truly a nice and helpful piece of info. I¡¦m satisfied that you just shared this helpful information with us. Please stay us up to date like this. Thank you for sharing.
You can definitely see your enthusiasm in the work you write. The world hopes for more passionate writers like you who aren't afraid to mention how they believe. At all times go after your heart.
I and my guys appeared to be following the great procedures from the blog then instantly came up with a terrible feeling I had not thanked the web blog owner for those strategies. Those ladies became consequently joyful to learn them and now have without a doubt been taking advantage of them. Thank you for being very accommodating and then for considering these kinds of terrific topics millions of individuals are really wanting to be informed on. Our sincere regret for not expressing appreciation to sooner.
Hello my friend! I wish to say that this post is awesome, great written and include almost all important infos. I'd like to peer extra posts like this.
Thank you for helping out, superb information. "Nobody can be exactly like me. Sometimes even I have trouble doing it." by Tallulah Bankhead.
Excellent goods from you, man. I've understand your stuff previous to and you're just extremely great. I really like what you've acquired here, really like what you're stating and the way in which you say it. You make it entertaining and you still take care of to keep it wise. I can't wait to read much more from you. This is actually a great web site.
You can definitely see your expertise within the work you write. The arena hopes for even more passionate writers like you who are not afraid to mention how they believe. All the time go after your heart. "Billy Almon has all of his inlaw and outlaws here this afternoon." by Jerry Coleman.
Hi, Neat post. There's an issue along with your website in web explorer, could test this¡K IE nonetheless is the market leader and a big section of other folks will pass over your fantastic writing because of this problem.
You could definitely see your skills in the paintings you write. The sector hopes for even more passionate writers like you who aren't afraid to say how they believe. All the time follow your heart.
My wife and i felt very satisfied when Jordan managed to complete his investigation because of the ideas he obtained through your web site. It is now and again perplexing just to be releasing secrets that many other people could have been selling. And we all acknowledge we now have you to give thanks to because of that. All the illustrations you made, the simple website navigation, the relationships you will aid to create - it's got mostly extraordinary, and it is aiding our son in addition to the family do think the concept is exciting, and that is extraordinarily mandatory. Thank you for the whole lot!
I want to express my thanks to you for rescuing me from such a dilemma. Because of looking through the the net and finding things which were not powerful, I thought my life was over. Living without the presence of solutions to the issues you have fixed as a result of this website is a serious case, and the ones that would have badly affected my career if I hadn't noticed the website. Your main natural talent and kindness in playing with almost everything was very useful. I'm not sure what I would've done if I had not come across such a point like this. I'm able to at this moment relish my future. Thanks for your time very much for this specialized and amazing guide. I won't think twice to propose your blog post to anyone who will need direction on this topic.
I am curious to find out what blog platform you are utilizing? I'm having some minor security issues with my latest website and I'd like to find something more safeguarded. Do you have any recommendations?
Hello, Neat post. There is a problem with your site in internet explorer, may test this¡K IE still is the market chief and a large component of other people will omit your great writing due to this problem.
What i do not understood is actually how you're not really much more smartly-preferred than you might be now. You're very intelligent. You know therefore considerably in the case of this subject, made me in my view believe it from numerous varied angles. Its like men and women aren't involved unless it is something to do with Lady gaga! Your own stuffs great. At all times handle it up!
Awesome blog! Do you have any helpful hints for aspiring writers? I'm hoping to start my own website soon but I'm a little lost on everything. Would you advise starting with a free platform like Wordpress or go for a paid option? There are so many choices out there that I'm completely overwhelmed .. Any tips? Appreciate it!
Hi there, You have done an excellent job. I’ll definitely digg it and personally suggest to my friends. I'm confident they'll be benefited from this web site.
Hello! I could have sworn I've been to this site before but after browsing through some of the post I realized it's new to me. Anyhow, I'm definitely happy I found it and I'll be book-marking and checking back frequently!
Howdy! I know this is kind of off-topic however I had to ask. Does running a well-established blog such as yours take a lot of work? I'm brand new to operating a blog however I do write in my diary every day. I'd like to start a blog so I can share my own experience and thoughts online. Please let me know if you have any kind of recommendations or tips for brand new aspiring blog owners. Thankyou!
Admiring the dedication you put into your site and in depth information you present. It's good to come across a blog every once in a while that isn't the same out of date rehashed material. Wonderful read! I've bookmarked your site and I'm including your RSS feeds to my Google account.
Thank you a lot for sharing this with all people you really recognise what you're talking approximately! Bookmarked. Please additionally consult with my web site =). We can have a hyperlink change arrangement between us!
Many thanks for being the master on this field. I really liked the content a whole lot and most of all I was pleased with reading how you managed the problems I considered to be marked by controversy. You are at all times pretty kind to viewers appreciate me and aid me in my living. Many thanks.
Thanks for sharing excellent informations. Your web-site is so cool. I'm impressed by the details that you¡¦ve on this blog. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for more articles. You, my pal, ROCK! I found simply the information I already searched all over the place and just could not come across. What a great web-site.
I am only writing to make you know what a awesome encounter my wife's princess experienced browsing the blog. She came to understand numerous things, which include what it is like to have an incredible giving heart to let many more with ease learn about a number of tortuous topics. You really surpassed our expected results. Thank you for offering those effective, safe, revealing and in addition unique guidance on this topic to Jane.
Great tremendous issues here. I¡¦m very happy to see your article. Thanks a lot and i'm looking forward to touch you. Will you kindly drop me a mail?
Very good written information. It will be beneficial to anyone who employess it, including yours truly :). Keep up the good work - can'r wait to read more posts.
I have been exploring for a bit for any high quality articles or weblog posts on this sort of area . Exploring in Yahoo I finally stumbled upon this site. Studying this information So i¡¦m glad to show that I've a very good uncanny feeling I found out just what I needed. I so much certainly will make certain to do not put out of your mind this web site and provides it a glance on a continuing basis.
Hello there! I know this is kind of off topic but I was wondering which blog platform are you using for this website? I'm getting tired of Wordpress because I've had problems with hackers and I'm looking at options for another platform. I would be great if you could point me in the direction of a good platform.
I have learn several just right stuff here. Definitely value bookmarking for revisiting. I surprise how a lot attempt you set to create any such fantastic informative website.
It's a pity you don't have a donate button! I'd without a doubt donate to this brilliant blog! I suppose for now i'll settle for book-marking and adding your RSS feed to my Google account. I look forward to brand new updates and will share this site with my Facebook group. Talk soon!
My husband and i got very thrilled Louis could finish off his web research by way of the precious recommendations he received out of your web pages. It's not at all simplistic to simply be handing out ideas which often men and women may have been making money from. And we fully grasp we have the website owner to give thanks to for this. Those explanations you made, the simple website menu, the relationships you can aid to instill - it's got many incredible, and it is aiding our son in addition to the family imagine that this matter is entertaining, which is pretty serious. Thank you for all!
Howdy! This is my first comment here so I just wanted to give a quick shout out and say I really enjoy reading through your blog posts. Can you recommend any other blogs/websites/forums that deal with the same topics? Thanks for your time!
Good day! I know this is kinda off topic however , I'd figured I'd ask. Would you be interested in trading links or maybe guest authoring a blog article or vice-versa? My site addresses a lot of the same subjects as yours and I believe we could greatly benefit from each other. If you're interested feel free to send me an e-mail. I look forward to hearing from you! Excellent blog by the way!
Howdy outstanding website! Does running a blog such as this require a massive amount work? I have very little knowledge of programming but I was hoping to start my own blog soon. Anyhow, if you have any recommendations or techniques for new blog owners please share. I know this is off topic nevertheless I simply wanted to ask. Thank you!
Greetings! This is my first comment here so I just wanted to give a quick shout out and say I truly enjoy reading through your posts. Can you suggest any other blogs/websites/forums that go over the same subjects? Thanks a ton!
Currently it looks like Expression Engine is the preferred blogging platform out there right now. (from what I've read) Is that what you are using on your blog?
Hey there! I'm at work surfing around your blog from my new apple iphone! Just wanted to say I love reading through your blog and look forward to all your posts! Carry on the excellent work!
I have been exploring for a little for any high quality articles or weblog posts in this kind of area . Exploring in Yahoo I eventually stumbled upon this website. Reading this information So i¡¦m satisfied to show that I have a very good uncanny feeling I came upon just what I needed. I so much without a doubt will make certain to do not forget this web site and provides it a look regularly.
hi!,I really like your writing very much! percentage we communicate extra about your article on AOL? I require an expert in this house to resolve my problem. May be that's you! Having a look forward to look you.
I together with my pals ended up studying the great helpful hints located on your web site and so instantly I had a horrible suspicion I had not thanked the web site owner for them. These young boys came absolutely thrilled to see them and already have absolutely been taking pleasure in those things. Many thanks for genuinely so kind as well as for deciding upon these kinds of great topics millions of individuals are really eager to be informed on. Our own sincere apologies for not saying thanks to you sooner.
Valuable info. Fortunate me I found your web site by chance, and I'm stunned why this coincidence didn't came about earlier! I bookmarked it.
Hi! Quick question that's totally off topic. Do you know how to make your site mobile friendly? My web site looks weird when viewing from my iphone. I'm trying to find a template or plugin that might be able to resolve this problem. If you have any recommendations, please share. Many thanks!
Greetings! I know this is kinda off topic but I'd figured I'd ask. Would you be interested in trading links or maybe guest writing a blog article or vice-versa? My website discusses a lot of the same topics as yours and I feel we could greatly benefit from each other. If you happen to be interested feel free to send me an e-mail. I look forward to hearing from you! Wonderful blog by the way!
Heya! I'm at work surfing around your blog from my new apple iphone! Just wanted to say I love reading through your blog and look forward to all your posts! Carry on the outstanding work!
My partner and I absolutely love your blog and find many of your post's to be just what I'm looking for. Do you offer guest writers to write content to suit your needs? I wouldn't mind writing a post or elaborating on a number of the subjects you write in relation to here. Again, awesome website!
Fantastic website you have here but I was wondering if you knew of any user discussion forums that cover the same topics discussed here? I'd really like to be a part of online community where I can get feed-back from other knowledgeable people that share the same interest. If you have any recommendations, please let me know. Appreciate it!
Whoa! This blog looks just like my old one! It's on a completely different topic but it has pretty much the same layout and design. Outstanding choice of colors!
Great blog! Do you have any helpful hints for aspiring writers? I'm planning to start my own blog soon but I'm a little lost on everything. Would you suggest starting with a free platform like Wordpress or go for a paid option? There are so many choices out there that I'm completely confused .. Any suggestions? Cheers!
Hi! I know this is kinda off topic nevertheless I'd figured I'd ask. Would you be interested in trading links or maybe guest writing a blog article or vice-versa? My website discusses a lot of the same subjects as yours and I think we could greatly benefit from each other. If you're interested feel free to send me an email. I look forward to hearing from you! Excellent blog by the way!
Appreciating the hard work you put into your site and in depth information you offer. It's nice to come across a blog every once in a while that isn't the same unwanted rehashed material. Excellent read! I've saved your site and I'm including your RSS feeds to my Google account.
Hi there! I know this is kinda off topic nevertheless I'd figured I'd ask. Would you be interested in trading links or maybe guest writing a blog article or vice-versa? My website discusses a lot of the same topics as yours and I feel we could greatly benefit from each other. If you're interested feel free to shoot me an e-mail. I look forward to hearing from you! Wonderful blog by the way!
Hi! I understand this is somewhat off-topic however I had to ask. Does building a well-established website like yours require a massive amount work? I'm completely new to writing a blog however I do write in my journal every day. I'd like to start a blog so I can easily share my personal experience and views online. Please let me know if you have any ideas or tips for brand new aspiring bloggers. Appreciate it!
Greetings! This is my first comment here so I just wanted to give a quick shout out and say I really enjoy reading through your posts. Can you suggest any other blogs/websites/forums that go over the same topics? Thanks a ton!
It's a pity you don't have a donate button! I'd most certainly donate to this outstanding blog! I suppose for now i'll settle for book-marking and adding your RSS feed to my Google account. I look forward to brand new updates and will talk about this site with my Facebook group. Chat soon!
Hello! This is my first comment here so I just wanted to give a quick shout out and tell you I really enjoy reading through your blog posts. Can you recommend any other blogs/websites/forums that deal with the same subjects? Thanks a ton!
Greetings from Colorado! I'm bored to death at work so I decided to check out your website on my iphone during lunch break. I enjoy the info you present here and can't wait to take a look when I get home. I'm amazed at how quick your blog loaded on my mobile .. I'm not even using WIFI, just 3G .. Anyhow, very good site!
Woah! I'm really loving the template/theme of this website. It's simple, yet effective. A lot of times it's challenging to get that "perfect balance" between superb usability and visual appeal. I must say you've done a awesome job with this. Also, the blog loads extremely fast for me on Opera. Outstanding Blog!
Great post. I was checking continuously this blog and I'm impressed! Extremely helpful info particularly the last part :) I care for such info much. I was looking for this particular info for a long time. Thank you and good luck.
Wonderful website. A lot of useful information here. I am sending it to a few friends ans also sharing in delicious. And obviously, thanks to your sweat!
Fantastic website. Lots of useful information here. I am sending it to several pals ans also sharing in delicious. And of course, thanks on your effort!
hi!,I really like your writing so a lot! percentage we be in contact more approximately your article on AOL? I require an expert in this house to solve my problem. May be that's you! Taking a look forward to peer you.
Hello.This article was extremely motivating, particularly because I was browsing for thoughts on this topic last couple of days.
I'm extremely impressed with your writing skills as well as with the layout on your blog. Is this a paid theme or did you customize it yourself? Either way keep up the nice quality writing, it is rare to see a great blog like this one today..
Hello great blog! Does running a blog such as this require a great deal of work? I have no expertise in coding but I had been hoping to start my own blog soon. Anyway, should you have any suggestions or tips for new blog owners please share. I know this is off subject nevertheless I simply had to ask. Cheers!
Please let me know if you're looking for a writer for your weblog. You have some really great posts and I think I would be a good asset. If you ever want to take some of the load off, I'd absolutely love to write some material for your blog in exchange for a link back to mine. Please shoot me an e-mail if interested. Thank you!
Hello there I am so grateful I found your webpage, I really found you by accident, while I was searching on Yahoo for something else, Nonetheless I am here now and would just like to say thanks a lot for a marvelous post and a all round interesting blog (I also love the theme/design), I don’t have time to look over it all at the moment but I have bookmarked it and also added your RSS feeds, so when I have time I will be back to read much more, Please do keep up the excellent work.
Do you mind if I quote a couple of your articles as long as I provide credit and sources back to your webpage? My website is in the exact same niche as yours and my users would certainly benefit from some of the information you provide here. Please let me know if this alright with you. Many thanks!
I'll immediately clutch your rss feed as I can not to find your e-mail subscription link or e-newsletter service. Do you've any? Please let me know in order that I may just subscribe. Thanks.
I am curious to find out what blog system you're using? I'm experiencing some small security problems with my latest site and I'd like to find something more safeguarded. Do you have any solutions?
Hi there! I understand this is sort of off-topic however I needed to ask. Does managing a well-established blog like yours require a massive amount work? I am completely new to blogging but I do write in my journal everyday. I'd like to start a blog so I will be able to share my personal experience and thoughts online. Please let me know if you have any ideas or tips for new aspiring blog owners. Appreciate it!
I needed to draft you that bit of note in order to give thanks again just for the precious concepts you've provided in this article. It was really wonderfully open-handed of you to allow easily exactly what a lot of folks could possibly have distributed for an e-book to make some cash for themselves, specifically seeing that you might well have tried it in the event you wanted. Those suggestions in addition worked to become fantastic way to realize that the rest have the identical keenness like my very own to see good deal more around this problem. I'm sure there are some more fun sessions in the future for folks who looked at your website.
Great amazing things here. I am very satisfied to look your article. Thanks so much and i am taking a look forward to touch you. Will you please drop me a mail?
hey there and thank you for your information – I have definitely picked up anything new from right here. I did however expertise some technical issues using this website, since I experienced to reload the site a lot of times previous to I could get it to load properly. I had been wondering if your web hosting is OK? Not that I am complaining, but slow loading instances times will sometimes affect your placement in google and could damage your high quality score if ads and marketing with Adwords. Well I’m adding this RSS to my email and could look out for a lot more of your respective fascinating content. Ensure that you update this again soon..
Great remarkable things here. I am very satisfied to see your post. Thank you so much and i'm taking a look ahead to touch you. Will you please drop me a mail?
You actually make it appear really easy together with your presentation however I find this topic to be really something which I think I might by no means understand. It seems too complex and very extensive for me. I am looking forward on your next post, I will attempt to get the dangle of it!
Wonderful web site. A lot of useful info here. I'm sending it to some pals ans also sharing in delicious. And naturally, thanks in your sweat!
I was just seeking this information for some time. After six hours of continuous Googleing, at last I got it in your website. I wonder what is the lack of Google strategy that don't rank this kind of informative websites in top of the list. Usually the top web sites are full of garbage.
Thanks for another wonderful post. The place else could anybody get that kind of info in such a perfect means of writing? I have a presentation subsequent week, and I'm at the look for such information.
Hey fantastic blog! Does running a blog like this require a large amount of work? I have absolutely no expertise in computer programming but I was hoping to start my own blog in the near future. Anyways, should you have any suggestions or techniques for new blog owners please share. I understand this is off topic nevertheless I simply wanted to ask. Thank you!
Please let me know if you're looking for a writer for your site. You have some really great posts and I think I would be a good asset. If you ever want to take some of the load off, I'd really like to write some content for your blog in exchange for a link back to mine. Please shoot me an email if interested. Regards!
Hey! Quick question that's completely off topic. Do you know how to make your site mobile friendly? My weblog looks weird when viewing from my iphone4. I'm trying to find a template or plugin that might be able to correct this problem. If you have any suggestions, please share. Thank you!
Woah! I'm really loving the template/theme of this website. It's simple, yet effective. A lot of times it's hard to get that "perfect balance" between user friendliness and visual appearance. I must say that you've done a great job with this. Additionally, the blog loads super fast for me on Safari. Superb Blog!
Hello would you mind letting me know which hosting company you're using? I've loaded your blog in 3 different browsers and I must say this blog loads a lot faster then most. Can you recommend a good web hosting provider at a reasonable price? Thank you, I appreciate it!
Greetings I am so grateful I found your blog, I really found you by mistake, while I was researching on Aol for something else, Anyways I am here now and would just like to say kudos for a remarkable post and a all round entertaining blog (I also love the theme/design), I don’t have time to browse it all at the minute but I have saved it and also added your RSS feeds, so when I have time I will be back to read a great deal more, Please do keep up the superb job.
Hello I am so happy I found your blog page, I really found you by error, while I was looking on Bing for something else, Nonetheless I am here now and would just like to say thanks a lot for a tremendous post and a all round entertaining blog (I also love the theme/design), I don’t have time to look over it all at the minute but I have book-marked it and also added in your RSS feeds, so when I have time I will be back to read much more, Please do keep up the fantastic work.
great issues altogether, you just received a new reader. What would you suggest in regards to your submit that you just made some days in the past? Any sure?
Wow, superb blog structure! How long have you been running a blog for? you made blogging look easy. The whole look of your website is wonderful, let alone the content material!
Just want to say your article is as amazing. The clearness in your post is simply great and i can assume you are an expert on this subject. Well with your permission let me to grab your RSS feed to keep updated with forthcoming post. Thanks a million and please keep up the enjoyable work.
I in addition to my guys happened to be digesting the best tips and tricks on your site then unexpectedly I had an awful feeling I never expressed respect to the site owner for those techniques. The young men are actually as a result happy to read through all of them and have now absolutely been having fun with these things. We appreciate you really being simply kind and for selecting certain helpful things millions of individuals are really desperate to be informed on. My very own honest apologies for not expressing appreciation to you sooner.
I definitely wanted to write down a message in order to say thanks to you for all the superb pointers you are posting on this website. My particularly long internet investigation has at the end been rewarded with incredibly good insight to go over with my contacts. I would admit that many of us site visitors actually are undoubtedly endowed to be in a notable community with so many awesome people with good opinions. I feel somewhat blessed to have used your entire weblog and look forward to so many more pleasurable minutes reading here. Thanks a lot again for everything.
Do you mind if I quote a few of your posts as long as I provide credit and sources back to your weblog? My blog is in the very same niche as yours and my visitors would definitely benefit from some of the information you provide here. Please let me know if this alright with you. Thank you!
Please let me know if you're looking for a author for your blog. You have some really great posts and I think I would be a good asset. If you ever want to take some of the load off, I'd absolutely love to write some articles for your blog in exchange for a link back to mine. Please shoot me an e-mail if interested. Regards!
Good day! This post couldn't be written any better! Reading through this post reminds me of my previous room mate! He always kept talking about this. I will forward this page to him. Fairly certain he will have a good read. Many thanks for sharing!
First off I want to say great blog! I had a quick question in which I'd like to ask if you don't mind. I was interested to find out how you center yourself and clear your thoughts before writing. I have had difficulty clearing my thoughts in getting my ideas out. I truly do take pleasure in writing but it just seems like the first 10 to 15 minutes are usually lost just trying to figure out how to begin. Any suggestions or hints? Kudos!
Thanks for the marvelous posting! I seriously enjoyed reading it, you are a great author.I will be sure to bookmark your blog and definitely will come back later in life. I want to encourage continue your great job, have a nice evening!
Thanks for a marvelous posting! I certainly enjoyed reading it, you happen to be a great author.I will be sure to bookmark your blog and will eventually come back very soon. I want to encourage you to ultimately continue your great work, have a nice evening!
Please let me know if you're looking for a author for your site. You have some really great articles and I feel I would be a good asset. If you ever want to take some of the load off, I'd really like to write some articles for your blog in exchange for a link back to mine. Please shoot me an email if interested. Thanks!
I'm really loving the theme/design of your web site. Do you ever run into any internet browser compatibility issues? A couple of my blog readers have complained about my blog not working correctly in Explorer but looks great in Safari. Do you have any suggestions to help fix this problem?
Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your website? My website is in the very same niche as yours and my users would certainly benefit from some of the information you provide here. Please let me know if this alright with you. Regards!
Have you ever considered about including a little bit more than just your articles? I mean, what you say is valuable and everything. But think of if you added some great photos or videos to give your posts more, "pop"! Your content is excellent but with pics and videos, this website could undeniably be one of the very best in its field. Terrific blog!
Hi, Neat post. There's a problem along with your website in internet explorer, could check this… IE nonetheless is the marketplace leader and a huge element of people will pass over your excellent writing due to this problem.
I do accept as true with all of the ideas you have introduced to your post. They are very convincing and will certainly work. Nonetheless, the posts are too short for beginners. May just you please extend them a little from next time? Thanks for the post.
Just wish to say your article is as astonishing. The clearness in your post is simply cool and i can assume you're an expert on this subject. Well with your permission let me to grab your RSS feed to keep up to date with forthcoming post. Thanks a million and please keep up the gratifying work.
It's a shame you don't have a donate button! I'd without a doubt donate to this excellent blog! I guess for now i'll settle for bookmarking and adding your RSS feed to my Google account. I look forward to fresh updates and will share this website with my Facebook group. Chat soon!
My spouse and i felt very ecstatic Ervin could round up his reports because of the ideas he acquired using your blog. It's not at all simplistic to simply be making a gift of methods that a number of people have been selling. And we also realize we need you to be grateful to because of that. The illustrations you have made, the simple web site menu, the relationships your site give support to foster - it's got most astonishing, and it is leading our son in addition to our family imagine that the situation is fun, and that is really pressing. Thanks for all the pieces!
Superb post however , I was wanting to know if you could write a litte more on this subject? I'd be very grateful if you could elaborate a little bit more. Bless you!
Hi there fantastic blog! Does running a blog like this take a great deal of work? I've absolutely no knowledge of coding however I was hoping to start my own blog soon. Anyhow, should you have any ideas or techniques for new blog owners please share. I understand this is off subject nevertheless I simply needed to ask. Kudos!
Greetings from Los angeles! I'm bored to tears at work so I decided to browse your website on my iphone during lunch break. I really like the information you provide here and can't wait to take a look when I get home. I'm amazed at how quick your blog loaded on my phone .. I'm not even using WIFI, just 3G .. Anyhow, wonderful blog!
I do trust all the ideas you have offered in your post. They are really convincing and can certainly work. Nonetheless, the posts are too brief for novices. May you please lengthen them a bit from next time? Thanks for the post.
I'm extremely impressed with your writing skills as well as with the layout on your blog. Is this a paid theme or did you modify it yourself? Anyway keep up the nice quality writing, it’s rare to see a nice blog like this one these days..
I think other web-site proprietors should take this web site as an model, very clean and great user genial style and design, as well as the content. You're an expert in this topic!
Simply desire to say your article is as surprising. The clearness in your post is just nice and i can assume you are an expert on this subject. Well with your permission let me to grab your RSS feed to keep up to date with forthcoming post. Thanks a million and please keep up the enjoyable work.
Very good written information. It will be beneficial to anybody who employess it, including yours truly :). Keep up the good work - for sure i will check out more posts.
Thanks for all your hard work on this blog. My niece delights in carrying out internet research and it is easy to see why. I know all regarding the lively ways you offer practical strategies on the website and increase contribution from other individuals about this issue plus my simple princess is truly studying a lot of things. Enjoy the remaining portion of the new year. Your conducting a remarkable job.
You are my intake, I own few blogs and often run out from post :). "Fiat justitia et pereat mundus.Let justice be done, though the world perish." by Ferdinand I.
We absolutely love your blog and find many of your post's to be exactly I'm looking for. Do you offer guest writers to write content for you personally? I wouldn't mind producing a post or elaborating on a few of the subjects you write related to here. Again, awesome web log!
Howdy, i read your blog from time to time and i own a similar one and i was just curious if you get a lot of spam responses? If so how do you protect against it, any plugin or anything you can advise? I get so much lately it's driving me insane so any help is very much appreciated.
Really wonderful information can be found on blog . "The absence of flaw in beauty is itself a flaw." by Havelock Ellis.
Generally I don't learn article on blogs, however I would like to say that this write-up very pressured me to take a look at and do it! Your writing style has been amazed me. Thank you, quite great post.
I really wanted to jot down a small remark so as to thank you for the amazing points you are giving out on this website. My time intensive internet investigation has at the end of the day been honored with beneficial suggestions to exchange with my company. I would believe that many of us website visitors actually are quite fortunate to be in a magnificent community with many perfect professionals with helpful tips. I feel somewhat blessed to have come across the web site and look forward to plenty of more fabulous moments reading here. Thanks once again for a lot of things.
Good blog! I truly love how it is easy on my eyes and the data are well written. I am wondering how I might be notified whenever a new post has been made. I've subscribed to your feed which must do the trick! Have a nice day!
You really make it appear so easy together with your presentation but I in finding this matter to be really one thing that I feel I might never understand. It seems too complicated and extremely broad for me. I am having a look ahead for your subsequent put up, I¡¦ll try to get the cling of it!
Wow, fantastic blog format! How lengthy have you ever been blogging for? you made running a blog look easy. The total look of your site is great, as neatly as the content!
Wow, fantastic weblog layout! How lengthy have you been blogging for? you made running a blog glance easy. The overall glance of your site is magnificent, as well as the content material!
magnificent points altogether, you just received a new reader. What might you recommend about your post that you simply made a few days ago? Any certain?
Whats Happening i am new to this, I stumbled upon this I have discovered It positively useful and it has helped me out loads. I hope to contribute & assist different customers like its aided me. Great job.
Hi there, just became aware of your blog through Google, and found that it's truly informative. I am gonna watch out for brussels. I will be grateful if you continue this in future. Lots of people will be benefited from your writing. Cheers!
Hello, Neat post. There is an issue together with your web site in web explorer, could check this¡K IE nonetheless is the market chief and a good part of folks will omit your magnificent writing because of this problem.
Have you ever thought about adding a little bit more than just your articles? I mean, what you say is important and all. However imagine if you added some great pictures or videos to give your posts more, "pop"! Your content is excellent but with images and clips, this blog could certainly be one of the most beneficial in its niche. Amazing blog!
My developer is trying to convince me to move to .net from PHP. I have always disliked the idea because of the costs. But he's tryiong none the less. I've been using Movable-type on several websites for about a year and am nervous about switching to another platform. I have heard good things about blogengine.net. Is there a way I can import all my wordpress posts into it? Any help would be greatly appreciated!
Have you ever considered creating an e-book or guest authoring on other blogs? I have a blog based on the same ideas you discuss and would love to have you share some stories/information. I know my viewers would enjoy your work. If you're even remotely interested, feel free to shoot me an e-mail.
Howdy would you mind sharing which blog platform you're working with? I'm looking to start my own blog in the near future but I'm having a hard time choosing between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I'm looking for something unique. P.S My apologies for getting off-topic but I had to ask!
I'm really enjoying the theme/design of your site. Do you ever run into any browser compatibility problems? A few of my blog readers have complained about my website not operating correctly in Explorer but looks great in Opera. Do you have any recommendations to help fix this problem?
Hello, Neat post. There is an issue with your web site in web explorer, might test this¡K IE still is the market chief and a large part of folks will pass over your fantastic writing due to this problem.
I was just looking for this information for some time. After six hours of continuous Googleing, finally I got it in your web site. I wonder what is the lack of Google strategy that do not rank this kind of informative sites in top of the list. Normally the top sites are full of garbage.
What i don't understood is in truth how you are now not really a lot more smartly-liked than you might be now. You are very intelligent. You understand therefore significantly in the case of this subject, made me individually consider it from so many varied angles. Its like women and men aren't fascinated until it is something to do with Lady gaga! Your individual stuffs outstanding. At all times care for it up!
Simply want to say your article is as astonishing. The clearness in your post is just great and i could assume you are an expert on this subject. Well with your permission let me to grab your feed to keep up to date with forthcoming post. Thanks a million and please carry on the enjoyable work.
Hi there, just became alert to your blog through Google, and found that it's really informative. I’m going to watch out for brussels. I’ll appreciate if you continue this in future. Many people will be benefited from your writing. Cheers!
I want to express my gratitude for your kindness supporting visitors who must have assistance with in this situation. Your special dedication to passing the message throughout was really beneficial and has usually empowered ladies like me to realize their objectives. Your new insightful key points denotes a great deal to me and even more to my office colleagues. Thanks a lot; from everyone of us.
Hey! I know this is somewhat off topic but I was wondering which blog platform are you using for this website? I'm getting sick and tired of Wordpress because I've had issues with hackers and I'm looking at alternatives for another platform. I would be great if you could point me in the direction of a good platform.
Woah! I'm really digging the template/theme of this website. It's simple, yet effective. A lot of times it's very hard to get that "perfect balance" between superb usability and visual appeal. I must say that you've done a excellent job with this. Also, the blog loads super fast for me on Internet explorer. Superb Blog!
Hello there! Quick question that's entirely off topic. Do you know how to make your site mobile friendly? My weblog looks weird when viewing from my iphone. I'm trying to find a template or plugin that might be able to resolve this issue. If you have any recommendations, please share. Cheers!
My spouse and i were very fulfilled that Michael managed to deal with his basic research while using the precious recommendations he made out of your blog. It's not at all simplistic just to find yourself making a gift of concepts which often the rest have been selling. So we do know we now have the blog owner to give thanks to for that. These illustrations you made, the easy blog menu, the friendships you can give support to instill - it's everything remarkable, and it's really letting our son in addition to us imagine that this situation is satisfying, which is certainly particularly indispensable. Many thanks for all!
Hey! I know this is somewhat off-topic however I had to ask. Does operating a well-established blog such as yours take a large amount of work? I'm brand new to blogging but I do write in my journal on a daily basis. I'd like to start a blog so I can easily share my experience and thoughts online. Please let me know if you have any suggestions or tips for new aspiring bloggers. Appreciate it!
Hi I am so delighted I found your website, I really found you by error, while I was looking on Aol for something else, Anyways I am here now and would just like to say thanks for a marvelous post and a all round interesting blog (I also love the theme/design), I don’t have time to read through it all at the moment but I have bookmarked it and also added your RSS feeds, so when I have time I will be back to read a great deal more, Please do keep up the great work.
Hola! I've been reading your site for a while now and finally got the courage to go ahead and give you a shout out from Kingwood Texas! Just wanted to mention keep up the excellent work!
magnificent points altogether, you simply won a logo new reader. What may you recommend about your post that you just made some days ago? Any positive?
Hiya! Quick question that's completely off topic. Do you know how to make your site mobile friendly? My blog looks weird when viewing from my apple iphone. I'm trying to find a template or plugin that might be able to resolve this issue. If you have any suggestions, please share. Thank you!
I enjoy what you guys are up too. This sort of clever work and exposure! Keep up the good works guys I've added you guys to our blogroll.
Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your weblog? My blog is in the very same niche as yours and my users would truly benefit from a lot of the information you provide here. Please let me know if this alright with you. Thanks!
Hello my loved one! I wish to say that this article is awesome, great written and come with almost all significant infos. I would like to look extra posts like this.
My partner and I stumbled over here coming from a different web page and thought I should check things out. I like what I see so i am just following you. Look forward to exploring your web page yet again.
hi!,I like your writing very so much! percentage we communicate extra approximately your article on AOL? I need a specialist on this area to solve my problem. Maybe that's you! Looking forward to see you.
Very efficiently written post. It will be beneficial to everyone who utilizes it, as well as yours truly :). Keep doing what you are doing - for sure i will check out more posts.
My spouse and i felt now glad that Ervin managed to finish up his studies through the entire ideas he came across in your web page. It's not at all simplistic to just choose to be giving for free procedures that many people might have been selling. We really do understand we've got the blog owner to appreciate for that. The most important explanations you've made, the straightforward web site navigation, the relationships your site aid to instill - it is most fantastic, and it is facilitating our son in addition to our family reason why that matter is amusing, which is certainly very vital. Many thanks for everything!
I'm still learning from you, as I'm making my way to the top as well. I absolutely liked reading everything that is written on your site.Keep the posts coming. I enjoyed it!
Hi, i think that i saw you visited my site so i came to “return the favor”.I'm trying to find things to enhance my website!I suppose its ok to use a few of your ideas!!
I simply wished to say thanks all over again. I do not know the things I could possibly have undertaken in the absence of those thoughts shown by you regarding such situation. It was before a real terrifying concern for me, however , noticing a specialised style you managed it forced me to cry for delight. Now i'm thankful for the guidance and in addition have high hopes you comprehend what an amazing job you're undertaking training many people through your website. More than likely you have never come across all of us.
What i do not realize is if truth be told how you're now not actually much more well-preferred than you may be now. You are so intelligent. You recognize thus considerably on the subject of this matter, made me individually believe it from a lot of varied angles. Its like men and women don't seem to be involved unless it¡¦s one thing to do with Lady gaga! Your personal stuffs outstanding. At all times care for it up!
Thanks for another excellent article. Where else may just anybody get that kind of information in such a perfect manner of writing? I have a presentation subsequent week, and I'm on the look for such information.
Someone necessarily lend a hand to make significantly articles I might state. That is the first time I frequented your web page and up to now? I surprised with the analysis you made to create this actual put up amazing. Excellent activity!
I was just looking for this information for some time. After 6 hours of continuous Googleing, finally I got it in your web site. I wonder what is the lack of Google strategy that do not rank this kind of informative websites in top of the list. Generally the top sites are full of garbage.
I¡¦ve read several good stuff here. Definitely price bookmarking for revisiting. I surprise how a lot effort you set to create the sort of great informative web site.
Generally I don't read article on blogs, but I wish to say that this write-up very compelled me to try and do so! Your writing style has been amazed me. Thanks, quite nice post.
Hello I am so happy I found your blog, I really found you by accident, while I was searching on Bing for something else, Regardless I am here now and would just like to say thank you for a tremendous post and a all round enjoyable blog (I also love the theme/design), I don’t have time to browse it all at the minute but I have saved it and also included your RSS feeds, so when I have time I will be back to read a lot more, Please do keep up the superb job.
Hey! Someone in my Facebook group shared this site with us so I came to look it over. I'm definitely loving the information. I'm book-marking and will be tweeting this to my followers! Great blog and wonderful design and style.
Hello! I know this is somewhat off topic but I was wondering which blog platform are you using for this website? I'm getting tired of Wordpress because I've had problems with hackers and I'm looking at alternatives for another platform. I would be great if you could point me in the direction of a good platform.
Please let me know if you're looking for a writer for your blog. You have some really great articles and I believe I would be a good asset. If you ever want to take some of the load off, I'd love to write some material for your blog in exchange for a link back to mine. Please shoot me an email if interested. Cheers!
I was just seeking this information for a while. After 6 hours of continuous Googleing, at last I got it in your web site. I wonder what's the lack of Google strategy that do not rank this kind of informative web sites in top of the list. Generally the top sites are full of garbage.
It is the best time to make some plans for the future and it is time to be happy. I've read this post and if I could I desire to suggest you some interesting things or advice. Maybe you could write next articles referring to this article. I want to read even more things about it!
Thanks for sharing superb informations. Your web-site is so cool. I am impressed by the details that you have on this blog. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for more articles. You, my pal, ROCK! I found just the info I already searched everywhere and simply could not come across. What an ideal site.
Hey there, You have done a great job. I will definitely digg it and personally recommend to my friends. I'm sure they will be benefited from this site.
Please let me know if you're looking for a article writer for your weblog. You have some really great articles and I believe I would be a good asset. If you ever want to take some of the load off, I'd absolutely love to write some material for your blog in exchange for a link back to mine. Please send me an e-mail if interested. Thanks!
Hello! I know this is kinda off topic however I'd figured I'd ask. Would you be interested in exchanging links or maybe guest authoring a blog article or vice-versa? My site goes over a lot of the same subjects as yours and I think we could greatly benefit from each other. If you are interested feel free to shoot me an e-mail. I look forward to hearing from you! Terrific blog by the way!
Hi there! This is my first comment here so I just wanted to give a quick shout out and say I truly enjoy reading your blog posts. Can you suggest any other blogs/websites/forums that cover the same subjects? Appreciate it!
Appreciating the time and effort you put into your blog and in depth information you offer. It's great to come across a blog every once in a while that isn't the same old rehashed information. Fantastic read! I've bookmarked your site and I'm including your RSS feeds to my Google account.
I needed to create you the very small note just to give thanks over again for these great knowledge you have provided above. It's simply surprisingly open-handed of you to deliver freely precisely what a few people would have marketed as an electronic book to get some dough on their own, and in particular considering that you could possibly have done it in the event you decided. These pointers as well worked to become a good way to recognize that other people online have the identical zeal like my very own to realize a good deal more regarding this condition. I'm sure there are many more pleasurable moments in the future for individuals that examine your website.
I'm still learning from you, but I'm trying to reach my goals. I certainly love reading everything that is written on your website.Keep the aarticles coming. I enjoyed it!
Thanks so much for giving everyone a very nice possiblity to read in detail from this blog. It is always very good and also stuffed with amusement for me personally and my office acquaintances to visit your web site at least thrice in a week to read through the newest things you will have. And of course, I'm always fulfilled with the sensational ideas you give. Certain two facts on this page are in truth the most effective I've had.
Wow! This could be one particular of the most beneficial blogs We've ever arrive across on this subject. Actually Wonderful. I am also a specialist in this topic so I can understand your hard work.
Hi! This is my first comment here so I just wanted to give a quick shout out and say I really enjoy reading through your blog posts. Can you suggest any other blogs/websites/forums that go over the same topics? Appreciate it!
Hi there I am so glad I found your weblog, I really found you by accident, while I was browsing on Bing for something else, Regardless I am here now and would just like to say thanks for a marvelous post and a all round interesting blog (I also love the theme/design), I don’t have time to look over it all at the moment but I have saved it and also included your RSS feeds, so when I have time I will be back to read much more, Please do keep up the superb work.
You actually make it seem so easy with your presentation but I to find this topic to be really one thing which I think I'd never understand. It kind of feels too complicated and very broad for me. I am looking forward in your next post, I will attempt to get the hang of it!
What i don't understood is in fact how you are now not really a lot more neatly-preferred than you may be now. You are so intelligent. You recognize therefore considerably on the subject of this subject, produced me in my opinion believe it from a lot of varied angles. Its like men and women don't seem to be interested except it is something to do with Lady gaga! Your individual stuffs outstanding. Always handle it up!
Great awesome things here. I am very satisfied to look your post. Thanks a lot and i am looking ahead to contact you. Will you please drop me a e-mail?
Great remarkable things at this site. Now I am really grateful to peer this page. Thanks very much and i am looking forward to contact you. Would you like to please drop me an e-mail?
Hey there! Someone in my Facebook group shared this website with us so I came to give it a look. I'm definitely enjoying the information. I'm bookmarking and will be tweeting this to my followers! Great blog and outstanding style and design.
With havin so much content and articles do you ever run into any issues of plagorism or copyright infringement? My website has a lot of exclusive content I've either written myself or outsourced but it seems a lot of it is popping it up all over the web without my authorization. Do you know any methods to help stop content from being stolen? I'd genuinely appreciate it.
I am curious to find out what blog system you have been working with? I'm having some small security issues with my latest blog and I would like to find something more safeguarded. Do you have any suggestions?
Hi there, I discovered your website by the use of Google whilst searching for a related subject, your web site got here up, it appears great. I've bookmarked it in my google bookmarks.
Hi there I am so delighted I found your website, I really found you by mistake, while I was researching on Yahoo for something else, Nonetheless I am here now and would just like to say kudos for a tremendous post and a all round enjoyable blog (I also love the theme/design), I don’t have time to look over it all at the minute but I have bookmarked it and also included your RSS feeds, so when I have time I will be back to read a great deal more, Please do keep up the excellent job.
With havin so much content do you ever run into any problems of plagorism or copyright violation? My blog has a lot of unique content I've either written myself or outsourced but it looks like a lot of it is popping it up all over the internet without my authorization. Do you know any ways to help reduce content from being ripped off? I'd certainly appreciate it.
Fantastic goods from you, man. I have understand your stuff previous to and you are just too magnificent. I actually like what you have acquired here, certainly like what you are saying and the way in which you say it. You make it entertaining and you still take care of to keep it sensible. I can't wait to read far more from you. This is actually a tremendous site.
I've been browsing on-line more than 3 hours today, yet I by no means discovered any attention-grabbing article like yours. It¡¦s pretty worth enough for me. Personally, if all website owners and bloggers made good content as you probably did, the internet might be a lot more useful than ever before.
Thank you for sharing superb informations. Your web site is very cool. I am impressed by the details that you¡¦ve on this website. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for more articles. You, my pal, ROCK! I found simply the info I already searched all over the place and simply could not come across. What an ideal website.
Needed to put you that very small remark in order to say thanks as before over the extraordinary tips you've shown on this site. It has been quite shockingly open-handed with people like you to grant publicly precisely what many individuals would've advertised as an ebook to earn some money for themselves, most importantly since you could possibly have tried it in the event you desired. Those concepts likewise worked to provide a fantastic way to comprehend other people have similar eagerness just as mine to find out a lot more in respect of this matter. I'm sure there are thousands of more pleasant situations ahead for individuals who looked over your site.
Thanks , I've recently been looking for information approximately this topic for ages and yours is the greatest I have discovered till now. But, what concerning the bottom line? Are you certain about the supply?
Needed to write you the bit of observation to be able to give many thanks yet again for the precious thoughts you have featured on this site. It has been certainly surprisingly open-handed of people like you to provide easily all that most of us might have offered for sale as an e-book to end up making some profit for themselves, most notably given that you could have tried it if you decided. The strategies in addition worked to become a fantastic way to recognize that other individuals have the identical interest just as my personal own to know much more on the subject of this issue. I'm certain there are some more pleasant periods up front for many who read through your blog.
You could certainly see your expertise in the work you write. The sector hopes for even more passionate writers such as you who aren't afraid to mention how they believe. At all times go after your heart.
We're a group of volunteers and opening a new scheme in our community. Your website provided us with valuable info to work on. You've done a formidable job and our entire community will be grateful to you.
Wow! This could be one particular of the most beneficial blogs We have ever arrive across on this subject. Basically Fantastic. I'm also an expert in this topic so I can understand your effort.
I have been exploring for a little bit for any high-quality articles or weblog posts on this sort of space . Exploring in Yahoo I at last stumbled upon this site. Reading this info So i am happy to show that I've an incredibly good uncanny feeling I came upon exactly what I needed. I such a lot definitely will make sure to do not disregard this site and give it a look on a constant basis.
Thanks for your own efforts on this web page. Ellie enjoys getting into research and it's really easy to see why. I learn all regarding the compelling ways you give great items via this website and even strongly encourage response from people on this situation plus our favorite princess is actually discovering a whole lot. Take pleasure in the remaining portion of the new year. You are doing a really great job.
I simply want to tell you that I am new to weblog and really loved your page. More than likely I’m likely to bookmark your blog . You absolutely have very good posts. Thank you for revealing your website page.
Pretty nice post. I just stumbled upon your weblog and wished to say that I have really enjoyed browsing your weblog posts. After all I will be subscribing to your feed and I'm hoping you write again soon!
What i don't understood is in truth how you are not actually a lot more well-preferred than you may be right now. You are so intelligent. You already know thus significantly with regards to this matter, produced me individually imagine it from numerous various angles. Its like women and men don't seem to be fascinated unless it is something to accomplish with Lady gaga! Your own stuffs nice. All the time maintain it up!
I simply wished to thank you so much again. I am not sure the things that I could possibly have carried out in the absence of the type of ideas contributed by you relating to such a situation. Certainly was a real alarming case for me personally, however , understanding the well-written tactic you solved that took me to cry for happiness. Now i'm thankful for the work as well as wish you comprehend what a powerful job that you are accomplishing instructing the others via your webblog. Probably you haven't got to know any of us.
hi!,I love your writing very a lot! proportion we keep in touch more approximately your post on AOL? I need an expert in this space to unravel my problem. May be that's you! Looking forward to see you.
Somebody essentially help to make critically articles I would state. That is the very first time I frequented your website page and thus far? I surprised with the research you made to make this actual post incredible. Wonderful process!
Hello There. I found your blog the use of msn. This is a very well written article. I'll be sure to bookmark it and come back to learn more of your useful info. Thanks for the post. I will certainly comeback.
Thank you so much for giving everyone remarkably wonderful chance to read in detail from this blog. It can be very amazing and full of a lot of fun for me and my office peers to visit your website no less than 3 times weekly to learn the new guidance you have got. And lastly, I am also usually fulfilled with your effective ideas served by you. Some two tips in this posting are undeniably the most impressive we've had.
Hello, Neat post. There is a problem with your web site in internet explorer, would test this¡K IE still is the market leader and a huge component of people will leave out your fantastic writing because of this problem.
hi!,I really like your writing very a lot! percentage we keep in touch more about your post on AOL? I need an expert in this house to resolve my problem. May be that's you! Taking a look ahead to peer you.
I do accept as true with all the ideas you have presented for your post. They're really convincing and can certainly work. Still, the posts are too short for starters. May you please extend them a bit from subsequent time? Thank you for the post.
Hi! I simply would like to offer you a big thumbs up for your great information you have right here on this post. I will be coming back to your web site for more soon.
magnificent points altogether, you simply gained a brand new reader. What could you suggest about your submit that you just made a few days in the past? Any certain?
Hello there, just became alert to your blog through Google, and found that it's truly informative. I am gonna watch out for brussels. I’ll be grateful if you continue this in future. Numerous people will be benefited from your writing. Cheers!
magnificent put up, very informative. I’m wondering why the opposite specialists of this sector don’t understand this. You must proceed your writing. I am sure, you’ve a huge readers’ base already!
I precisely had to thank you very much again. I do not know the things I would've created without the type of hints shown by you on such a problem. Entirely was an absolute depressing circumstance for me personally, but noticing the specialized technique you dealt with it forced me to leap over joy. I will be happier for your advice and even hope that you find out what a great job you are always accomplishing teaching people through your webpage. I am sure you have never got to know any of us.
wonderful publish, very informative. I ponder why the opposite experts of this sector don't realize this. You must proceed your writing. I'm confident, you have a huge readers' base already!
I enjoy what you guys tend to be up too. Such clever work and reporting! Keep up the superb works guys I've added you guys to blogroll.
Thanks for your personal marvelous posting! I actually enjoyed reading it, you happen to be a great author.I will remember to bookmark your blog and definitely will come back later in life. I want to encourage you to continue your great writing, have a nice afternoon!
I was a little worried to find how this was packaged but that simply took secs in order to get to size as well as is actually incredibly pleasant. I would get this bedroom once again.
I would like to thank you for the efforts you've put in writing this blog. I am hoping the same high-grade web site post from you in the upcoming also. Actually your creative writing abilities has encouraged me to get my own site now. Really the blogging is spreading its wings rapidly. Your write up is a good example of it.
Hello my family member! I wish to say that this article is amazing, great written and come with almost all significant infos. I¡¦d like to peer extra posts like this .
I pay a quick visit every day some web pages and websites toread content, but this website provides quality based posts.
Do you have a spam problem on this website; I also am a blogger, and I was wondering your situation; many of us have developed some nice practices and we are looking to trade strategies with other folks, be sure to shoot me an email if interested.
Greetings from Florida! I'm bored at work so I decided to browse your site on my iphone during lunch break. I really like the info you provide here and can't wait to take a look when I get home. I'm amazed at how fast your blog loaded on my mobile .. I'm not even using WIFI, just 3G .. Anyhow, fantastic site!
Fantastic blog you have here but I was curious if you knew of any user discussion forums that cover the same topics talked about here? I'd really love to be a part of community where I can get opinions from other experienced people that share the same interest. If you have any recommendations, please let me know. Thanks!
First off I want to say fantastic blog! I had a quick question that I'd like to ask if you don't mind. I was curious to find out how you center yourself and clear your mind before writing. I've had trouble clearing my mind in getting my thoughts out there. I truly do take pleasure in writing however it just seems like the first 10 to 15 minutes are usually wasted simply just trying to figure out how to begin. Any suggestions or tips? Kudos!
Hiya! Quick question that's totally off topic. Do you know how to make your site mobile friendly? My website looks weird when viewing from my iphone 4. I'm trying to find a template or plugin that might be able to resolve this problem. If you have any recommendations, please share. Cheers!
With havin so much written content do you ever run into any problems of plagorism or copyright violation? My website has a lot of unique content I've either created myself or outsourced but it looks like a lot of it is popping it up all over the web without my authorization. Do you know any methods to help prevent content from being ripped off? I'd genuinely appreciate it.
I seem like that carried out not require to long to rise. It is a really relaxed bedroom as well as mu daughter absolutely loves it.
You could definitely see your enthusiasm in the work you write. The arena hopes for even more passionate writers such as you who aren't afraid to mention how they believe. All the time follow your heart.
Fantastic goods from you, man. I have understand your stuff previous to and you're just too magnificent. I really like what you've acquired here, certainly like what you're saying and the way in which you say it. You make it enjoyable and you still care for to keep it wise. I cant wait to read much more from you. This is really a tremendous website.
I would like to show some appreciation to you for rescuing me from this setting. Because of looking out throughout the search engines and meeting ideas which are not productive, I was thinking my life was done. Living devoid of the solutions to the problems you have fixed by means of the article is a crucial case, as well as the kind that might have negatively affected my entire career if I had not discovered your blog post. That skills and kindness in taking care of almost everything was priceless. I am not sure what I would've done if I had not come upon such a solution like this. I can at this point look forward to my future. Thanks for your time very much for the professional and amazing help. I won't be reluctant to suggest your site to anybody who desires support about this subject matter.
Thanks for some other informative blog. Where else could I am getting that kind of info written in such a perfect approach? I have a venture that I'm simply now running on, and I've been on the look out for such information.
I¡¦m no longer positive the place you are getting your information, but great topic. I needs to spend some time studying more or working out more. Thank you for wonderful info I was in search of this information for my mission.
Whats up very cool web site!! Guy .. Excellent .. Superb .. I'll bookmark your website and take the feeds also…I am satisfied to search out numerous helpful information here in the submit, we need work out more techniques on this regard, thanks for sharing.
Thanks for helping out, great info. "It does not do to dwell on dreams and forget to live." by J. K. Rowling.
After looking over a handful of the blog posts on your website, I truly like your way of blogging. I saved as a favorite it to my bookmark site list and will be checking back soon. Please visit my website too and let me know your opinion. | 2019-04-24T02:36:54Z | http://www.littlefootprintsfoundation.org/three-smart-siblings/ |
JAMES WARREN JEFFERSON is the son of JOHN W. and ELIZABETH JEFFERSON, nee LYNCH. He was born in Sussex County, Del., December 14, 1847. The father, a farmer and live stock dealer, moved with his family to St. Clair County, Ill. in 1851, and died in June of the following year. At his death, his property all went to pay his debts, leaving his family destitute. The wife had borne her husband three children--JAMES W., SAMUEL M., and MARY A.; the latter an infant at the time of the father's decease. The mother was a woman of unusual ability and good sense. Strongly pressed, after the death of her husband, to commit her children to the care of those supposed to be better able to take care of them, she determined to keep them, and to labor for their education and support. No one not living in one of the then frontier States can form an idea of the magnitude of the work she so nobly undertook and so faithfully carried out. In the sublimest sense of the word, "by the sweat of her brow," she earned the bread for the sustenance of her children. When the father died, no one was poorer in money or property: but she was rich in judgment, energy and honesty. By the labor of her own hands she fed her babes, and as they grew older, taught them, by precept and example, that key-note to success--work--honest, patient and faithful work. As a reward for her watchful care and labor, she lived to see each of her children grow up strong and healthy, morally, physically and intellectually, and enter and pass through their academic and college studies, the acknowledged leaders of their respective classes; to leave those classic halls, fully qualified to take up their chosen life work. MARY A., the youngest, to teach the children of other women the lessons to be learned in the graded schools of our enlightened and beneficent public school system; SAMUEL M., to preach the Gospel as God had given him the intellect to comprehend, and the eloquence to unfold; and JAMES W., the eldest, the practice of law--that profession than which no other offers to man a better opportunity to develop his manhood; that intellectual field fill with quagmires and quicksands, with moral wrecks of men tempted and fallen; that field in which the brightest genius of the world has shone where the greatest and best men of all ages have given their services, that the guilty might be punished and the innocent vindicated; that wrong and crime and oppression might be put down, and right and law and justice lifted up. She lived to see the children born in penury, and raised from poverty by her hand, grown to manhood and womanhood, fully qualified and well prepared to take their place in the great struggle of life. Her work was done! With a smile on her face, she died, December 30, 1877, aged 58 years.
JAMES W. entered the common school at the age of 6 years, and was an apt pupil and faithful student. He evinced great delight in his studies, especially mathematics, in which he acquired unusual proficiency. Throughout his experience, in the common schools or in college, he never found a problem that he could not solve, and in that branch of his studies never recited an imperfect lesson. After finishing his studies in the High School, he went on the farm, where by his labor, he assisted his mother in the support of her family. Later, he became Assistant Inspector and Contractor of Forage for the Government, and subsequently engaged as traveling salesman for a wholesale firm in St. Louis.
He has traveled in every State, and has been in nearly all the larger cities east of the Rocky Mountains. In 1867, he made a trip through the chain of lakes from Buffalo to Duluth; and he has followed the Missouri and Mississippi from Fort Benton and Lake Ithaca to the delta. He has visited the fashionable watering places of the East, and stood on the famous "Beach" at Galveston. He has drank at the sparkling springs of Minnesota, and tasted the brackish waters of the Brazos. From the summit of Bunker Hill, he has viewed the crooked streets of cultured Boston, and from the hills of Colorado looked down upon the uncultivated homes of the untutored savage.
From boyhood his mind was made up to be a lawyer, and while traveling from town to town, in his own room at the hotel, until late at night, and at all other times, when he could steal a moment from his business, he read borrowed books, and laid the foundation for his legal education.
In 1871, he entered Indiana State University, and in 1874, completed the scientific course, standing at the head of his class. While at the University, he had command of the drill corps of the college. He is a thorough tactician, and a proficient civil and military engineer. He was admitted to the practice of law in June 1874, and in the following August, moved to Lafayette, and formed a partnership with William H. Bryan, which was dissolved July 1, 1875, when he engaged in the practice alone. Hard work and close attention to business soon won for him a success almost unparalleled. Without money, influence or friends, a stranger in a strange place, he came to LaFayette, not four years ago; yet by his energy, and the zeal with which he has guarded the interests of his clients, he has built up a practice, from which he now enjoys an income sufficient for all his wants. In 1876, MR. JEFFERSON organized and took command of the LaFayette Guards--the oldest military company now in the service of the State. He resigned his command July 13, 1877.
CAPT. JEFFERSON devotes much of his time to commercial settlements, and to real estate law. He is a hard worker and a close student; and, although young, as an attorney his success is fully demonstrated, and he occupies a prominent place among the leading lawyers of the State.
DAVID GREGORY, the father of the gentleman whose name appears above, was a native of Virginia. During his residence in that State he married MISS MARGARET WARWICK, also a native Virginian. Shortly after his marriage, he moved with his wife to Kentucky, and became identified with the early settlement of that State. They were members of the colony that followed the renowned Col. Daniel Boone, and formed the "Boone Settlement." Some years later, while still residing there, he purchased 420 acres on the Big Miami River, in Butler County, Ohio, but was deterred from locating upon his newly purchased farm by the hostility of the Indians surrounding it. A treat of peace was finally effected, and he moved his family to that point on a keel-boat, pushed up river by means of long poles.
During his residence at this point, the noted "Mad Anthony Wayne" was a frequent guest at his cabin, on his route from Fort Greenville to Hamilton; and in the labor of felling trees MR. GREGORY often received valuable assistance form a squad of Gen. Wayne's soldiers. He decided to make this settlement permanent, and with this view continued steadily to improve his farm. Here he reared a family of two sons and four daughters, all of whom arrived at maturity, but of whom only DAVID H. and MARGARET now survive. Their names were WILLIAM, MARY, MARGARET, ANNIE, NANCY and DAVID H.
The latter, who is a subject of this sketch, was born in Butler County, Ohio, on the 30th day of January, 1801. At the age of eighteen months, he was left an orphan by the death of his father; and as soon as his strength became sufficient for the task, he gave his time to the support of his mother by working on the farm. Before he was 21 years old, she too, was called away by death. Shortly after her decease, DAVID, with his brother-in-law JESSE WILSON, took a contract for digging a section of the Miami Canal, performing their labor to the entire satisfaction of the Company.
At the age of 24 years he married MISS MARIA WILSON, a native of Virginia. Three years after his marriage, he conceived a desire to move further west, and accordingly started with his wife on a journey to Indiana. To this point his cousins and his brother WILLIAM had preceded him, and through their kind forethought a comfortable cabin was ready to receive the weary immigrants at the end of their tedious journey. This cabin was located in the central part of the present town of Dayton, although the name of Dayton had not then been given to the town. Being the proprietor of a large tract of land, adjacent to the towns of Marquis and Fairfield, he divided a large portion of it into the town lots, and the three towns were united under the name of Dayton. This name was conferred by MR. GREGORY, in memory of Dayton, Ohio. Here, after clearing a large tract of land, he entered upon the life of a farmer, happy in the enjoyment of a quiet little home. Six children crowned the happiness of his married life, named, respectively, MARY A., WILLIAM, ALFRED, NANCY, CYNTHIA A. and MARGARET, of whom all are deceased, save ALFRED and NANCY. On the 31st day of May, 1872, death again entered his family, choosing for its victim the faithful wife.
For a period of fifty years, MR. GREGORY has been a resident of Sheffield Township, having entered upon his residence here in 1828, at a time when but few families had found their way to this point, and when it frequently became necessary for those living here to unite in defense of their poultry or pigs against the ravages of the wolves and foxes. He has witnessed the various stages of progress through which his township has passed, and in these improvements he has been an active participant, always contributing liberally toward the advancement of enterprises calculated to promote the interests of his township. Until the election of James Buchanan, he acted and voted with the Democratic party, but during his administration his political principles became changed, and he has since supported the Republican party.
The infirmities of age have made themselves apparent in his heretofore vigorous constitution, and for several years he has lived a life of quiet repose among his grandchildren. In his religious views he is a Universalist, having been converted to that faith at the age of 17 years. He is a diligent student of the Scriptures, and has learned the great lessons of charity, so essential to a Christian life.
MR. SHEARER was born in Geneseo, Livingston Co., N.Y., April 5, 1838. In the next years, he came with is parents to Tippecanoe County, where he has since continued to reside. He adopted the pursuit of farming as his vocation in life, having been trained to that occupation by his father. Up to the beginning of the late civil war, he was quietly engaged in the pursuit of this occupation; but when it became evident that the nation's honor demanded armed assistance, he was among the first to volunteer in defense of the union He enlisted in the First Regiment Western Sharpshooters September 18, 1861. he has preserved a record f the engagements in which he participated, and, by his request, it is hereby reproduced: The battle of Mount Zion, Mo., December 18, 1861; Fort Henry Tenn., February 8, 1862; Fort Donelson, Tenn., February 14, 1862; Pittsburg Landing, April 6 and 7, 1862; the siege of Corinth, May 30, 1862; battle of Corinth, October 3 and 4, 1862; Resaca, May 9, 1864; Dallas, May 28, 1864; Kenesaw, June 27, 1864; near Marietta, Ga., July 4, 1864; east of Atlanta, July 22, 1864; Lickskillet, July 28, 1864; Joneboro, September 1, 1864; Lovejoy's, September 2, 1864; Savannah, December 8, 1864; Bentonville, N.C., March, 1865.
At the expiration of his first term, he re-enlisted as a veteran, on the 25th day of December 1863, continuing in active service until the close of the war, when he was mustered out, on the 7th day of July 1865, at Camp Butler, Ill. During his sojourn at that place, he formed the acquainted of MISS MARY WHEELAND, who became his wife on the 28th day of September 1865. This union has been blessed by three children--BRUCE, CHARLEY and KATIE, all of whom are now living.
Since his return from the army, MR. SHEARER has been constantly engaged in farming and stock growing, in which he has been very successful.
of their children are as follows: JOHN, CATHERINE, PHILIP, HENRY, MARY ANN, SARAH ABIGAIL, SUSAN, DANIEL, JONAS, MARIA JANE, and JACOB E. DANIEL ISLEY, the father of MRS. ELY, was born in one of the Carolinas, of English parentage, but reared in Tennessee. He was married in Ohio, to CATHERINE SCHNEPP, a lady of German ancestry, and in the fall of 1825 settled in Tippecanoe County, Indiana.
DANIEL ELY, son of HENRY ELY, is one of the substantial men of Fairfield Township, and one of its most respected citizens. He was born on the old homestead of his father, where he has always lived, the date of his birth being September 28, 1844. He was united in marriage to MISS LETITIA DUMM, a native of Ohio, born in Ross County, November 5, 1847, and to them have been born six children, of whom five yet survive: JACOB S., MILES W., ANNA MAY, SARAH E., and GRACE G. A daughter named MARY C. died aged six months. JOHN DUMM, the father of MRS. DANIEL ELY, was a native of Pennsylvania, but reared from his twelfth year in Ohio, and was married in that State to SARAH McCABE. They came to Tippecanoe County, Indiana, about 1852, and settled in Perry Township, living there until their death. MR. DUMM was a Lutheran in his religious faith, his wife being a member of the United Brethren church.
W. P. WILES, an active and enterprising citizen of Shelby, engaged in agricultural pursuits on section 17, was born in Fayette County, Indiana, March 15, 1841, a son of JOHN H. WILES, who was one of the prominent pioneers and merchants of Montmorency, Indiana. JOHN H. WILES was born and reared in Brown County, Ohio, and when a young man removed to Fayette County, Indiana, where he was married to SARAH PUNTENNEY, who was born in Adams County, Ohio, a daughter of WILLIAM and LYDIA PUNTENNEY, with whom she came to Fayette County in an early day. JOHN H. WILES remained in Fayette County until the fall of 1855, when he came with his family to Tippecanoe County, where he has since made his home. W. P. WILES, the subject of this sketch, was reared a farmer, a vocation he has followed the greater part of his life, and his education was received in the common schools of his neighborhood. He was mustered in the war of the Rebellion July 22, 1861, and was assigned to Company G, Twentieth Indiana Infantry, and took an active part in a number of hard-fought engagements, including the battle of Fair Oaks, all the battles in front of Richmond, Fredericksburg, Chancellorsville, Gettysburg, Locust Grove, Gold Mine Run, battle of the Wilderness, and was with his regiment in New York City, quelling the mobs and riots there. He was confined in hospital for a time on account of sickness, and later he was wounded by a minie ball in the right thigh, and was sent to hospital at Washington, D.C., and was also in the hospital at West Philadelphia. He received an honorable discharge July 22, 1864, but was unable to return home until the following August. March 1, 1866, he was united in marriage to MISS MARY A. FEELY, who was born and reared in Shelby Township, Tippecanoe County, a daughter of JOHN W. and SUSAN A. FEELY. Her parents were among the early settlers of this county, coming here from Brown County, Ohio, in 1843, where both died. MR. and MRS. WILES have two children living, BERTHA L., born June 27, 1874, and JOHN E., born September 27, 1884. Politicially MR. WILES is a Republican, and is a strong adherent of the principles of that party. He is a member of the Grand Army of the Republic, Otterbein Post, No. 277, and is a member of Octagon Lodge, A.F & A.M, in which he served as Master during 1885 and 1886. He is a member of Fair Haven United Brethren Church, and has served as class leader and trustee of the same. He is always interested in the advancement of education and religion, and every worthy enterprise has his encouragement and support. Cordial in manners and fair and honorable in all business transactions, he has gained the confidence and respect of all who know him.
JACOB DAVIS, an active and enterprising citizen of Lauramie Township, was born in Ross County, Ohio, in 1837, a son of DANIEL DAVIS, a native of Sullivan County, Indiana, who is now deceased. Our subject was reared on the home farm, and in his boyhood attended the schools of this neighborhood, where he received a common-school education. He learned the carpenter's trade when a young man, which he has since followed much of the time. He was married October 7, 1860, to MISS SARAH BRYANT, a daughter of ABSALOM BRYANT, deceased. Six of the eight children born to this union are living, their names being as follows--JEPHTHA, DANIEL, CHARLES, WILLIAM, PERRY, and ETTIE. Two daughters died in early childhood.
MR. DAVIS located in Montgomery County, Indiana, April 17, 1862, and settled in Sugar Creek Township; his present home is on section 31, Lauramie Township, Tippecanoe County, to which he removed in the spring of 1883, being just across the line. He has a fine farm of 160 acres, well improved and under good cultivation, where he resides, engaged in farming and stock-raising, and is classed among the substantial farmers of his township. In connection with his agricultural pursuits he yet devotes some time to his trade. He is a member of the Odd Fellows order. He is at present postmaster of the B. postoffice.
JOHN RAWLES, of Wabash Township, a son of JOHN and SARAH RAWLES, was born in Pickaway County, Ohio, January 17, 1813, and there he was reared in the usual manner of farmer boys, working during the summer season and attending the district school of his neighborhood during the winter. in 1830 he came with his parents to Tippecanoe County, Indiana, where the father purchased 320 acres of land, a portion of which was prairie. Some years later JOHN purchased this farm, together with another tract of eighty acres which his father had previously entered. The father continuted to reside on the homestead until his death, which occurred in 1839. Since purchasing the home farm, MR. RAWLES has made successive additions of land, and at one time owned nearly 1,000 acres. He has since sold part of his land, and given to his children, yet he has sufficient to keep him in comfortable circumstances the remainder of his days.
MR. RAWLES was married in 1834 to MISS MATILDA NEWELL, daughter of WILLIAM and ANN NEWELL, of Warren County, Indiana, and to this union eleven children were born--LYCURGUS (deceased), ZELINA (deceased), WILLIAM N., MARCELLUS, DAVID, SARAH ANN (deceased), JOHN (deceased), MARY ANN, JOSEPH P., EDWIN and GEORGE II. During the late civil war, WILLIAM, MARCELLUS and DAVID entered the Federal service, and through a period of three years assisted in maintaining the Union cause. JOHN, then a lad of fourteen years, also entered into the service, serving one hundred days.
Having been reared on a farm, MR. RAWLES adopted the occupation of farming as his life work, becoming a thorough, practical agriculturist, and as a dealer in fine stock he has been very successful. MRS. RAWLES died in August, 1885. Although seventy-five years of age, MR. RAWLES is still hale and active, and bids fair to spend many years in the enjoyment of the accumulations of his former years of toil. In politics MR. RAWLES was formerly a Whig, but has been a Republican since the organization of that party. In 1856 he was elected county commissioner, holding that office six consecutive years, and during his term of office the famous artesian well in the public square was dug, and through the instrumentality of the board of commissioners, of which he was a member, a residence was erected on the county infirmary farm for the superintendent. Since 1843 MR. RAWLES has been a member of the Methodist Episcopal church, and has led a consistent Christian life. The manly integrity of his character, which has been manifested throughout a long and useful life, has drawn around him many friends, and none stand higher in the estimation of his fellow-citizens.
WILLIAM W. SMITH, the present treasurer of Tippecanoe County, was born in Clarke County, Ohio, west of Springfield, July 7, 1835, a son of ABRAHAM and ELIZABETH SMITH. Abraham Smith was born near Milledgeville, Georgia, and when three or four years of age removed with their family to Ohio, passing through Cincinnati when that now prosperous city was called Fort Washington, and was then under the command of General Harrison. This was about the year 1790. They first settled four miles above the present site of Cincinnati, and soon after went up the Mad River to Clarke County, and entered land right in the wilderness, being among the pioneers of that county, where they spent the remainder of their life. ABRAHAM, the father of our subject, was reared in Clarke County amid the scenes of pioneer life, and was there married to ELIZABETH ULLERY, a native of Pickaway County, Ohio, whose parents were of Pennsylvania Dutch descent, they coming from Pennsylvania, and settling in Pickaway County, Ohio, among the early settlers. ABRAHAM lost his wife by death in 1839, and in 1845 he removed to Lawrence County, Illinois, making his home in that county until his death, which occurred in 1872.
taught school. After coming to this county he worked out by the month for some time and subsequently both a meat market which he conducted four or five years. In 1863 he bought a farm in Union Township, to which he removed in June of that year, and there followed agricultural pursuits until assuming the duties of his present office. He was nominated to this office by the Republican party, being elected in November, 1885, and September 1, of the same years he removed to LaFayette, where he has since made his home, though he still retains his farm in Union Township.
GEORGE W. KIRKPATRICK, one of the pioneers of Tippecanoe County, Indiana, was raised in Ohio. His parents, SAMUEL and RUTH (WIER) KIRKPATRICK, removed from Kentucky to Ohio in an early day and settled in Ross County. They reared a family of five sons and two daughters. GEORGE W., their third son, was married in 1821 to CATHERINE, daughter of WILLIAM and MARGARET (CLINTON) PORTER, who were natives of Ireland. Six years later he removed by team to Indiana, and purchased land from the Government in Sheffield Township, Tippecanoe County, improved and remained on the same until 1843. He then removed to Wea Township, where he resided until his death, August 21, 1865. He was of Scotch ancestry. In his political views he was formerly a Whig, but became identified with the Republican party in 1856. His wife die November 30, 1878. They reared to mature years a family of five sons and two daughters. PORTER, the eldest, was born in Ross County, Ohio, August 11, 1822; was reared in Tippecanoe County, Indiana, as a farmer, in which vocation he was very successful; served as justice of the peace a number of years; was married to ROSELLA McCLAIN in 1858; died November 15, 1878, leaving a wife, one son and two daughters. SAMUEL, the second son, was born in Ross County, Ohio, December 23, 1824; reared in Tippecanoe County, Indiana; was married in 1845 to LOUISA HEATON; was treasurer of Tippecanoe County, warden of the Northern Indiana State prison, Lieutenant Colonel of the Seventy-second Indiana Regiment; died May 4, 1874, leaving a wife, who has since died, and five sons. JAMES N. KIRKPATRICK, was born in Tippecanoe County, Indiana, December 1, 1832; was Captain of Company A, Fortieth Indiana Infantry during the war of the Rebellion; was promoted Lieutenant Colonel of the same regiment at Shiloh, and lost his life by drowning, while crossing a stream in the State of Mississippi, June 8, 1862. GEORGE W. KIRKPATICK, Jr., was born May 21, 1835, in Tippecanoe County, Indiana; enlisted as Assistant Surgeon in the Seventy-second Indiana Regiment, remaining with the regiment until the close of the war, when he returned to Wea Township and engaged in the practice of medicine at Culver; was married September 6, 1866, to LOVENA E. DeHART, daughter of ABNER and MARGARET (TROTTER) DeHART. They are the parents of two sons--JAMES N. and MILO D. MARGARET A. KIRKPATRICK was born June 17, 1838; married to JOHN WATERS in 1858, died May 26, 1863, leaving one child--GEORGE EVERETT WATERS. ELIZA C. KIRKPATRICK was born in 1841, and married JEFFERSON TROTTER in 1879.
SAMUEL ELLIOTT, one of the old and honored pioneers of Sheffield Township, who is now deceased, came to Tippecanoe County as early as 1829, and the same year settled in this township. Here he made his home until 1874, experiencing many of the hardships and privations which usually fall to the lot of the early settler. He was born in the State of Pennsylvania, and was there reared, and married to MISS REBECCA KELLY, and to them were born three children two of whom died in childhood, and one son, CHARLES, died in the service of his country during the late war. He was Captain of Company A, Fortieth Indiana Infantry, and was killed at the battle of Kenesaw Mountain.
MR. ELLIOTT was a second time married to MISS MARY WILSON, who died in 1844, leaving one son, now the REV. SAMUEL WILSON ELLIOTT, of West Union, Ohio. MR. ELLIOTT was again married to MISS MARY SHIELDS, of New Albany, Indiana, who survived her husband a number of years, dying in September 1884. MR. ELLIOTT removed from Sheffield Township in 1867 and settled in La Fayette, this county, where he resided until his death, in October, 1874.
JOSEPH H. ANDERSON, M.D., the only practicing physician of Colburn, is a native of Ohio, born in Guernsey County, November 15, 1838, his father THOMAS ANDERSON, being a native of Pennsylvania, and of English origin. The great-grandfather of our subject, MYRON ANDERSON, was an English sea Captain. He took his son GEORGE to sea with him, visiting the port of New York, where the son left the vessel and became a resident of America. He finally settled in Washington County, Pennsylvania, where his son THOMAS, the father of our subject, was born. THOMAS ANDERSON went to Ohio, where he was married to SOPHIA STEVENS, and made his home in Guernsey County until his death, which occurred at the home of his son, January 26, 1866. The mother of the doctor still survives her husband, being now in her eighty-third year. THOMAS ANDERSON and wife had ten children, five of whom are living at the present time.
DR. ANDERSON, the subject of this sketch, was reared on his father's farm, and received his education in the schools of Guernsey County. He began the study of medicine when about twenty-one years of age, and had taken a course of lectures before enlisting in the service of his country during the late war. He had been to Washington Territory, and on his return he enlisted, August 2, 1862, in Company D, Fortieth Iowa Infantry. He served a few months as private and Hospital Steward, when he was promoted to the medical staff of the First Iowa Cavalry, serving with that regiment until the close of the war, and gaining valuable experience. He then returned to Guernsey County, but soon after removed to Allen County, Indiana, locating near Fort Wayne, but after practicing a short time he was obliged to discontinue on account of trouble with his eyes, which had become seriously impaired while in the army. He then engaged in teaching, following that profession two years. In the winter of 1868-69 he went to Cincinnati, Ohio, to have his eyes treated, and at the same time attended medical lectures, graduating in the spring of 1869. In September 1869, he came to Colburn, Tippecanoe County, and has since been continuously in the practice of medicine with the exception of the time he spent as a member of the Legislature, having served one term in that body, and during his residence here has built up a successful and extensive practice.
The doctor was united in marriage, January 2, 1862, to MISS MARGARET M. MORTON, a daughter of WILLIAM MORTON, who was a cousin of the great war Governor of Indiana. To this union two daughters were born, of whom only one is living--LYDIA C., who was born in 1867. BERTHA M. died in 1878, aged eight years. In his political views the doctor is a Republican.
Biographical Record and Portrait Album of Tippecanoe County, Indiana, pp. 395-396.
JOHN HANLEY, one of the leading business men of Chauncey, and senior member of the milling firm of Hanley & Fuller, is a native of Ireland, born in County Limerick, May 4, 1826, his parents, THOMAS and MARY (HAIR) HANLEY, being natives of the same country. They came to America in 1826, when the subject of this sketch was but a month old, and first settled at Pottsville, Pennsylvania, and a short time later removed to the city of New York, where they made their home until 1835. They then spent about one year in Lockport, New York, when they immigrated to Fort Wayne, Indiana, coming across the lake to Detroit, and from there to the Maumee River by keel boats. They landed in Fort Wayne in the spring of 1836, when that now prosperous city was a mere hamlet, principally inhabited by Indians, and the old fort still standing. Here the parents remained until their death, the father dying in 1856, and the mother in 1847. The father was a farmer by occupation, and laid out a farm in the wilderness of Allen County.
JOHN HANLEY, whose name heads this sketch, remained with his parents until reaching the age of sixteen years, when he went to Jasper County, Indiana, and began breaking prairie ground, using two teams, each drawn by five yoke of oxen. He was thus engaged about three years, when he went on Government land, and broke up about half a section, on which he raised corn and wheat, hauling the same to Michigan City, where he received for it about 50 cents a bushel. This was before the days of railroads in that part of the country, and he had to haul his load over very bad roads, and often through swamps. In the fall of 1844 he selected three yoke of good oxen and went to Montgomery County with the expectation of loading up apples, but not being satisfied with the fruit there he drove to Putnam County, where he bought apples for 25 cents per bushel. He then started for La Porte, Indiana, and drove through the Kankakee swamp with his load of apples, being three days in crossing the swamp, then continued his journey to LaPorte, arriving there the day of the Whig convention, when Clay and Frelinghysen ran against Polk and Dallas, and there he sold his apples at 25 cents a dozen.
During 1846-47 he was engaged in the grain and general merchandise business at Pittsburg, Indiana, with Colonel Calton. In 1848 he came to LaFayette, and for two years was associated with Rogers and Reynolds in the grain business. He then became associated with SAMUEL DANFORTH in the jewelry business, and at the same time he conducted the hotel known as the Burnett House, being thus engaged some two years, when, on account of failing health, he in the spring of 1853 went to Australia, remaining there about three years. He then returned to LaFayette, with heath entirely restored, and immediately engaged in the manufacture of morocco leather and linings, which he carried on about a year. In the summer of 1859 he established a grocery on Main street, which he carried on until 1869, when he built a store on Fourth street, south of the Square, where he continued his grocery business for two years. In the meantime he had started business in Chauncey, building the first business west of the river, and here he carried on his business until 1875, when he sold out and engaged in farming and dealing in stock extensively on the large farm in the county that the still owns. In the spring of 1881 he became connected with Eagle Mills, of which he has since been a partner. These are the largest mills in this section of the county, and an extensive business is carried on under the firm name of Hanley & Fuller. MR. HANLEY was united in marriage, in the fall of 1849, to MISS CATHERINE A. FITZPATRICK, a daughter of JOHN FITZPATRICK. They are the parents of four children, named as follows--MARY E., CHARLES F., EMMA E., and JOHN G.
SAMUEL RAMSEY SEAWRIGHT was born in Butler Co., Ohio, on the 28th day of September 1824. His father, SAMUEL R. SEAWRIGHT, was a native of Pennsylvania, and moved to Butler Co., Ohio, in 1824, where he engaged in business as a wool carder until the year 1830, when he moved to Clinton Co., Ind., locating near the site of the present town of Rossville. He settled in the timber and improved 160 acres of land. He abandoned the occupation of wool carder and began farming, which he continued until his death in 1840.
The early advantages of young SEAWRIGHT for obtaining an education were limited, but taking advantage of the opportunities that came within his reach, he obtained a fair education, and in later years he profited by better advantages. He studied medicine withthe late Dr. DEMING, of LaFayette, and graduated from the Indiana Medical College, La Porte, Ind., in 1850. In 1860, he attended Rush Medical College, Chicago. He was licensed to practice and entered upon the eprsectuion of the duties of his profession in 1850, in Morgan Co., Ind. At the end of a year, he located at Dayton, Ind., and formed a partnership with Dr. D. H. CROUSE, which continued sixteen years.
In March, 1867, he came to LaFayette, where he has since remained, from the outset enjoying a large and successful practice. Dr. SEAWRIGHT has devoted himself assiduously to his professional duties, and has amassed a comptency by long years of hard work. To the high professional merit, he adds the virtues of a Christian gentleman, and in every walk of life has proved himself worthy the high esteem in which he is held by all who know him.
THOMAS STRETCH, the father of this gentleman, was born in Pennsylvania, January 23, 1784. His father came from Ireland when a mere lad, and for many years was engaged as a school teacher. THOMAS STRETCH was married to MISS ANTHA MUNGER, a native of Vermont, July 27, 1807. His son, JONATHAN, with whom we are more directly interested in this sketch, was born in Champaign County, Ohio, November 7, 1817. From that place, he moved with his parents to Miami County, Ohio, in 1818, thence to Butler County, Ohio, and from that point to Tippecanoe County, Ind., in 1830, with his parents, five brothers and three sisters, of whom all are now deceased, save the subject of this sketch, and one sister, MRS. EMILY GRAVES.
In 1846, MR. STRETCH united in marriage with MISS DELILAH KNIGHT of Carroll County, Ind. His wife is of Irish descent and was born in Miami County, Ohio, removing to Carroll County, Ind., with her parents, at the age of 7 years remaining a citizen of that county until the date of her marriage. They have five children living, viz.: FANNIE, FLORA, JESSIE, ETHEL and LOUIS.
From early youth, MR. STRETCH has been engaged in the pursuit of farming. That he has been successful in his chosen avocation is witnessed by his fine farm and the evidence of comfort by which he is surrounded. His upright character has not failed to secure him friends among those with whom he has been associated, and his standing in the community is first class.
O. A. KIRKPATRICK, a prominent and intelligent citizen of Wea Township, Tippecanoe County, was born on the old homestead where he now lives, the date of his birth being March 7, 1848. His parents, W.P. and REBECCA (COMPTON) KIRKPATRICK, were natives of Ohio, the father born in Ross County, a son of MAJOR JAMES KIRKPATRICK, and the mother born in Fayette County, a daughter of GEORGE and SOPHIA (REEVES) COMPTON. They were married in Fayette County, Ohio, in 1844, and the same day of their marriage started on horse-back for Tippecanoe County, and settled on section 36, Wea Township, where the father died July 24, 1853, leaving a widow with three children, named--SERENA, FLORIDA and O.A., the subject of this sketch.
In his political views he was a Democrat. He was an active and zealous worker in the Methodist Episcopal church, and was one of the most highly esteemed men and acknowledged to be the greatest financier of the township where he made his home. O.A. KIRKPATRICK grew to manhood on the home farm, being reared to farm work. He received his primary education in the district school, which was supplemented by a course of study at Stockwell College and the Northwestern Christian College, now Butler University, at Indianapolis. At the age of twenty years he went to Champaign County, Illinois, remaining there eighteen months, when he went to Carroll County, Indiana, where he spent nine years.
In 1878 he returned to the old homestead in Wea Township, where he has sixty-three acres of fine land, well improved and under a high state of cultivation. For twelve years he has followed the teacher's profession with success, and ranks among the popular teachers of the county. He was united in marriage September 5, 1883, to MISS VIOLA JOHNSON, of Stockwell, a daughter of JOSEPH JOHNSON, a prominent pioneer of Tippecanoe County. MR. and MRS. KIRKPATRICK have one child, a daughter BESSIE, born September 1, 1884. Politically MR. KIRKPATRICK affiliates with the Republican party. He has served Wea Township as assessor, and in 1886 was land appraiser, performing the duties of this office in a very able manner. He is a man of strict integrity, fair and honorable in all his dealings, and by his cordial manners and genial disposition has made many friends.
MATT SCHNAIBLE, manager of the Wabash Elevator of La Fayette, is a native of Wurtemburg, Germany, born in the year 1853. In the fall of the same year his parents started for America with their family, the father dying on the ocean. The remainder of their family landed at New York, where they spent three or four months, then came to La Fayette, Indiana, where they have since resided. MATT SCHNAIBLE was reared to manhood in La Fayette, receiving his education in the schools of this city. He was married here to MISS KATIE SATTLER, a daughter of JOHN P. SATTLER, a prominent business man of La Fayette.
The Wabash Elevator was constructed in 1857, about the time of the building of the Wabash Railroad, by the Wabash Company. It was first operated by JAMES SPEARS, who was succeeded by Morey & Ball, this firm conducting it until 1875. From 1875 until 1882 it was conducted by I.E. HAVILAND, of Toledo, Ohio, and since the latter year MR. SCHNAIBLE has been a member of the firm of I.E. Haviland & Co. MR. SCHNAIBLE commenced working about the elevator in 1866, acted as engineer for the firm of Morey & Ball, and since 1876 has held the position of manager. The amount of grain handled by the elevator has increased from about 5,000 bushels to about 500,000 bushels per annum. MR. SCHNAIBLE is a member of the German Lutheran church, and is one of the respected citizens of La Fayette.
BALDWIN MINTONYE, deceased, was a native of Tippecanoe County, born in Wayne, now Union Township, April 21, 1828, a son of PETER and MARTHA (BALDWIN) MINTONYE, who were among the first settlers of Tippecanoe County. They were the parents of five children, but one of whom is living. BALDWIN MINTONYE was married August 25, 1850, to TERRESSA HUTSINGER, a native of Ohio, born near Dayton, Montgomery County, January 18, 1834, a daughter of ISAAC and MARY (WOLF) HUTSINGER, her father a native of South Carolina, of Holland descent, and her mother of Ohio, of German descent. After his marriage MR. MINTONYE settled on eighty acres of land he had previously purchased. This farm he afterward sold and bought 200 acres to which he subsequently added 100 acres, having at his death a fine farm of 300 acres. He died September 17, 1883, leaving a large circle of friends to mourn his loss.
He was a member of the Methodist Episcopal church, to which denomination his widow also belongs. In politics he affiliates with the Republican party. To MR. and MRS. MINTONYE were born ten children--WILLIAM, born December 10, 1851, died December 12, 1879; CHARLES, born January 21, 1854; MARIETTA, born August 5, 1856, died September 24, 1857; MARTHA, born July 20, 1858, is the wife of ASA BURNS; ETTA, born September 14, 1860, is the wife of WILLIAM STRAUBINGER; EDWARD, born December 28, 1862, died August 4, 1864; ALBERT, born June 29, 1865, died June 11, 1886; JENNIE, born November 1, 1867; ROSA MAY, born June 24, 1870; MARY OLIVE, born March 8, 1873. | 2019-04-25T21:55:57Z | http://www.ingenweb.org/intippecanoe/bios9.html |
Based on the potential interest in sodium lactate as an energy substrate and resuscitative fluid, we investigated the effects of hypertonic sodium lactate in a porcine endotoxic shock.
Fifteen anesthetized, mechanically ventilated pigs were challenged with intravenous infusion of E. coli endotoxin. Three groups of five animals were randomly assigned to receive 5 mL/kg/h of different fluids: a treatment group received hypertonic sodium lactate 11.2% (HSL group); an isotonic control group receiving 0.9% NaCl (NC group); a hypertonic control group with the same amount of osmoles and sodium than HSL group receiving hypertonic sodium bicarbonate 8.4% (HSB group). Hemodynamic and oxygenation variables, urine output and fluid balance were measured at baseline and at 30, 60, 120, 210 and 300 min. Skin microvascular blood flow at rest and during reactive hyperemia was obtained using a laser Doppler flowmetry technique. Results were given as median with interquartile ranges.
Endotoxin infusion resulted in hypodynamic shock. At 300 min, hemodynamics and oxygenation were significantly enhanced in HSL group: mean arterial pressure (103 [81–120] mmHg vs. 49 [41–62] in NC group vs. 71 [60–78] in HSB group), cardiac index (1.6 [1.2–1.8] L/min/m2 vs. 0.9 [0.5–1.1] in NC group vs. 1.3 [0.9–1.6] in HSB group) and partial pressure of oxygen (366 [308–392] mmHg vs. 166 [130–206] in NC group vs. 277 [189–303] in HSB group). At the same time, microvascular reactivity was significantly better in HSL group with a lower venoarterial CO2 tension difference (5.5 [4–10] mmHg vs. 17 [14–25] in NC group vs. 14 [12–15] in HSB group). The cumulative fluid balance was lower in HSL group (-325 [-655; -150] mL) compared to NC (+560 [+230; +900] mL, p = 0.008) and HSB (+185 [-110; +645] mL, p = 0.03) groups.
In our hypodynamic model of endotoxic shock, infusion of hypertonic sodium lactate improves hemodynamic and microvascular reactivity with a negative fluid balance and a better oxygenation.
Sepsis, the syndrome of microbial infection complicated by systemic inflammation, is a major public health problem associated with significant morbidity and mortality ,. Due to constant hypovolemia, fluid resuscitation is a cornerstone of septic shock management . Indeed, early fluid therapy is common in patients with septic shock . Both adequate initial fluid resuscitation and conservative late fluid management could improve patient outcome . In fact, excess fluid could be deleterious , and negative fluid balance has been shown to be associated with better survival rates , especially in acute lung injury ,, and acute kidney injury . Although adequate fluid resuscitation is commonly acknowledged as an important element in the treatment of patients with septic shock, the choice of resuscitation fluid remains a point of discussion. The 2012 Sepsis Surviving Campaign guidelines recommend crystalloids as the initial fluid of choice for resuscitation in severe sepsis and septic shock . Isotonic saline (0.9% sodium chloride) is the most commonly used fluid . Nevertheless, in order to avoid excess fluid, the concept of small volume resuscitation with hypertonic saline solute has been well-received. Low volume of hypertonic fluids may have valuable effects on restoration of intravascular volume (fluid shifts from the intracellular to the extracellular compartment), on improvement of cardiac output and vascular tone , and on improvement of regional microcirculation without fluid overload . However, with the potentially beneficial sodium cation, the presence of non-metabolized chloride anion may have detrimental effects. Supraphysiological concentrations of chloride, which induce hyperchloremia and metabolic acidosis, may cause renal vasoconstriction and decreased glomerular filtration rate . Moreover, in a recent study, a chloride-restrictive strategy in intensive care units was associated with a significant decrease in the incidence of acute kidney injury and in the use of renal replacement therapy . Hence, in an attempt to avoid the detrimental effects of non-metabolized anion, the use of metabolized anions such as lactate may be required. The use of lactate is an interesting alternative because this anion is well-metabolized even in poor hemodynamic conditions . Some positive clinical experience in using sodium lactate is available. In cardiac surgery, exogenous lactate has been shown to improve cardiac index and has been shown to be safe and well-tolerated . Lactate may serve as a resuscitation fluid-based energetic substrate providing a high-octane fuel to improve heart performance ,, and simultaneously to normalize fluid balance ,. There are no data available on the administration of hypertonic sodium lactate in sepsis or septic shock. Based on the potential interest in sodium-lactate as an energy substrate and resuscitative fluid, we investigated the effects of hypertonic sodium lactate on fluid balance, hemodynamic and microcirculation in a porcine model of endotoxic shock.
We performed a prospective, randomized, controlled experimental study approved by the Institutional Review Board for Animal Research (protocol CEEA 132012); care and handling of the animals were in accordance with National Institutes of Health guidelines.
Fifteen adult female Large White pigs (2 months old) were used in this study. For the experiment, animals were premedicated with intramuscular injection of ketamine (Kétalar®, Virbac, Vauvert, France, 2.5 mg/kg of body weight) and xylazine (Sédaxylan®, CEVA Santé Animale, Libourne, France, 2.5 mg/kg of body weight). Then we used Isoflurane (Aerrane®, Baxter, Maurepas, France) for the intubation process, and maintenance of anesthesia was performed with a continuous infusion of midazolam (Hypnovel®, Roche, Neuilly, France, 1 to 2 mg/kg body weight/h) for the whole experiment. Animals were mechanically ventilated (Osiris 2®, Taema, Antony, France) with a tidal volume 10 mL/kg, positive end-expiratory pressure 3 cmH2O to limit cardiovascular effects, inspired oxygen fraction (FiO2) 0.6 to prevent fatal hypoxemia during the study, respiratory rate 14 to 20 breaths/minute only adjusted to have normocapnia (40 to 45 torr) at baseline. We chose to maintain similar ventilation in all animals during the experiment. No recruitment maneuvers were done. Muscle relaxation was obtained by a continuous infusion of cisatracurium besylate (Nimbex®, Hospira, Meudon, France, 2 mg/kg body weight/h). Analgesia was achieved by a subcutaneous injection of buprenorphine (Vetergesic®, Sogeval, Laval, France, 0.1 mg/kg body weight). Subcutaneous administration of buprenorphine in our animals is known to permit analgesia during six to eight hours. After dissection of neck vessels, catheters were inserted in the pulmonary artery via the right external jugular vein (Swan-Ganz; Baxter 110 H 7.5 F; Baxter Edwards Critical Care, Irvine, CA, USA) and in the right carotid artery for continuous blood pressure monitoring and blood sampling. To monitor urine output, a suprapubic urinary catheter was inserted by laparotomy. An esophageal temperature probe measured core temperature.
Systemic arterial and venous blood samples from carotid and pulmonary arteries were obtained simultaneously. Arterial and venous blood gas tensions and lactate levels were measured in an acid-base analyzer (ABL-800, Radiometer, Copenhagen, Denmark). Blood oxygen content was calculated from the hemoglobin content and oxygen saturation. Heart rate, systemic and pulmonary arterial pressures were continuously monitored (90308 PC Express Portable Monitor, Spacelabs, Snoqualmie, WA, USA) as well as cardiac output and mixed venous oxygen saturation (Vigilance monitor; Baxter Edwards, Irvine, CA, USA). Using standard formulae we computed global oxygen delivery (DO2), global oxygen consumption (VO2), oxygen extraction ratio (OER), cardiac index (L/min/m2), cardiac power index (CPI) (W/m2) , systemic vascular resistance (SVR) and pulmonary vascular resistance (PVR) (dynes/sec/cm5). Body surface area was calculated by Kelley’s formula .
The study was carried out as depicted in Figure 1. During the preparation period, animals received 25 mL/kg 0.9% NaCl to prevent hypovolemia. When all preparations were completed, a 30-minute period was allowed to stabilize the measured variables. Macrocirculatory measurements were taken over a 5-h period: two times at baseline (before (T) and after (T0) the stabilization period) and at 30 (T30), 60 (T60), 120 (T120), 210 (T210) and 300 (T300) minutes. Arterial and venous blood gas tensions and lactate levels were collected at the same time (except T and T30) until the study was completed. After anesthesia, catheterization, and baseline collection (T0), all animals were administered 5 μg/kg/min Escherichia coli lipopolysaccharide (LPS) (serotype 055:B5; Sigma Chemical Co., St. Louis, MO, USA). The endotoxin was diluted in 50 mL of 0.9% NaCl and infused intravenously over a 30-minute period. Our model was of hypodynamic shock with low level resuscitation. The only resuscitation endpoint was mean arterial pressure (MAP). We studied three groups of five animals receiving 5 mL/kg/h (from T30 to T300) of different fluids: two control groups, receiving 0.9% NaCl (NC group), 8.4% hypertonic sodium bicarbonate (HSB group) containing 61 g of bicarbonate and 23 g of sodium per liter and a treatment group receiving 11.2% hypertonic sodium lactate AP-HP® (AGEPS, Paris, France) (HSL group) containing 90 g of lactate and 23 g of sodium per liter (Additional file 1). Hypertonic groups (HSB and HSL groups) provided the same amount of sodium and osmoles (2,000 mosm/L). If MAP fell below 50 mmHg, a 2.5-mL/kg infusion of NaCl 0.9% was given as rescue therapy every 15 minutes. Bolus infusions were performed to maintain MAP above 50 mmHg.
Study design. During the preparation period, animals received 25 mL/kg 0.9% NaCl to prevent hypovolemia. When preparation was completed, a 30-minute period served to stabilize the measured variables. Measurements were taken over a 5-h period. Throughout the duration of the experiment, heart rate (HR), blood pressure (BP), pulmonary blood pressure (PBP), pulmonary capillary wedge pressure (PCWP), mixed venous oxygen saturation (SvO2), cardiac index (CI) and laser Doppler flowmetry measurements were recorded. Arterial and venous blood gas (A-VBG) was collected at the same time (except T and T30) until the study was completed. Animals were infused with 5 μg/kg/min of Escherichia coli lipopolysaccharide (LPS) from T0 to T30. We studied three groups of five animals receiving 5 mL/kg/h of different fluids: 0.9% NaCl (NC group), hypertonic sodium bicarbonate 8.4% (HSB group) and hypertonic sodium lactate 11.2% (HSL group). If mean arterial pressure (MAP) felt below 50 mmHg, a 2,5 mL/kg infusion of NaCl 0.9% was given as rescue therapy every 15 minutes. Bolus infusions were performed to maintain mean arterial pressure (MAP) above 50 mmHg.
Skin microvascular blood flow was measured continuously using a laser Doppler flowmeter probe and device (Periflux® PF407; Perimed, Jiirfalla, Sweden). The blood flow was measured in a volume of 1 mm3 solid tissue. The fiber optic probe was applied on the right hind paw of the animals and fixed with adhesive tape. Laser Doppler signal was continuously registered on a personal computer. Readjusting the pen of the recorder to zero when the probe was fixed to a white non-moving surface performed flux zero calibration. Skin blood flow was measured at rest and during reactive hyperemia from T0 to T300, and values were expressed in arbitrary perfusion units (PU). Reactive hyperemia was produced by arrest of leg blood flow with a pneumatic cuff inflated to a suprasystolic pressure (200 mmHg) for 3 minutes. On completion of the ischemic period, the occluding cuff was rapidly deflated to zero. Peak flow was defined as the highest flow signal during the post occlusive phase. Reactive hyperemia was further analyzed (Perisoft® 2.5 software) according to its duration and initial reactive hyperemia uphill slope.
((Na+ + K+ + Ca2+ + Mg2+) – (Cl- + Lactate-)) .
Variables were recorded at T0 and T300. At the end of the study, sodium and chloride balance was determined by calculating for each individual the difference between the cumulative amounts of electrolytes administered from T210 to T300 and the cumulative amounts of electrolytes collected in the urine during the same period. We also computed urea and creatinine clearance with standard formulas. Urine output was measured at T0, T60, T120, T210 and T300. Fluid balance from T0 to T300 was determined by calculating the difference between the cumulative amounts of fluids administered and the cumulative amounts of fluids collected in the urine.
Statistical analysis was performed with GraphPad Prism 6 software. As the distribution was not normal (Shapiro-Wilk test), quantitative data were expressed using median and interquartile range. For multiple intergroup testing, we used the Kruskal-Wallis test with the Dunn multiple comparisons test and the Mann-Whitney U-test. Intragroup comparisons were performed using the Friedman test with the Dunn multiple comparisons test. A P-value <0.05 was considered significant.
The fifteen studied animals were divided into three groups. Median weight was similar in the three groups of animals: 21 (19.25 to 22.75) kg in the NC group, 21 (19.75 to 22.5) kg in the HSB group and 22 (20.75 to 22.5) kg in the HSL group.
Lactate levels (Additional file 2) were comparable at baseline between the three groups (0.7 (0.7 to 0.8) mmol/L). During the study, we observed a similar increase of lactate levels in both control groups. At 300 minutes, lactate levels were 5.5 (3.8 to 8) mmol/L in the NC group and 4.2 (3.2 to 7.9) mmol/L in the HSB group. In the HSL group, however, lactate levels increased earlier. At 60 minutes, lactate level was 9.7 (9.3 to 14) mmol/L and then remained stable until the end of the study. Compared with control groups, lactate levels were significantly higher in the HSL group from T60 to T300 (P <0.0001).
Changes in HR, MAP, CI, mean pulmonary arterial pressure (MPAP), mixed venous oxygen saturation (SvO2), oxygen extraction (EO)2, DO2/VO2 ratio and Pv-aCO2 are illustrated in Figures 2 and 3. Variations in right atrial pressure (RAP), pulmonary capillary wedge pressure (PCWP) and CPI are presented in Additional file 2. No changes in studied variables were observed during stabilization period and no differences were observed among groups. Endotoxin infusion resulted in similar and usual changes in hemodynamics until 60 minutes as previously described ,. Thereafter, better hemodynamic stability was observed in the HSL group. At 300 minutes, MAP returned to the baseline level in the HSL group while a 51% and 30% decrease was observed respectively in the NC and HSB groups. Throughout the study, six animals (three in the NC group, two in the HSB group and only one in the HSL group) required 0.9% NaCl boluses to maintain MAP ≥50 mmHg according to the study protocol. SVR changes were similar in the three groups without any significant differences. CI impairment, at 300 minutes, was less pronounced in the HSL group (1.6 (1.2 to 1.8) L/min/m2) compared to BS (1.3 (0.9 to 1.6), P = 0.53) and NC (0.9 (0.5 to 1.1), P = 0.01) groups. Finally, compared to control groups, CPI was significantly better from 120 to 300 minutes in the HSL group. With regard to lung function, we observed a similar increase (60% compared to baseline) in MPAP 30 minutes after the infusion of endotoxin in the three groups, then MPAP decreased at 60 minutes. From 120 to 210 minutes, the increase in MPAP was significantly more important in the NC group compared with the hypertonic groups. DO2 decreased in the three groups between 60 and 300 minutes. Compared with hypertonic groups, this decrease was significantly more pronounced in the NC group from 210 to 300 minutes. At the same time, VO2 increased in the three groups without significant differences, resulting in increased EO2 in the three groups. Compared to the hypertonic groups, this EO2 increase was significantly more important in the NC group from 210 to 300 minutes. In parallel, SvO2 decreased from baseline to 300 minutes by 56% in the NC group, 18% in the HSB group and 9% in the HSL group. They were no significant differences between the hypertonic groups in DO2, EO2 and SvO2 changes. Nevertheless, venoarterial CO2 tension difference (P(v-a)CO2) was larger in the HSB group (14 (12 to 15)) than in the HSL group (5.5 (4 to 10), P = 0.01).
Changes in heart rate (HR), mean arterial pressure (MAP), cardiac index (CI) and mean pulmonary arterial pressure (MPAP). Open circles and dotted line: 0.9% NaCl (NC) group (n = 5); squares and gray line: hypertonic sodium bicarbonate (HSB) group (n = 5); closed circles and black line: hypertonic sodium lactate (HSL) group (n = 5). Results are expressed as median with interquartile range. When not displayed, error bars are within the symbols. *P <0.05, NC versus HSL; # P <0.05, HSB versus HSL; °P <0.05, NC versus HSB.
Changes in mixed venous oxygen saturation (SvO 2 ), oxygen extraction (EO 2 ), DO 2 /VO 2 ratio and venoarterial CO2 tension difference (Pv-aCO 2 ). Open circles and dotted line: 0.9% NaCl (NC) group (n = 5); squares and gray line: hypertonic sodium bicarbonate (HSB) group (n = 5); closed circles and black line: hypertonic sodium lactate (HSL) group (n = 5). Results are expressed as median with interquartile range. When not displayed, error bars are within the symbols. *P <0.05, NC versus HSL; # P <0.05, HSB versus HSL; °P <0.05, NC versus HSB.
Changes in occlusive areas (AO) and hyperemic areas (AH) are illustrated in Figure 4. Occlusive areas (AO), hyperemic areas (AH), rest flow (RF) and peak flow (PF) were similar at baseline between the three groups. During the study period, all these variables decreased significantly in the NC group and increased significantly in the HSL group. No significant variations were observed in the HSB group. At the end of the study (300 minutes), RF and PF were better in the HSL group (33 (22 to 40) PU and 58 (50 to 84) PU respectively) compared to the NC (8 (7 to 11) PU; P = 0.01 and 15 (14 to 17) PU; P = 0.01 respectively) and HSB groups (18 (13 to 23) PU; P = 0.03 and 37 (30 to 39) PU; P = 0.01 respectively). In the same way, AO and AH at 300 minutes were more important in the HSL group (3,200 (2,300 to 6,800) PU × sec and 2,300 (700 to 3,500) PU × sec respectively) compared to the NC (270 (120 to 370) PU × sec; P = 0.01 and 110 (31 to 200) PU × sec; P = 0.01 respectively) and HSB groups (600 (200 to 1,300) PU × sec; P = 0.04 and 800 (300 to 1,400) PU × sec; P = 0.15 respectively).
Variations in occlusive areas (AO) and hyperaemic areas (AH). Open circles and dotted line: 0.9% NaCl (NC) group (n = 5); squares and gray line: hypertonic sodium bicarbonate (HSB) group (n = 5); closed circles and black line: hypertonic sodium lactate (HSL) group (n = 5). Results are expressed as median with interquartile range. When not displayed, error bars are within the symbols. *P <0.05, NC versus HSL; # P <0.05, HSB versus HSL; °P <0.05, NC versus HSB. PU, perfusion units.
Total vascular filling, urine output, fluid balance and the variations in arterial oxygen partial pressure and inspired oxygen fraction (PaO2/FiO2) ratio are illustrated in Figure 5. Urine output and fluid balance at baseline were similar among groups. From 120 to 300 minutes, significantly higher urine output was noticed in the HSL group compared to control groups, resulting in a significantly lower fluid balance. PaO2/FiO2 ratio decreased in the three groups. Compared to control groups, this alteration was significantly less pronounced in the HSL group. Median values of PaO2/FiO2 at 300 minutes were 366 (308 to 392) mmHg in the HSL group versus 277 (189 to 303) (P = 0.03) in HBS group and 166 (130 to 206) (P = 0.01) in the NC group.
Total vascular filling, urine output, fluid balance from time zero (T0) to time 300 minutes (T300) and variations in arterial oxygen partial pressure and inspired oxygen fraction ratio (PaO 2 /FiO 2 ). Open circles and dotted line: 0.9% NaCl (NC) group (n = 5); squares and gray line: hypertonic sodium bicarbonate (HSB) group (n = 5); closed circles and black line: hypertonic sodium lactate (HSL) group (n = 5). Results are expressed as median with interquartile range. When not displayed, error bars are within the symbols. *P <0.05, NC versus HSL; # P <0.05, HSB versus HSL; °P <0.05, NC versus HSB.
The evolution of biological parameters during the study is presented in Table 1. In the NC group, urine tests were not performed at 300 minutes because all animals were anuric. Biological parameters were comparable at T0 between the three groups.
Results are expressed as median with interquartile range. Mann-Whitney U-test was used for intergroup comparisons; P <0.05 was considered significant. Urine tests were not performed at 300 minutes in the NC group because all animals were anuric. SID, apparent strong ion difference ((Na+ + K+ + Ca2+ + Mg2+) – (Cl- + Lactate-)).
Arterial pH and bicarbonate levels decreased over time (P <0.01 at 300 minutes) in the NC group. Contrarily, these variables levels increased over time in the hypertonic groups (P <0.001 at 300 minutes) without any differences between the HSB and HSL groups. Compared to the NC group, pH and bicarbonate levels were significantly higher in the HSB and HSL groups from 120 to 300 minutes. The partial pressure of carbon dioxide increased in the three groups over time without any significant differences.
Sodium and chloride intake, from 210 to 300 minutes, was comparable in the HSB and HSL groups. However sodium and chloride output was higher in the HSL group (50 (17 to 77) and 13 (5 to 20) mmol respectively) compared to the HSB group (1.1 (0.4 to 12) mmol, P = 0.02 and 0.4 (0.3 to 3.2) mmol, P = 0.004 respectively), thus resulting in significantly lower sodium and chloride balances in the HSL group. Urea and creatinine clearance was also significantly higher in the HSL group (40 (13 to 52) and 51 (27 to 79) mL/minute) compared to the HSB group (4 (1 to 11) and 12 (3 to 24) mL/minute, P = 0.01 and 0.03 respectively).
We observed a significant decrease in both control groups while it remained stable in the HSL group (Figure 6). At 300 minutes, blood glucose levels were significantly higher in the HSL group (0.62 (0.53 to 0.78) g/L) compared to the NC (0.27 (0.12 to 0.39) g/L, P = 0.01) and HSB (0.20 (0.16 to 0.29) g/L, P = 0.01) groups.
Variations in blood glucose levels. Open circles and dotted line: 0.9% NaCl (NC) group (n = 5); squares and gray line: hypertonic sodium bicarbonate (HSB) group (n = 5); closed circles and black line: hypertonic sodium lactate (HSL) group (n = 5). Results are expressed as median with interquartile range. When not displayed, error bars are within the symbols. *P <0.05, NC versus HSL # P <0.05; HSB versus HSL; °P <0.05, NC versus HSB.
We report here that the infusion of HSL solution improves hemodynamic stability and microvascular reactivity with a negative fluid balance and better oxygenation. This was the first time that HSL was investigated in large endotoxic animals. Pigs were chosen as a clinically relevant species, resembling humans in various functions as assessed by cardiovascular, respiratory, and biochemical parameters . In order to maximize the potential beneficial effects of HSL, we deliberately investigated its impact in the worst hemodynamic conditions associated with sepsis. In fact, our model was that of hypodynamic shock with low-level resuscitation. We used a low rate of vascular filling to maintain MAP ≥50 mm Hg rather than keeping the volume constant and allowing pressures to vary. Our purpose was to compare HSL with two different therapeutic regimens: a standard fluid therapy with isotonic crystalloids (0.9% NaCl, the most commonly used crystalloid) and a non-conventional hypertonic fluid therapy with the same amount of osmoles and sodium. Due to an acidifying effect on pH and an elevated chloride concentration, hypertonic saline was not close enough to HSL. We decided that the best hypertonic control was HSB. In fact, HSB does not contain a chloride cation and has the same alkaline effect on blood pH as HSL (see Table 1). On HSL infusion, lactate is metabolized and the remaining Na+ increases the SID, leading in turn to decreased water dissociation and proton concentration, resulting in an alkalinizing effect . Thereby, the main difference between hypertonic solutions was the potential role of lactate as an energetic substrate.
The hemodynamic results of our study were consistent with a favorable effect of hypertonic solutions. An explanation could be the larger amount of sodium, which regulated extracellular volume, in the hypertonic groups. This is in good agreement with data from the literature ,. Potential advantages of hypertonic fluid administration rather than isotonic solutions have already been described in shock . High extracellular sodium concentration could favor a reverse mode of Na+-Ca2+ exchanger to induce a positive inotropic effect . These hemodynamic improvements were more marked in the HSL compared to the HSB group. MAP in the HSL group was completely normalized at the end of the study and was significantly higher compared to the HSB group. The hemodynamic effects of lactate seemed to be related to improvement in cardiac function rather than changes in vascular tone. In fact, SVR was not significantly modified by lactate administration. Moreover, the CI was slightly higher in the group receiving lactate as has already been observed . It is known that lactate improves cardiac efficiency during shock ,, and it has been shown that lactate deprivation during shock impairs heart metabolism . Despite the fact that hypertonic fluids contained the same amounts of sodium, HSB and HSL were different in term of calories. These findings support the role of lactate as a key metabolic substrate under stress conditions ,. Furthermore, P(v-a)CO2 gradient was significantly lower and skin blood flow, at rest and during hyperemia, was significantly better in HSL group, suggesting better tissue perfusion. Hypertonic fluids are known to reduce microvascular collapse, restoring vital nutritional blood flow and tending to blunt the upregulation of leukocyte and endothelial adhesion molecules . The improvement of microcirculation in the HSL group compared to the HSB group could be the result of an overall improvement in global perfusion (MAP), and maybe an intrinsic effect of lactate that remains to be explored.
One remarkable result of this study was the concurrent improvement of hemodynamic status and plasma volume expansion in the HSL group, whereas fluid balance was negative. The higher volume of urine output in the HSL group reflected an improvement in renal perfusion that could be explained by better macro- and microcirculatory status. Moreover, we observed a positive sodium balance associated with a negative chloride balance following HSL infusion, which supports chloride urine excretion coupled to the high sodium urine excretion. In fact, the important amount of urinary sodium excretion creates an imbalance between positive and negative charges. As the urine is poor in protein (positive charges could be neutralized by the increase of negative charges on protein), a net anion efflux must therefore compensate the excess of positive charges in order to maintain electroneutrality. This is achieved for a substantial part by an increase of urinary chloride excretion ,. Chloride, the principal intracellular inorganic anion, is responsible for intracellular tonicity; hence the net efflux of chloride could be accompanied by a net flux of water . This could participate to the larger urine output with HSL infusion. This finding is noteworthy because it is generally difficult to achieve a negative fluid balance in the early phase of septic shock. Reducing fluid overload and edema are always regarded as having positive effects because of their link with organ dysfunction ,. In a previous study in the same animal model, histologic findings supported the development of respiratory distress syndrome with marked pulmonary leukocyte sequestration and interstitial edema . In our study, the negative fluid balance in the lactate group was associated with improved PaO2/FiO2 ratio. This was consistent with a previous human study on conservative strategy of fluid management . Finallyt, as already described , the development of hypoglycemia in porcine endotoxic shock could be due to a peak in the insulin level at 90 minutes. Stability in blood glucose levels in the animals receiving HSL was anticipated because lactate is a good precursor for glucose through liver gluconeogenesis.
Our model was stable with no hemodynamic variations during the stabilization period. We observed that HSL resulted in significant improvements despite the small numbers of animals per group. This suggests an important effect of HSL. Hence, two main mechanisms could be advanced to explain this effect: exogenous lactate infusion is beneficial as an energy supplier and the resulting sodium/chloride imbalance may induce a negative fluid balance. However, our model presented some limits: the short duration (five hours only, so that there was little time for activation of the NO system); administration of an LPS bolus rather than continuous intravenous administration (bolus produces much more severe acute pulmonary hypertension and eventually right ventricular failure); and hypodynamic shock with inadequate resuscitation, whereas hyperdynamic shock is more common in the ICU. Moreover, we observed predictable side effects of HSL with hypernatremia and metabolic alkalosis. It should be more suitable to use half molar sodium lactate or to decrease the dose of 11.2% HSL in order to limit the increase in sodium and bicarbonate levels. Furthermore, infusion of such a large amount of lactate will modify the serum lactate level and kinetics, and will have to be taken into account in interpreting lactate monitoring during the initial resuscitation. Last, if HSL was better that HSB due to lactate metabolism, it would be interesting to add another energy substrate (glucose for example) to HSB in future experiments.
HSL can be used as an energy substrate and resuscitative fluid. In our hypodynamic model of endotoxic shock, HSL infusion improved hemodynamic stability and microvascular reactivity with a negative fluid balance and better oxygenation. Further investigations are warranted to assess the potential clinical benefits of this treatment.
Lactate is an interesting energetic substrate that is well-metabolized even in poor hemodynamic conditions and hypertonic sodium lactate can be used as a resuscitative fluid.
In our porcine model of endotoxic shock, infusion of hypertonic sodium lactate improves hemodynamics and microcirculation with a negative fluid balance and better oxygenation.
The resulting sodium/chloride imbalance with hypertonic sodium lactate may induce a negative fluid balance.
We are grateful to Dr Ahmed El Kalioubie for his English corrections to this paper and to Dr Mouhamed Moussa for critically reviewing the manuscript. This study has been published as an abstract in Crit Care Med 2013.
The authors declare that they have no competing interests. All authors report no funding for support of this work.
TD: conception and design, logistics, data acquisition and analysis, drafting of manuscript, manuscript writing and final approval of the manuscript. RF: conception and design, data analysis, drafting of manuscript and final approval of the manuscript. DM: conception and design, data analysis, drafting of manuscript and final approval of the manuscript. TH: conception and design, drafting of manuscript and final approval of the manuscript. JM: conception and design, data acquisition and final approval of the manuscript. VG: conception and design, data analysis and final approval of the manuscript. LQ: drafting of manuscript, data acquisition and final approval of the manuscript. PM: data acquisition and final approval of the manuscript. FP: conception and design, data analysis and final approval of the manuscript. MJ: conception and design, logistics, data acquisition and analysis, drafting of manuscript, manuscript writing and final approval of the manuscript. | 2019-04-26T16:13:01Z | https://ccforum.biomedcentral.com/articles/10.1186/s13054-014-0467-3 |
It is an important question in the historiography of modern logic whether Leibniz’s logical calculi influenced logic in its present state or whether they were only ingenious anticipations. The most significant of Leibniz’s contributions to formal logic were published in the early 20th century. Only then, Leibniz’s logic could be fully understood. Nevertheless, the essentials of his philosophy of logic and some technical elaborations could be derived from early editions of his writings published in the 18th and 19th centuries.
The most important of these editions was Johann Eduard Erdmann’s collection of Leibniz’s philosophical works (1839/40) which led to a first wave of reception of Leibniz’s logic. This edition and Adolf Trendelenburg’s discussion of Leibniz’s theory of signs on the basis of texts published in it allowed a further reception of Leibnizian ideas among mathematical logicians at the end of the 19th century.
Leibniz’s impact on the emergence of modern logic, be it mathematical, algebraic, algorithmic or symbolic logic, is an important topic for understanding the emergence and development of the logic predominant today (on Leibniz’s influence and reception cf. Heinekamp (ed.) 1986; on his influence in logic cf. Peckhaus 1997). However, the question whether Leibniz had any influence at all, or whether his ideas were rather not more than ingenious anticipations of later developments, is still disputed. The significance of this problem can be shown by referring to Louis Couturat, who claimed that in respect to the logical calculus Leibniz already had all the principles of much more recent logical systems of the algebra of logic (George Boole, Ernst Schröder) and was even more advanced in some points (Couturat 1901, 386). But did early “modern” logicians like Boole, Schröder, or Frege have any knowledge of Leibnizian logic, i.e., could Leibniz have had any influence on these pioneers of modern logic?
There are different answers to these questions. Wolfgang Lenzen, e.g., wrote that Leibniz was the most significant logician between Aristotle and Frege, but despite the enormous significance of his logic, he played hardly any role in the history of logic (Lenzen 2004a, 15; cf. also Lenzen 2004b). According to Lenzen, Leibniz’s mature logical theory was present in his Generales Inquisitiones de Analysi Notionum et Veritatum, which was only published in Couturat’s edition of Leibniz’s minor writings and fragments (Leibniz 1903, 356–399). Couturat had already referred to it in his book on Leibniz’s logic which had appeared two years earlier (Couturat 1901). We find similar evaluations by William and Martha Kneale, who in The Development of Logic rank Leibniz among “the greatest of all logicians,” but stress “that his work on logic had little influence for nearly 200 years after he wrote it” (Kneale/Kneale 1962, 320). In the Kneales’ opinion, Leibniz had rather become notorious for claiming to have made great discoveries in logic while there was little published evidence for this claim.
Heinrich Scholz, a great admirer of Leibniz and author of the first history of modern logic (Scholz 1931), argues along the same lines. For him, Leibniz is the creator of logistic, i.e., modern formal logic using logical calculi (Scholz 1931, 54, n. 9). Scholz reports that Leibniz inspired 18th-century logicians in Germany, above all Johann Heinrich Lambert (1728–1777) and Gottfried Ploucquet (1716–1790). But then he stresses (ibid., 56) that the logical calculi created in the middle of the 19th century by the English logician Augustus De Morgan and George Boole living in Ireland were completely independent of Leibniz and German 18th-century research on logic. These calculi were amplified by the German mathematician Ernst Schröder in his monumental Vorlesungen über die Algebra der Logik (Schröder 1890–1905).
If this thesis of the independence of 19th-century algebra of logic from Leibniz is accepted, it is possible to connect the discovery of Leibniz, the logician, with the Leibniz renaissance in early 20th century. In addition to Couturat’s book La logique de Leibniz d’après des documents inédits (1901), with a presentation of Leibniz’s logic in the spirit of the new logic, the following landmark publications have to be mentioned: Bertrand Russell’s A Critical Exposition of the Philosophy of Leibniz (1900), providing an axiomatic deductive reconstruction of Leibnizian metaphysics, and Ernst Cassirer’s Leibniz’ System in seinen wissenschaftlichen Grundlagen (1902), focussing on a Neo-Kantian interpretation of Leibniz’s philosophy. Undoubtedly, Couturat’s edition of Leibniz’s Opuscules et fragments inédits de Leibniz (Leibniz 1903), taken from the manuscripts in the Royal Library in Hanover and published in 1903, gave for the first time access to the wealth of Leibniz’s different approaches to logic.
Other authors assign Leibniz a key role in the development of modern logic. Eric J. Aiton, e.g., wrote that the Leibnizian project of a universal characteristic and the logical calculi resulting from it, “played a significant role in the history of logic” (1985, ix). Franz Schupp, starting from Couturat’s evaluation quoted earlier, assumed “that the Leibnizian logic might be relevant for the further development of modern logic, beyond the historically interesting aspect of an ‘ingenious anticipation’” (Schupp 1988, 42). Schupp wrote that every step in the development of modern logic led to new insights into the Leibnizian logic, but sometimes dealing with Leibniz influenced the development itself.
It seems to be in accord with the second position that the pioneers of modern logic themselves referred to Leibniz. George Boole’s widow, Mary Everest Boole, e.g., wrote that her husband, having been informed of Leibniz’s anticipations of his own logic, felt “as if Leibnitz had come and shaken hands with him across the centuries” (M. E. Boole 1905, quoted in Laita 1976, 243). William Stanley Jevons, who was responsible for the great public success of modern logic in Great Britain after Boole, claimed that “Leibnitz’ logical tracts are […] evidence of his wonderful sagacity” (Jevons 1883 , xix). Ernst Schröder thought that Leibniz’s ideal of a logical calculus had been brought to perfection by George Boole (Schröder 1877, III). The special controversy between Ernst Schröder and Gottlob Frege which was at the root of the later distinction between two kinds of modern logic, the algebra of logic and the Frege-style mathematical logic, was centered on the question how far the Leibnizian heritage was present in the respective variations of logic. In his Begriffsschrift, Frege had written that the idea of a general characteristic, of a calculus philosophicus or ratiocinator was too ambitious to be achieved by Leibniz alone. Frege’s own Begriffsschrift provides the first steps towards this goal, which can be found in the formula languages of arithmetic and chemistry (Frege 1879, VI). In his review of Frege’s Begriffsschrift, Schröder (Schröder 1880, 82) objected that the title “Begriffsschrift” promises too much. According to Schröder, Frege’s system is less of a ‘general characteristic’ and more of a calculus ratiocinator, and its development would have been significant, had it not already been achieved by others (esp. by Boole). Frege replied (Frege 1883, 1) that he did not intend to present an abstract logic in formulae like Boole, but to express contents by written signs in a more precise and clear manner than it would be possible by words. Therefore the Begriffsschrift is not a mere calculus ratiocinator, but a lingua characteristica in the Leibnizian sense, although he accepted that inferential calculation (schlussfolgernde Rechnung) was a necessary constituent of the Begriffsschrift.
Referring to Leibniz was a common place in the initial period of development of modern mathematical logic. Obviously, the early logicians saw some of their ideas represented in Leibniz, and in addition they had access to at least some of Leibniz’s writings that could lend support to this claim. But which of Leibniz’s ideas on logic could have been known in the middle of the 19th century?
The edition of Leibniz’s philosophical works in Latin and French, published by Rudolph Erich Raspe (Leibniz 1765; cf. Hallo 1934) contained some up to then unpublished letters and six pieces from the unpublished papers, of which two, “Difficultates quaedam logicae” and “Historia et commendatio linguae charactericae”, are relevant to logic. The most important feature of Raspe’s edition was the first publication of the “Nouveaux Essais sur l’entendement humain” which had been missing for sixty years. They influenced, e.g., Bernard Bolzano who regarded Leibniz as an ally when writing his seminal Wissenschaftslehre (Bolzano 1837, 2014; Mugnai 2011).
In 1768 Louis Dutens published the Opera omnia nunc primum collecta in Classes distributa praefationibus & indicibus exornata (Leibniz 1768; cf. Heinekamp 1986), a rather complete collection of Leibniz’s published works. It contained some hitherto unpublished correspondences.
The “Nouveaux Essais” count as Leibniz’s main work in epistemology. They were written between 1703 and 1705 and contained criticism of John Locke’s An Essay Concerning Human Understanding (Locke 1690). Locke died in 1704 when Leibniz was still working on the essays. The text caused a great sensation when it was published by Raspe. It can therefore be regarded as a key text for the reception of Leibniz in the late 18th and the 19th century. Logical considerations can be found in the fourth book “De la connaissance”. They concentrate on the theory of syllogism, but all elements of Leibniz’s theory of logic are present, to the extent that they are regarded as a device for the evaluation of the validity of given theses (ars iudicandi) and for finding new truths on the basis of given truths (ars inveniendi).
Leibniz stresses in the “Nouveaux essais” that syllogistic is part of a sort of universal mathematics, an art of infallibility (art d’infaillibilité). This art is not restricted to syllogisms, but concerns all kinds of formal proofs, i.e. all reasoning in which inferences are executed by virtue of their form (NE, ch. XVII, §4). According to Leibniz, there are some problems with algebra in that it is still far from being an art of invention. It has to be supplemented by a general art of signs or an art of characteristic (NE, ch. XVII, §9).
When access to Leibniz’s papers stored in Hanover became possible in the 1830s, interest in Leibniz arose almost immediately. It can be said that German research on Leibniz started as an aftermath of this event (Glockner 1932, 60). The pioneers in this period of research were the first editors of these papers. Although the philological interest stood at the center, one could also observe an emerging interest in systematic aspects of Leibniz’s logic. The following editorial milestones have to be mentioned: Gottschalk Eduard Guhrauer (1809–1854) edited the Deutsche Schriften (Leibniz 1838/40); Georg Heinrich Pertz (1795–1876) directed the edition of the collected works, of which a first series was devoted to the mathematical writings (Leibniz 1849–1863). The latter were edited by Carl Immanuel Gerhardt (1816–1899). In addition, Pertz also edited Leibniz’s Annales imperii occidentis Brunsvicenses (Leibniz 1843–1846).
The most important among these editorial projects was the edition of Leibniz’s philosophical works God. Guil. Leibnitii opera philosophica quae exstant Latina Gallica Germanica omnia (Leibniz 1839/40; cf. Glockner 1932, 59–65) prepared in two volumes by Johann Eduard Erdmann (1805–1892), which included fragments, published there for the first time, containing elaborations of Leibniz’s ideas concerning logical calculi. One of the documents is Leibniz’s 1696 letter to Gabriel Wagner which contains the famous definition of logic or the art of reasoning as the art to use the intellect (Verstand), i.e., not only to evaluate what is imagined, but also to discover (invent) what is hidden. The edition also contains the seminal fragments “Specimen demonstrandi in abstractis” and “Non inelegans specimen demonstrandi in abstractis” (Leibniz 1839/40, 94–97), the last with the algebraic plus-minus calculus, i.e. a central specimen of Leibniz’s various attempts to create logical calculi working with the two “constituting” operations “gathering together”, symbolized by +, and “taking away”, symbolized by – (cf. Leibniz 1999, no. 178).
Johann Eduard Erdmann studied theology and philosophy at Tartu and Berlin (cf. Glockner 1932). Friedrich Schleiermacher and Georg Friedrich Wilhelm Hegel were among his teachers. He later became a member of the right wing Hegelian school. In 1839 he was appointed full professor of philosophy at the University of Halle. Erdmann became well-known for his comprehensive history of modern philosophy entitled Versuch einer wissenschaftlichen Darstellung der Geschichte der Neueren Philosophie (“Attempt at a scientific presentation of the history of recent philosophy”), published in seven volumes (Erdmann 1834–1853). This history of philosophy covers the period between Descartes and Hegel. In part 2 of vol. 2 of this work, Erdmann presented a discussion of Leibniz and the development of idealism before Kant. This presentation was published in 1842, two years after his edition of Leibniz’s philosophical works. Erdmann reported that while preparing his history he grew unsatisfied with the available editions of Leibniz’s works. He therefore intended to unite Raspe’s edition with the philosophical parts of Dutens’ edition and some pieces from the unpublished papers. He started editorial work at the archive in Hanover in 1836.
In the chapter on Leibniz, Erdmann stressed the connection between mathematics and philosophy. He dealt with Leibniz’s logic in the section on the philosophical method and mentioned Leibniz’s definition of “method” as the way to derive all knowledge with the help of “principles of knowledge” (Erkenntnisprinzipien) (Erdmann 1842, 109). These principles are the law of contradiction and the law of sufficient reason. Erdmann quoted Leibniz’s letter to Gabriel Wagner containing the statement that logic is the art to use the intellect; logic is therefore the key to all sciences and arts. According to Erdmann, Leibniz identifies the logical method with the mathematical method regarding it as the true philosophical method. Erdmann furthermore dealt at length with Leibniz’s “mathematical treatment of philosophy” not only because it was important for Christian Wolff and his school, but also “because just this point is usually ignored in presentations of Leibniz’s philosophy” (ibid., 114). He had good reasons for this evaluation because most of the relevant writings became only accessible in his own edition (Leibniz 1839/40). Erdmann discussed Leibniz’s calculi calling them “methodic operations” with data in the “way of calculating”. He mentioned Leibniz’s idea of a character script for the calculus which allows using signs without always having a particular meaning in view. Such “pasigraphy” would eliminate the differences between the languages, but, according to Erdmann’s evaluation, the idea of a universal language was not at the center of Leibniz’s interests. Leibniz’s main point was that “all mistakes in reasoning will at once show up in a wrong combination of characters, and therefore the application of the characteristic script provides a means to discover the mistake in a disputed point like in every other calculation” (ibid., 122–123).
Erdmann’s discussion of Leibniz can be evaluated as follows. He opened the way for the inclusion of Leibniz’s conception of logic into the actual philosophical debates on logic. This is all the more astonishing as Erdmann was a Hegelian. Hegel was known and heavily criticized for his depreciation of formal logic. On the other hand, stressing the close connection between philosophy and mathematics fits into a time when many philosophers tried to bring philosophy back into contact with the sciences.
Erdmann’s edition immediately stimulated further research on Leibniz’s logic. Gottschalk Eduard Guhrauer criticized extensively Leibniz’s universal characteristic in the first volume of his biography of Leibniz (Guhrauer 1846). He stressed its absurd and utopian character: According to Guhrauer, Leibniz’s general characteristic must almost be seen as on a par with the philosopher’s stone and the secrets of producing gold.
For him [Leibniz], the universal science is the true logic; both, universal science and logic, are the arts of judgment and invention; writing mathematically means for him writing in forma, which he believes to be possible outside mathematics; for him, the logical form of reasoning is a calculus; formulas, relations and operations of his universal science correlate with concepts, judgments and inferences of his logic; finally, the second part of the universal science, the art of invention, is an epitome of relatively general methods. We cannot accuse him of having overestimated logic. It was not his opinion that simple knowledge of logical rules would do great things, but its application. In the application of logical rules, however, men who had the knowledge of logical rules to a great extent had shown weaknesses.
In 1857 the Herbartian philosopher from Bohemia, František Bolemír Květ (1825–1864), published a booklet entitled Leibniz’ens Logik. Květ reconstructed the elements of Leibniz’s scientia generalis stressing the originality of their combination, but not of every single element. He discussed the “extremely meager” fragments concerning the philosophical calculus. They showed, Květ wrote, how far their author stood behind his aims. He dismissed Leibniz’s ars inveniendi, calling it embarrassing because of its weaknesses, defects and impossibility.
The most important figure in this second period of reception was Friedrich Adolf Trendelenburg (1802–1872). He had studied philology, history and philosophy at the universities of Kiel, Leipzig and Berlin (cf. Bratuschek 1872; Vilkko 2002, 56–81; Vilkko 2009, 211–217; Peckhaus 2007). Among his teachers were Karl Leonhard Reinhold and Johann Erich von Berger. He became professor in 1833; in 1837 he was promoted to full professor of practical philosophy and education at the Friedrich-Wilhelms-University Berlin where he grew into one of the main leaders of Prussian education and German philosophy. An ordinary member of the Royal Prussian Academy of Science at Berlin since 1846, he became the secretary of the Philosophical-Historical Section of this Academy in 1847. Trendelenburg was an anti-Hegelian who started from Hegelian philosophy. His fame as a neo-Aristotelian goes back to his Elementa logices Aristotelicae, first published in 1836 with five further editions (Trendelenburg 1836). In his systematic work on logic he pleaded for a unity of logic and metaphysics as found in the Aristotelian organon. This systematic attitude is developed in a comprehensive work containing heavy criticism of logical systems of his time, his Logische Untersuchungen, published in two volumes in 1840 (Trendelenburg 1840).
As a secretary of the Academy, Trendelenburg was charged with honoring Leibniz’s memory. Leibniz had been the first president of the “Societät der Wissenschaften” at Berlin, the predecessor institution of the Royal Prussian Academy of Science, founded on his initiative in 1700. In 1856, Trendelenburg delivered a seminal lecture entitled “Über Leibnizens Entwurf einer allgemeinen Charakteristik” at the Leibniz ceremony of the Academy at Berlin (Trendelenburg 1857). This paper was reprinted in the third volume of his Historische Beiträge zur Philosophie (1867). In this discussion of Leibniz, Trendelenburg stressed the essential role of signs in communication and reasoning. There is no logical relation between sign and intuition, but science has provided the opportunity to “bring the composition of the signs into immediate contact with contents of the concept” (Trendelenburg 1857, 3). The composition of the sign presents the characteristic marks distinguished and comprehended in the concept (ibid.). Trendelenburg called such a script “Begriffsschrift”. Maybe he took over this term from Wilhelm von Humboldt who had introduced it in 1824 (v. Humboldt 1826, quoted 1848, 532; cf. Thiel 1995, 20). According to Trendelenburg the beginnings of a Begriffsschrift were made, e.g., in the decimal number system. Trendelenburg saw the objectives of Leibniz’s program as widening such an approach to the complete domain of objects, thereby aiming at a “characteristic language of concepts” and a “general language of matter.” He mentioned the different names used by Leibniz: lingua characterica universalis (in fact Trendelenburg’s term; Leibniz used characteristica universalis), alphabet of human thoughts, calculus philosophicus, calculus ratiocinator, spécieuse générale. These names underline the significance Leibniz ascribed to this program for his philosophy. According to Trendelenburg, Leibniz aimed at “an adequate and therefore general signification of the essence [of conceptual content], namely by such analysis into the elements of concepts, that it becomes possible to treat it by calculation” (ibid., 6). He mentioned as historical precursors the ars magna of Raymundus Lullus and other conceptions of universal languages. Because of its generality, Leibniz’s characteristica universalis stands out compared with competing proposals by George Dalgarno (1661) and John Wilkins (1668), which were obtained from “choice, nature and chance,” and relied upon existing languages (ibid., 14–15).
If the side of calculus, invention and discovery is excluded from general characteristic, there still remains an attractive logical task: [the task of finding] a sign that distinguishes the elements and which is therefore clear and avoids contradictions; [the task of] leading back the intricate [intuition] to the simple contained in it. There remains the task of finding a sign which is determined by the concept of the matter itself, like our number script. But such adequate sign presupposes an analysis brought to an end and deepened down to the ground to become possible.
Trendelenburg stresses that such analysis cannot be done given the state of science of that time. If the characteristica universalis is not given up the still pending analytical formula has to be replaced by arbitrary conjectures, a procedure which, according to Trendelenburg, contradicts the idea and even the possibility of the intended calculation.
Erdmann’s edition induced a second wave of reception. This reception is characterized by an interest in Leibniz’s ideas on logic. Its context was the reorganization of the philosophical scene after Hegel’s death (1831). This process was connected with a discussion of the so-called “Logical Question”, a term created by Adolf Trendelenburg (Trendelenburg 1842) who initiated these debates. The discussions concerned the role of formal logic in the system of philosophy (cf. Peckhaus 1997, 130–163; Peckhaus 1999; Vilkko 2002, 56–81; Vilkko 2009). The authors aimed at overcoming Hegel’s identification of logic and metaphysics without re-establishing the old system of Aristotelian logic. The philosophical dominance of metaphysics was subsequently replaced by that of epistemology.
Trendelenburg’s comprehensive discussion was most significant, and his results are typical: He was interested in the characteristica universalis as a tool for knowledge representation, although he stressed its utopian character. He had no interest in the logical calculus due to a philosophical skepticism towards mechanical tools. They cannot explain creativity and have no relations to the predominant interest of philosophy in that time, namely the fields of dynamical (temporal) logics which should help to model the movement of thought (Denkbewegung).
Given the nature of Trendelenburg’s presentation of the Leibnizian system, his significance for the mathematical reception of Leibniz’s ideas in the context of the emergence of formal mathematics and mathematical logic in the second half of the 19th century is astonishing. Trendelenburg’s paper on Leibniz’s program of a general characteristic became a point of reference for logical pioneers such as Gottlob Frege and Ernst Schröder (on their controversy cf. Peckhaus 1997, 287–296).
What are the connections to Leibniz’s logic? Are there anticipations of the Boolean calculus in the work of Leibniz? One of those authors looking for anticipations was Robert Leslie Ellis (1817–1859), who edited Francis Bacon’s Novum Organon in The Works of Francis Bacon (1858–1874; vol. 1: 1858). During his editorial works he found a parallel to Boole’s Law (p. 281, footnote 1): “Mr. Boole’s Laws of Thought contain the first development of ideas of which the germ is to be found in Bacon and Leibnitz; to the latter of whom the fundamental principle in logic a2 = a was known.” As reference he gave Erdmann’s edition (Erdmann 1840, p. 130). Robert Harley (1828–1910), Boole’s first biographer, discussed this information in a paper entitled “Remarks on Boole’s Mathematical Analysis of Logic” (1867). He did not find the proper quote at the place indicated by Ellis, but he found other relevant texts. About the significance of Ellis’ remark he wrote: “Boole did not become aware of these anticipations by Leibnitz until more than twelve months after the publication of the ‘Laws of Thought,’ when they were pointed out to him by R. Leslie Ellis” (p. 5).
Harley’s research was taken up by the Manchester economist and philosopher William Stanley Jevons (1825–1882). Jevons formulated his philosophy of science, as found in the Principles of Science (1874), against John Stuart Mill’s predominant inductive logic. His alternative to inductive logic was the “Principle of Substitution”. He included a section “Anticipations of the Principle of Substitution”, which was enlarged in the later edition with a long discussion of Leibniz’s anticipations. There he expressed his thanks to Robert Adamson for the information that the Principle of Substitution can be traced back to Leibniz. Jevons asked what were the reasons for the long ignorance of Leibniz’s anticipations. Only Dutens’ edition was available in Owens College Library, Manchester. He regretted having overlooked Erdmann’s edition, but noted that this was also done by other “most learned logicians”.
Finally, John Venn (1834–1923) has to be mentioned. His Symbolic Logic (1881) is important for the historical contextualization of the new logic. He criticized Jevons’ statement on the Law of Duality according to which “the late Professor Boole is the only logician in modern times who has drawn attention to this remarkable property of logical terms” as being simply false. Besides, Leibniz, Lambert, Ploucquet and Segner had anticipated the law “perfectly explicitly” and he had no doubts “that any one better acquainted than myself with the Leibnitzian and Wolfian logicians could add many more such notices” (Venn 1881, xxxi, footnote 1).
No doubt, the new logic emerging in the second half of the 19th century was created in a Leibnizian spirit. The essentials of Leibniz’s logical and metaphysical program and of his ideas concerning a logical calculus were available at least since the 1840s. Erdmann’s edition of the philosophical works and Trendelenburg’s presentation of Leibniz’s semiotics were the most important steps towards the further reception of Leibnizian ideas among mathematical logicians at the end of the 19th century. As soon as these logicians became aware of Leibniz’s ideas, they recognized Leibniz’s congenial affinity and accepted his priority. But the logical systems had basically been already established. Therefore there was no initial influence of Leibniz on the emergence of modern logic in the second half of the 19th century.
Aiton, E. J. , 1985, Leibniz. A Biography, Bristol/Boston: Adam Hilger.
Bacon, F., 1858, “Novum Organum sive indicia vera de interpretatione naturae,” in Francis Bacon, The Works of Francis Bacon, J. Spedding/R. L. Ellis/D. D. Heath (eds.), 14 vols., London: Longman & Co. et al. 1858–1874, reprinted Stuttgart-Bad Cannstatt: Friedrich Frommann Verlag Günther Holzboog 1963, vol. 1 , pp. 149–365.
Bolzano, B., 1837, Wissenschaftslehre. Versuch einer ausführlichen und grösstentheils neuen Darstellung der Logik mit Rücksicht auf deren bisherige Bearbeiter, 4 vols., Sulzbach: Seidel; English translation Bolzano 2014.
–––, 2014, Theory of Science, 4 vols., transl. by P. Rusnock and R. George, Oxford: Oxford University Press. Originally published 1837.
Boole, G., 1847, The Mathematical Analysis of Logic. Being an Essay Towards a Calculus of Deductive Reasoning, Cambridge: Macmillan, Barclay, and Macmillan /London: George Bell; reprinted Oxford: Basil Blackwell 1951.
–––, 1854, An Investigation of the Laws of Thought, on which are Founded the Mathematical Theories of Logic and Probabilities, London: Walton & Maberly; reprinted New York: Dover nd. .
Boole, M. E., 1905, “Letters to a Reformer’s Children ,” in: M. E. Boole, Collected Works, 4 vols., ed. E. M. Cobham, C.W. Daniel: London 1931, vol. 3, pp. 1138–1163.
Bratuschek, E., 1872, “Adolf Trendelenburg,” Philosophische Monatshefte 8: pp. 1–14, 305–510; separately published as Adolf Trendelenburg, Berlin: Henschel 1873.
Cassirer, E., 1902, Leibniz’ System in seinen wissenschaftlichen Grundlagen, Marburg: Elwert.
Couturat, L., 1901, La logique de Leibniz d’après des documents inédits, Paris: Alcan.
Erdmann, J. E., 1834–1853, Versuch einer wissenschaftlichen Darstellung der Geschichte der Neueren Philosophie, 7 vols., Berlin: Vogel.
–––, 1842, Versuch einer wissenschaftlichen Darstellung der Geschichte der neueren Philosophie, vol. 2, pt. 2: Leibniz und die Entwicklung des Idealismus vor Kant, Leipzig: Vogel.
Exner, F., 1843, “Über Leibnitz’ens Universal-Wissenschaft,” Abhandlungen der Königlichen Böhmischen Gesellschaft der Wissenschaften, 5th series, vol. 3 (1843–44), Calve: Prag 1845, pp. 163–200; separately Prag: Borrosch & André.
Frege, G., 1879, Begriffsschrift, eine der arithmetischen nachgebildete Formelsprache des reinen Denkens, Halle: Louis Nebert; reprinted in Gottlob Frege, Begriffsschrift und andere Aufsätze, 3rd ed., with E. Husserl’s and H. Scholz’s comments edited by I. Angelelli, Darmstadt: Wissenschaftliche Buchgesellschaft 1977.
–––, 1883, “Ueber den Zweck der Begriffsschrift,” Jenaische Zeitschrift für Naturwissenschaft 15: 1–10, supplement: Sitzungsberichte der Jenaischen Gesellschaft für Medicin und Naturwissenschaft für das Jahr 1882; again in G. Frege, Begriffsschrift und andere Aufsätze, 3rd ed., with E. Husserl’s and H. Scholz’s comments edited by I. Angelelli, Darmstadt: Wissenschaftliche Buchgesellschaft 1977, pp. 97–106.
Glockner, H., 1932, Johann Eduard Erdmann, Stuttgart: Fr. Frommanns Verlag (Frommanns Klassiker der Philosophie; 30).
Guhrauer, G. E., 1842, Gottfried Wilhelm Freiherr v. Leibnitz. Eine Biographie, 2 vols., Breslau: Hirt; new edition 1846; reprinted Hildesheim: Olms 1966.
Hallo, R., 1934, Rudolf Erich Raspe. Ein Wegbereiter deutscher Art und Kunst, Stuttgart/Berlin: Kohlhammer (Göttinger Forschungen; 5).
Harley, R., 1867, “Remarks on Boole’s Mathematical Analysis of Logic,” Report of the Thirty-sixth Meeting of the British Association for the Advancement of Science; Held at Nottingham in August 1866, London: John Murray.
Heinekamp, A., 1986, “Louis Dutens und seine Ausgabe der Opera omnia von Leibniz,” in A. Heinekamp (ed.) 1986, pp. 1–28.
–––, 1986, Beiträge zur Wirkungs- und Rezeptionsgeschichte von Gottfried Wilhelm Leibniz, Stuttgart: Franz Steiner (Studia Leibnitiana Supplementa; 26).
von Humboldt, W., 1826, “Ueber die Buchstabenschrift und ihren Zusammenhang mit dem Sprachbau,” Abhandlungen der historisch-philologischen Klasse der k. Akademie der Wissenschaften zu Berlin. Aus dem Jahre 1824, Berlin, 1826, pp. 161–188; citations to Wilhelm von Humboldt’s gesammelte Werke, Volume 6, Berlin: Reimer, 1848, pp. 526–561.
Jevons, W. S., 1874, The Principles of Science. A Treatise on Logic and Scientific Method, 2 vols., London: Macmillan and Co. [New York 1875]; 2nd ed. London/New York: Macmillan, 1877; 3rd ed. 1879; “stereotyped edition” 1883.
Kneale, W./Kneale, M., 1962, The Development of Logic, Oxford: Clarendon Press.
Květ, F. B., 1857, Leibnitz’ens Logik. Nach den Quellen dargestellt, F. Prag: Tempsky.
Laita, L. M., 1976, A Study of the Genesis of Boolean Logic, Ph.D. Notre Dame.
Leibniz, G. W., 1765, Œuvres philosophiques latines et françaises de feu Mr de Leibnitz, tirées des ses Manuscrits qui se conservant dans la Bibliothèque royale à Hanovre et publiées par M. Rud. Eric Raspe, Amsterdam/Leipzig: Jean Schreuder.
–––, 1768, Opera omnia nunc primum collecta in Classes distributa praefationibus & indicibus exornata, studio Ludovici Dutens, 6 vols., Geneva: Fratres de Tournes.
–––, 1838/40, Deutsche Schriften, G.E. Guhrauer (ed.), Berlin: Veit und Comp., reprinted Hildesheim: Olms 1966.
–––, 1839/40, God. Guil. Leibnitii opera philosophica quae extant Latina Gallica Germanica omnia, 2 vols., J. E. Erdmann (ed.), Berlin: Eichler.
–––, 1843–1846, Annales imperii occidentis Brunsvicenses, G.H. Pertz (ed.), Hahn: Hannover 1843–1846.
–––, 1849–1963, Mathematische Schriften, C. I. Gerhardt (ed.), 7 vols., Berlin: Asher et Comp. (Werke aus den Handschriften der Königlichen Bibliothek zu Hannover, ed. by G.H. Pertz).
–––, 1903, Opuscules et fragments inédits de Leibniz. Extraits des manuscrits de la Bibliothèque royale de Hanovre, ed. Louis Couturat, Paris: Félix Alcan.
–––, [NE] 1962, Sämtliche Schriften und Briefe, ser. 6: Philosophische Schriften, vol. 6: Nouveaux Essais, A. Robinet/H. Schepers (eds.), Berlin: Akademie Verlag.
–––, 1999, Philosophische Schriften, ser. 6: Philosophische Schriften vol. 4: 1677–Juni 1690, Leibniz-Forschungsstelle der Universität Münster (ed.), 4 parts, Berlin 1999.
Lenzen, W., 2004a, “Leibniz und die (Entwicklung der) moderne(n) Logik,” in W. Lenzen, Calculus Universalis. Studien zur Logik von G.W. Leibniz, Paderborn: Mentis, pp. 15–22.
Lenzen, W., 2004b, “Leibniz’s Logic,” in Handbook of the History of Logic, D. M. Gabbay/J. Woods (eds.), volume 3: The Rise of Modern Logic: From Leibniz to Frege, Amsterdam et al.: Elsevier-North-Holland, pp. 1–83.
Locke, J., 1690, An Essay Concerning Human Understanding, London: Thomas Ballet.
Mugnai, M., 2011, “Bolzano e Leibniz”, Discipline Filosofiche 21: 93–108.
Peckhaus, V., 1997, Logik, Mathesis universalis und allgemeine Wissenschaft. Leibniz und die Wiederentdeckung der formalen Logik im 19. Jahrhundert, Berlin: Akademie-Verlag (Logica Nova).
Peckhaus, V., 1999, “19th Century Logic Between Philosophy and Mathematics,” Bulletin of Symbolic Logic 5: pp. 433–450.
–––, 2007, “Gegen ‘neue unerlaubte Amalgamationen der Logik.’ Die nachhegelsche Suche nach einem neuen Paradigma in der Logik,” in Stuttgarter Hegel-Kongreß 2005. Von der Logik zur Sprache, R. Bubner/G. Hindrichs (eds.), Stuttgart: Klett-Cotta (Veröffentlichungen der Internationalen Hegel-Vereinigung; 24), 241–255.
Russell, B., 1900, A Critical Exposition of the Philosophy of Leibniz, Cambridge: The University Press.
Scholz, H., 1931, Geschichte der Logik, Berlin: Junker und Dünnhaupt.
Schröder, E., 1877, Der Operationskreis des Logikkalkuls, Leipzig: Teubner; reprinted as special edition Darmstadt: Wissenschaftliche Buchgesellschaft 1966.
Schröder, E., 1880, Review of Frege, Begriffsschrift, Zeitschrift für Mathematik und Physik, Hist.-literarische Abt. 25: 81–94.
–––, 1890–1905, Vorlesungen über die Algebra der Logik, 3 vols., Leipzig: Teubner.
Schupp, F., 1988, “Einleitung. Zu II. Logik,” in Leibniz’ Logik und Metaphysik, A. Heinekamp/F. Schupp (eds.), Darmstadt: Wissenschaftliche Buchgesellschaft (Wege der Forschung; 328), pp. 41–52.
Thiel, C., 1995, “‘Nicht aufs Gerathewohl und aus Neuerungssucht’: Die Begriffsschrift 1879 und 1893,” in I. Max/W. Stelzner (eds.), Logik und Mathematik. Frege-Kolloquium Jena 1993, Berlin/New York: Walter de Gruyter (Perspectives in Analytical Philosophy; 5), 20–37.
Trendelenburg, F. A., 1836, Elementa logices Aristotelicae. In usum scholarum ex Aristotele excerpsit, convertit, illustravit, Berlin: Bethge, 51862.
–––, 1840, Logische Untersuchungen, 2 vols., Berlin: Bethge, 2nd ed. Leipzig: Hirzel 1862.
–––, 1842, “Zur Geschichte von Hegel’s Logik und dialektischer Methode. Die logische Frage in Hegels Systeme. Eine Auffoderung [sic!] zu ihrer wissenschaftlichen Erledigung,” Neue Jenaische Allgemeine Literatur-Zeitung 1, (97, 23 April 1842): 405–408; (98, 25 April 1842): 409–412; (99, 26 April 1842): 413–414; separately published as F. A. Trendelenburg, Die logische Frage in Hegel’s System. Zwei Streitschriften, Leipzig: Brockhaus 1843.
–––, 1857, “Über Leibnizens Entwurf einer allgemeinen Charakteristik,” Philosophische Abhandlungen der Königlichen Akademie der Wissenschaften zu Berlin. Aus dem Jahr 1856, Berlin: Commission Dümmler, pp. 36–69; separately published in Trendelenburg 1867, 1–47.
–––, 1867, Historische Beiträge zur Philosophie, vol. 3: Vermischte Abhandlungen, Berlin: Bethge 1867.
Venn, J., 1881, Symbolic Logic, London: Macmillan & Co.
Vilkko, R., 2002, A Hundred Years of Logical Investigations. Reform Efforts of Logic in Germany 1781–1879, Paderborn: Mentis.
–––, 2009, “The Logic Question During the First Half of the Nineteenth Century”, in L. Haaparanta (ed.), The Development of Modern Logic, Oxford et al.: Oxford University Press, 203–221.
Online version of Leibniz’ Philosophische Schriften, ser. 6, vol. 4, at Leibniz-Edition. | 2019-04-21T02:26:35Z | https://stanford.library.sydney.edu.au/entries/leibniz-logic-influence/ |
The Tyee’s updated tally of 15 years of public messes, sourced and explained.
David Beers is founding editor of The Tyee and Tom Barrett is a long time contributor to The Tyee and before that covered B.C. politics for the Vancouver Sun. Grateful thanks to other Tyee team members who assisted in compiling this list and checking its accuracy.
This report is part of The Tyee’s reader-funded B.C. 2017 election coverage. To learn more about becoming a Tyee Builder, go here.
Gordon Campbell image: Foreign & Commonwealth Office on Flickr, Christy Clark image: Government of British Columbia on Flickr. Both Creative Commons licensed with changes made by the Tyee.
[Editor's note: This list, which combines the Gordon Campbell and Christy Clark eras, grew from an original 98 items published last week to 117 after we invited Tyee readers to suggest additions. Some definitions: By falsehood we mean promises broken or assertions that proved demonstrably untrue. By boondoggle we mean significant public money lost to waste, overruns, or ill-conceived initiatives. And by scandal we mean moments when government was revealed to have seriously broken rules or caused harm either deliberately or through neglect or incompetence. The Tyee chose these categories with the assumption that all voters, no matter their political leanings, would prefer their government tell the truth, spend money responsibly, and avoid embarrassing breaches of ethics or the law. We also present sidebar items that don’t fit the categories, but also aren’t anything a premier might put on her podium sign.
B.C.’s high-flying premier ran up more than half a million dollars in private jet flights during her first five years in office, at times managing to squeeze in Liberal party fundraisers among the government photo ops. On at least two occasions, Clark flew on jets chartered from companies owned by wealthy Liberal backers.
In 2005 the BC Liberal government created a universal computer system to track K-12 student data across the province. Cost overruns zoomed from $16 million to $97 million as glitches, shutdowns, slow service and a critical independent assessment doomed it to obsolescence. The province gave up on the system in 2011 and ordered up a replacement. It took four years to find and install, and performed so badly it elicited new excoriations from educator users, and an apology from its maker.
After the 2011 Stanley Cup riot, the government hired former Olympics boss John Furlong and Former Nova Scotia deputy attorney-general Doug Keefe to co-chair an inquiry. Their report was criticized for letting Canucks brass, senior bureaucrats, police and politicians off the hook. The inquiry did manage to go over its budget, though, running up a bill well over $300,000. Documents showed that Furlong billed for four hours of work the same day he spoke to the International Olympic Committee in South Africa.
The government boasted the booming economy they’d created had resulted in 27 mill re-openings and 10,000 new forestry jobs since 2009. Turns out those numbers were based on the “number of board feet [exported to] China divided by 250 million feet per mill” — numbers that the Opposition NDP said didn’t match figures from Statistics Canada. The NDP’s numbers came up with less than half that number of new jobs. And the government’s own stats don’t bear out the boast.
The B.C. government would eventually bring in new rules to improve sawmill safety but declined to mount a public inquiry. No charges were laid against the mills’ owners because the B.C. Criminal Justice Branch decided that WorkSafeBC’s actions and inactions had made successful prosecutions unlikely. Not only had WorkSafeBC failed to warn the mills of the dust buildup, but its investigations into the tragedies were so flawed that the evidence gathered would not be admissible in court, the prosecutors concluded.
When Christy Clark replaced Gordon Campbell as B.C.’s premier she cleaned house, racking up a big severance bill: $2.4 million for 13 members of Campbell’s senior staff shown the door. One of Clark’s hand-picked replacements was press secretary Chris Olsen. Less than year after his hire, he was fired and given $67,000 in severance, all “by the rules” assured an otherwise mum Clark.
British Columbia should make it easier for B.C. students who study medicine abroad to get training positions in their home province, advocated a report prepared by BC Liberal MLA Moira Stilwell for the health minister. “Our population needs these gifted young physicians,” she wrote. What she didn’t tell the health minister is that her own son was studying medicine at a school in Ireland.
The B.C. government used non-standard accounting to make the deficit seem $520 million smaller than it really was, accused B.C.’s auditor general in 2012. It was too familiar, he said, citing “a long-standing trend of shortcomings in the transparency of government’s finances” throughout the BC Liberal era.
Harry Bloy was the only MLA to support Christy Clark in her campaign for BC Liberal leader. When she won, the career backbencher found himself in cabinet, as minister of social development. As his ministry shut down programs for disabled adults, Bloy gave the impression of a man with only the faintest idea of what his job entailed. After being demoted to minister of state for multiculturalism, Bloy was forced to resign when he passed on a private email from a Province reporter to officials of a company the reporter was investigating.
In May 2011, Premier Christy Clark said she was going to ban the cosmetic use of pesticides, telling reporters: “I’ve supported this for years now. We are going to do it.” A year later, after a legislative committee split along party lines on whether to support a ban, Clark wasn’t going to do it. Unlike most provinces, B.C. still has not banned cosmetic pesticides.
In June 2011 Premier Clark promised the public would get the chance to comment on the Comprehensive Economic and Trade Agreement between Canada and the European Union, then under negotiation. “There will be, I’m told, consultation on this agreement,” she said. “There will be many avenues for the public’s input.” A year later, no consultation. “No, we don’t intend to do that,” Clark told the legislature.
After The Tyee reported Chinese temporary workers were being illegally charged thousands by recruiters for B.C. mining operations, and the CBC independently confirmed the practice, the BC Liberal government pledged to investigate, but claimed to find no evidence. Pressed, the government produced no evidence any real investigation had been done, and union reps cried foul.
When Minister Margaret MacDiarmid announced the firing of seven health ministry workers in 2012, she claimed the RCMP were investigating their alleged misbehaviour. Later, after one worker committed suicide, others sued, none were charged, some got cash settlements and their jobs back, and the premier apologized, it came to light that the RCMP, for lack of evidence, had never launched any investigation.
Roderick MacIsaac killed himself three months after he was fired as part of a 2012 investigation into alleged ethics breaches. Premier Clark eventually apologized for the “heavy handed” firings of MacIsaac and others.
Ph.D student Roderick MacIsaac killed himself three months after he was fired with six other government health researchers as part of a 2012 investigation into alleged ethics breaches. MacIsaac had been assessing the risks of anti-smoking drugs the province was paying for after Christy Clark promised it would when running for leader. The drugs included Champix, previously the subject of U.S. and Canada safety warnings. Premier Clark eventually apologized for the “heavy handed” firings of MacIsaac and others. Some were offered their jobs back and awarded cash settlements after the government admitted it overreacted.
The NDP and MacIsaac’s sister called for a public inquiry, but the Clark government said no, choosing the less transparent route of putting the Ombudsperson in charge of fact-finding and even changing the law to make it possible, despite serious concerns raised by the fired, the opposition and the Ombudsperson himself.
The BC Liberals’ false persecution of seven drug researchers in 2012 left taxpayers on the hook for cash settlements with the fired workers, legal costs, and multiple reviews of the snafu. One such probe was contracted to Deloitte & Touche LLP without allowing other firms to compete because “an unforeseeable emergency exists,” the 2012 paperwork showed. The firm billed $684,309.67 in less than five months and in May 2013 stood to receive another non-compete contract for $650,000 to keep at it. Meanwhile, taxpayers incurred the untold expense of paying for drugs that might otherwise have been recommended against. For example, the government kept paying for Alzheimer’s drugs in a pilot study longer than planned while the research work on its effectiveness halted after the firings. Graham Whitmarsh, who was deputy minister during the firings, was himself fired after the next election and given a $250,000 golden parachute.
B.C. government officials smelled a problem and warned superiors when the Tanned, Wild and Woolly project sought a grant to teach five people in Powell River how to tan sheepskins. “There is a direct conflict of interest with the President of the Non-profit being hired as the Supervisor on the project,” the assessment said. That president/supervisor-to-be was former BC Liberal MLA Judy Tyabji Wilson, whose non-profit eventually got $181,635 from a joint program of the B.C. and Canadian governments, $67,000 to Tyabji Wilson.
In July 2010 the BC Liberal government promised to change the legislation covering municipal election spending in time for the 2011 elections. Nine months later, however, the government admitted the changes wouldn’t happen until 2014 “due to tight timelines for spring legislation and the complexity of the planned changes.” Then, in February 2013, the minister in charge admitted the changes weren’t coming anytime soon. The changes finally went through in 2014, in time for the 2018 elections — seven years late.
Premier Clark’s chief of staff Ken Boessenkool suddenly resigned after he acted, he said, “inappropriately.” Whatever he did involved a female government staffer in a bar, according to news reports. The premier refused to give details, citing privacy. Her deputy chief of staff may have destroyed related records, the Information Commissioner later found.
In the thick of 2013’s election, Premier Clark took to the airwaves to make a series of false claims about her government’s record on debt, deficits, and the province’s credit rating.
The BC Liberal government spent $11 million of British Columbians’ money hosting a Times of India Film Awards show a month before the 2013 provincial election. The Bollywood bash, exuded Premier Clark, “is just part of what’s going to inject millions into our economy as a result of our relationship with the Times of India Media Group,” later crediting the show with boosting visits by Indian tourists to B.C. Visits to Greater Vancouver did rise the next year, at about the same rate for all of Canada. But instead of crediting the awards show, the Canadian Tourism Commission cited the easing of visa restrictions for Indians. Two years after the show aired, B.C. continued to lag behind Ontario and Alberta in number of tourists from India.
BC Liberal candidate Sukh Dhaliwal pulled out of the 2013 election race after tax evasion charges were laid against him. He and his wife later pled guilty and paid fines for failing to file returns for their company. Dhaliwal had previously attracted controversy when a Liberal MP by writing a letter of recommendation on House of Commons stationery to a U.S. judge considering the fate of convicted heroin trafficker Ranjit Cheema, held in a California jail. Later, Dhaliwal said going to bat for Cheema had been a “mistake.” After serving his time in the U.S. and released, Cheema was gunned down.
B.C.’s ombudsperson looked at who gets to declare whom medically unfit to handle their own legal and financial affairs and found procedures so lax that rights were regularly violated. Thousands were made to surrender control to the Public Guardian and Trustee because they had been ruled “incapable,” even though people labeling them lacked formal training or even a clear understanding of what the term meant.
The BC Liberals plotted to woo voters while using public funds to collect data for the election, which is forbidden. The strategy memo, written by Premier Clark’s close friend and deputy chief of staff Kim Haakstad and shared by private email to avoid public scrutiny, cynically suggested the party gain “quick wins” by offering apologies for “historical wrongs” to various ethnic groups. After the memo leaked, the multiculturalism minister stepped down, his aide resigned, and so did Haakstad and communications director Brian Bonney, who was charged with breach of trust. Clark called it all “a serious mistake” but rebuffed calls for an independent investigation.
As premier, Christy Clark promoted RCI Capital Inc. on overseas trade trips without publicly disclosing her past ties to the company. The CEO of RCI said he hired Clark, after her first stint in government, to be director of his new subsidiary aiming to recruit foreign students to B.C. But the enterprise stalled, he said and Clark did no work and wasn’t paid the two years she was listed director. Clark shrugged off conflict of interest accusations leveled by the opposition, watchdog IntegrityBC and others.
To avoid more catastrophes like the 2014 failure of the tailings pond dam at Mount Polley mine, responsibility for regulating mining in B.C. should be taken away from the ministry that also promotes the industry, concluded a report from the province’s auditor general. The Ministry of Energy and Mines’ “role to promote mining development is diametrically opposed to compliance and enforcement," said the report, which found “major gaps in resources, planning and tools” and “too few resources, infrequent inspections, and lack of enforcement” threatened the safety of mines across B.C. Work on the audit was already underway when the Mount Polley disaster happened. BC Liberals deeply cut mine safety inspections when they took government in 2001.
The aftermath of a tailings pond failure at Mount Polley mine, 2014. Photo: Cariboo Regional District.
A government probe slammed BC Liberal Advanced Education Minister Amrik Virk for transparency failures when he was on the board of Kwantlen Polytech. After months of pressure, Premier Clark demoted Virk to a less important ministry while keeping him in cabinet.
The man in charge of keeping B.C. gambling clean did not disclose a conflict of “private economic” interest before suddenly quitting to lead a private casino venture. Michael Graydon was forced to apologize after investigators revealed that, while CEO of the BC Lottery crown corporation, he was in discussions with a consortium that months later hired him with hopes of moving into a $535-million complex on provincial land. Once gone from government, Graydon kept getting BC Lottery emails, including a strategic memo.
The BC Liberal government has repeatedly said LNG projects would create 100,000 jobs in B.C., citing a 2014 consultants’ report it paid for, but the math is sketchy. KPMG assumed at least five plants built by 2023 but the government itself only predicts three, with none yet underway. Based on five plants, by 2022 KPMG projected 58,700 “direct and indirect” construction jobs, 23,800 operations jobs and thousands of “induced” jobs created by households with more income. Most of those jobs wouldn’t be permanent. And taken together, even in the peak construction year of 2018, all jobs fall 30 per cent short of 100,000. So how many long-term jobs could five LNG plants create? Once “in full production by 2027, the steady state direct workforce demand for operations is expected to be 8,000 to 9,000 jobs,” said KPMG.
Premier Clark created a bureaucracy to make sure cities spent their money responsibly. But the Auditor General for Local Government blew through $5.2 million in two years while getting little done, a leaked government report found. The 10-person office was itself badly run by Basia Ruta, most of her staff alleged to investigators. The BC Liberal government, which had paid a private headhunter $57,000 to hire Ruta, fired her.
In the 2011/12 fiscal year, members of the B.C. Ministry of Forests journeyed to Alberta’s capital city. There they charged taxpayers $375 for three visits to a Hooters restaurant.
Two years after Premier Clark created the Auditor General for Local Government, The Tyee asked the minister in charge if there were management and human resource problems at that office. None, Minister Coralee Oakes assured. But she was directly contradicted by a damning report finished the month before by Oakes’ own director of strategic human resources. Later, the auditor general was canned.
An independent appraiser told the BC Liberal government if it hung onto 14 parcels of Coquitlam land for some months to let the market work they would fetch $128 million. But all the land was sold quickly instead to one buyer, a big Liberal donor, for $43 million less. The sale went down just in time to pad a BC Liberal budget shy of balancing.
The Integrated Case Management computer system chosen by the BC Liberal government in 2008 to manage sensitive social service files crashed and kept piling up costs, including over $500,000 a year for a repair team roving the province. B.C. was alone in choosing the software rejected by other jurisdictions as wrong for the job, and met early with a bad security breach and slowdowns, internal documents showed. By 2015, the still glitchy ICM had “not fulfilled its key objectives” found the auditor general. Cost to taxpayers: at least $182 million.
Premier Clark announced a $150,000 International Day of Yoga festivity that would block Vancouver’s Burrard Bridge and compete with the first National Aboriginal Day, but cancelled it a week later after a public backlash and sponsors, BC Liberal donors AltaGas and Lululemon, pulled out.
“Impacted by defects from the start,” concluded B.C.’s auditor general when assessing a botched computer system supposed to manage infectious disease outbreaks. Five years behind schedule, the problem-plagued Panorama project’s costs had risen 420 per cent to $113 million, sucking up $14 million yearly in maintenance, said the AG.
After aging out of a brutal life in foster care since early childhood, Paige Gauchier, 19, was found dead of a drug overdose in a park bathroom in Vancouver’s Downtown Eastside. The RCMP investigated whether public employees failed in their responsibilities and recommended charges that were not pursued. The title of the independent Children and Youth Representative’s report, “Paige’s Story: Abuse, Indifference and a Young Life Discarded,” summed up its findings. In issuing its response, the BC Liberal government waited five months, timed for federal Election Day, where it was sure to get reduced coverage.
Alex Gervais ‘should not have been left alone,’ found BC’s youth advocate, after the 18-year-old killed himself by jumping from a hotel room where he’d been on his own for months while in provincial care.
Four months after B.C.’s independent youth advocate responded to Paige Gauchier’s death by issuing a shocking report of systemic failure to protect foster children, 18-year-old Alex Gervais committed suicide by leaping from a hotel room where he’d been on his own for months while in provincial care. The youth advocate launched another investigation, saying “He should not have been left alone,” and “the government, particularly the Ministry for Children and Family has a lot to answer for in this case.” It found that during his short life, Gervais was placed in 17 different living locations, some just hotels, with 23 different caregivers.
After a damning official report about the Clark government’s culture of secrecy, Globe and Mail columnist Gary Mason threw up his hands: “Once upon a time, Ms. Clark campaigned on the promise to have the most open, transparent government in the country. We now know that was a complete and utter sham, said for the benefit of a gullible public to get votes. The government’s record on this front is a disgrace.” More on that record here.
Premier Clark was accused of spending taxpayers’ money to interfere in First Nation politics after she made a surprise visit to Haida Gwaii and gave the Old Masset Village Council $150,000 for a school expansion feasibility study. Clark’s visit and the grant helped the band’s chief narrowly win re-election, charged his opponent. The winner, unlike his opponent, supported a $10-million wind farm project involving the premier’s brother Bruce Clark. The premier’s office denied any connection between the visit, the election, and her brother, as did Bruce Clark. The schoolhouse in question is on reserve land and therefore a federal responsibility. Federal dollars had already paid for two expansion studies.
In the past 10 years under the BC Liberals, the premier’s pay has risen 61 per cent (or doubled if you include the $50,000 top-up Christy Clark quietly received from her party) while MLAs have enjoyed raises of between 34 and 44 per cent. These politicians’ incomes place them among the top 10 per cent in B.C. During the same decade their pensions grew much faster, thanks to recommendations by a 2007 panel Gordon Campbell stacked in favour of higher pay. The next year Campbell’s TransLink board voted themselves a 500 per cent raise. Not long after, on the day ferry fares were hiked, BC Ferries directors got pay jumps of up to 60 per cent. One group who hasn’t seen a raise in all that time is welfare recipients. Their rates, among the lowest in Canada, haven’t gone up for 10 years.
Under premier Gordon Campbell, BC Hydro started with a $200-million “deferral account” of tucked away costs to be paid another day, and let more of them balloon to over $7 billion. This “rat” in the BC Hydro snake, said the auditor general in 2011, would have to digested someday by raising rates or taxes or both. Incoming Premier Clark vowed to use BC Hydro cost savings to help diminish those accounts over 10 years, but as of last August the figure was still stalled at around $6 billion and forecast to stay there four more years. If it doesn’t come down, B.C. residents will be stuck with the bill.
Premier Clark’s BC Liberal Party rehired its executive director, Laura Miller, even though she faces a criminal trial in September in Ontario. Miller resigned in December after being charged with breach of trust and mischief for an alleged role in the destruction of email records in Ontario’s gas plant scandal when she was deputy chief to the premier there. In rehiring Miller, Premier Clark stressed she must be presumed innocent until proven otherwise. If convicted, Miller could face 10 years in prison.
“B.C. LNG Prosperity Fund to Get $100M Contribution, but Not from LNG” read a 2016 CBC headline. Premier Clark had promised a liquefied natural gas windfall, including a “prosperity fund” Clark’s finance minister said would be “tied directly to the establishment of an LNG industry.” But the fund’s first $100 million came from taxpayers instead, an amount the BC Liberal government had raised by upping MSP premiums. “I found it unbelievable that the premier would start a prosperity fund,” said NDP MLA Carole James, “with revenue that hasn’t come in, from an industry that hasn’t started yet in British Columbia.” The following September the BC Liberals added $400 million more to the fund, still without any LNG money.
The BC Liberal government denied for over two years it could do anything to slow skyrocketing housing prices, even after the price of single detached homes in Greater Vancouver leapt 40 per cent in just 12 months ending in February 2016. A number of experts and 29,000 petition signers urged an obvious place to start was a foreign buyers tax. Nothing doing, said both Premier Clark and her chief fundraiser, condo king Bob Rennie.
Until July 2016, that is, when Clark’s government, under extreme pressure to act, did impose a 15 per cent foreign homebuyers’ tax, applied only to Metro Vancouver. Rennie said he “knew” one was coming weeks before, prompting the NDP to demand he be investigated for insider info. But Rennie clarified he’d just had a hunch. Six months later he quit as BC Liberal fundraiser.
Frustrated at opposition to the $9-billion Site C dam project, Energy Minister Bill Bennett said the BC Liberal government “took seven years to do our due diligence to determine this was the best way to acquire new electricity at the lowest price, clean electricity.” In fact, the BC Utilities Commission exists to provide due diligence on such a project, but the government prevented its own agency from reviewing Site C and holding public hearings. The only time the BCUC vetted the Site C project was back in 1983, and it rejected it. A 2014 joint federal and provincial environmental assessment panel could find no urgent need for the project. B.C. power needs projections are flat. The costly dam can only result in “a massive increase in electricity rates” says a former BC Hydro CEO.
Site C under construction, March 2017. Photo by Zoë Ducklow.
After nine years of no disability benefit increases, the BC Liberal government last year announced a rise of $77 per month. But the same budget clawed back transit pass fees for people with disabilities, making the real gain for 35,000 of B.C.’s most vulnerable just 2.3 per cent over nearly a decade.
British Columbians pay $500 a day, every day, for pros to snap and video BC Liberal government photo-ops, a bill now scraping $1 million.
A TV ad blitz last year showed Premier Clark boasting, “Controlling government spending is really the foundation, is the bedrock of what we’re trying to do.” But since the BC Liberals took power the total provincial debt has almost doubled and a critical Canadian Taxpayers Federation notes that debt rises $3.4 million every day.
The Clark government was chastised by the province’s privacy commissioner for losing a hard drive with three decades of personal info for 3.4 million B.C. and Yukon students and B.C. teachers. The education ministry failed to provide security to prevent unauthorized access, use or disclosure, found the commissioner, because employees were inadequately trained and poorly led.
In 2005 the BC Liberals removed government oversight from B.C.’s real estate agents, letting the industry self-regulate. Result: Brokers got rich and drove up prices by “shadow-flipping” — reselling a property multiple times before a deal closes and profiting from each transfer using a sales contract clause.
When the public caught wind, Premier Clark’s response, to close the shadow flipping loophole and re-regulate realtors, failed to impress Martyn Brown, former chief of staff to premier Campbell.
A public funded ad claiming $20 billion has already been invested in the LNG industry in the province was yanked early after a blogger shot holes in it and citizens complained to authorities. One was “appalled” the ad called LNG, a fossil fuel, “clean.” Meanwhile, blogger Merv Adey questioned the huge figure given that nothing LNG related of any significance has been built in B.C. He found about half the figure, instead of new economic benefits, was energy firms buying and selling rights from each other and most of the rest was current gas production that would be happening without LNG terminals. The BC Liberal government denied it pulled the ad because of a complaint.
After locals long beseeched B.C.’s environment ministry to revoke the permit it granted a quarry to store up to 100,000 tonnes of contaminated soil each year, a court finally halted more deliveries, ruling the government’s approval process was unfair. Pollution problems at the site were identified years ago. The Cowichan Valley Regional District and the Shawnigan Residents Association spent over $2 million on the legal battle to stop contamination of drinking water sources. Not until after the district and residents won in court, amidst calls for her resignation, did the environment minister pull the site’s permit.
Tarps, tires and water collection at the Shawnigan Lake contaminated waste dump. Photo by Laura Colpitts.
Deputy premier Rich Coleman, whose party raised $12 million last year, called the NYT article “laughable” and “weak.” Clark later dropped receiving the personal top-up from donors.
A think tank report out in March found the Clark government was lobbied nearly 20,000 times in six years by oil and gas firms that donated millions to the BC Liberals, most of them based out of province and some overseas.
The real estate sector contributed $12 million of $70 million in corporate donations received by the BC Liberal Party between 2005 and 2015, more than from any other sector. While housing affordability disappeared for buyers and renters — especially but not only in Metro Vancouver — Clark’s financial backers made windfall profits as rich foreign buyers speculated in residential property with no restrictions. “No corporation, no industry, no union gives the level of money that they give to politicians without expecting special consideration in return, and they do get it,” confirmed Martyn Brown, former top aide to premier Gordon Campbell. Last year and this, eight of the 10 top donors to the BC Liberal Party are involved in the province’s property development and construction industries.
With no proof, Premier Clark accused New Dems of criminally hacking the BC Liberals’ website, later apologizing by leaving a voice message on NDP leader John Horgan’s phone.
Upon opening the $2.5-billion tolled bridge over Fraser in 2012, Liberals said it would start turning a profit this spring. Instead it’s lost $407 million already with no profitability in sight.
A few years after Liberals projected a $678 million surplus, the insurer is $833 million in the red, revealing a massive structural deficit caused by government interference and mismanagement according to an expert.
At a moment when land values are skyrocketing, the BC Liberal government decided to offload a half billion dollars’ worth of social housing properties to non-profit groups, allowing it to show a gain in its books at budget time. The complicated sale and lease deal by BC Housing, noted the auditor general last month, was shrouded in secrecy and lacks a business case. The government claims a $95-million benefit but the AG says that’s flat wrong, pointing to $185 million in unaccounted for costs that make the deal really a $73 million net loss for taxpayers that could climb to over $500 million in years to come. While non-profits say they are a better safeguard for social housing, there’s no locked in guarantee the properties will remain below market in rent, noted the AG.
Despite Premier Gordon Campbell’s 2005 throne speech promise to “make B.C. a model for healthy living and physical fitness,” a number of his MLAs invested in the fast food industry.
One was the very minister in charge of getting people off junk food. “We have to move now to turn back the tide of obesity in B.C.,” exhorted minister Gordon Hogg, owner of interests in Boston Pizza franchises, whose cheesesteak sandwich plate provided 1,790 calories, about a day’s worth for a grown man. Other MLAs had stakes in Wendy’s and A&W outlets.
Meanwhile, the minister in charge of fighting climate change was big into oil and gas stocks.
When BC Hydro entered into a 10-year contract with Accenture in 2003, later renewed for five more years, the BC Liberal government claimed the arrangement would save $250 million. By year six of the contract, BC Hydro had already paid Accenture $1.17 billion, or more than 80 per cent of the agreed total. Instead of delivering the promised savings, the amounts paid to Accenture rose by tens of millions of dollars. In 2007-2008, for example, BC Hydro paid the company $201 million, about 50 per cent more than expected. This month the Clark government pulled the plug on the contract and took the work in-house again. The union for BC Hydro’s workers said no savings had materialized. The BC Liberals insisted $250 million had been saved, but offered no evidence.
After the Globe and Mail reported B.C. lobbyists were breaking one of B.C.’s few political donation rules by pouring money into party coffers under their own names and being reimbursed by clients, Elections BC asked the RCMP to investigate. One watchdog estimated the improper indirect donations could top $1.5 million. Premier Clark reacted by promising an independent commission to fix things, if she and her party are re-elected.
That’s what the Globe and Mail named B.C., seeing so many BC Liberal donors rake in public money. It’s “a situation where companies seeking government contracts, approvals or tax breaks can give unlimited sums of money to the governing party. Lobbyists in the province have told The Globe and Mail they feel they need to donate, or their entreaties on behalf of their clients will be ignored.” In fact, B.C.’s transportation ministry gives three-quarters of its sole-sourced contract dollars to BC Liberal donors.
Incoming premier Gordon Campbell misled British Columbians when he claimed the NDP had left his government financially in the hole. In fact, documents The Tyee’s Will McMartin gained through a freedom of info request showed the NDP had left a $1.5-billion surplus, a figure eventually confirmed by B.C.’s auditor general. Campbell handpicked a panel that tied itself in knots to project a “structural deficit” three years on, but before the report was done the BC Liberals announced deep tax cuts that, when the economy dove, wiped out the surplus.
An independent review launched after the 2002 killing of 19-month-old Sherry Charlie in foster care blasted the BC Liberal government for “wrong” cuts to Ministry of Children and Family Development that “took the knife too far.” Improperly trained social workers failed to prevent the placement of the toddler with her uncle, who had a lengthy criminal record, before he beat her to death. The coroner’s inquest into her death criticized the government for closing the Children’s Commissioner. The subsequent independent review, headed by retired judge Ted Hughes, urged a new independent advocacy and oversight body, the Representative for Children and Youth, among 62 other recommendations to safeguard children in provincial care. The BC Liberals followed by crafting a bill to hide future such inquiries’ recommendations from the public.
When the BC Liberals closed the Children’s Commission to cut costs in 2002, hundreds of child death files were accidentally left unexamined for patterns that might prevent further deaths. The BC Coroner Service tried to take over the chore, eventually finding and reviewing more than 700 files that had slipped through the cracks. Whistleblowing forensic experts who helped expose the mess assembled a detailed case the coroner’s service was dangerously underfunded, which the minister in charge dismissed.
The BC Liberal government tore up a contract with the province’s teachers allowing them to bargain size and composition of classes, touching off a 15-year dispute that included strikes and legal fights all the way to Canada’s Supreme Court. The teachers won, but a generation of students were shortchanged as government evaded spending billions on more teachers. When the dust cleared, taxpayers got stuck with $2.6 million in lawyers’ bills.
The Campbell government violated Charter rights when it killed health union contracts it inherited in 2002, ruled Canada’s Supreme Court in 2007. But not before those cuts caused suffering for patients. A probe into grim conditions in a Victoria senior home, for example, blamed disruptions caused by contracting out care jobs. The illegal law hurt unions but likely created slim if any savings for taxpayers.
Nabbed for weaving down a Hawaiian highway way over the blood alcohol limit, Gordon Campbell pled no contest, apologized, but refused to resign. A year later his government explored softening B.C.’s drunk driving laws, but backed off when the public caught wind.
Gordon Campbell ultimately pled no contest to the charges he faced for speeding and erratic driving.
A byzantine probe into corruption in the sale of BC Rail by the BC Liberal government began with Mounties raiding the B.C. legislature in 2003 and ended with 2010 guilty pleas by two ministerial aides. Dave Basi and Bob Virk admitted to giving insider information to bidders on the $1-billion deal in exchange for benefits. They received house arrest for two years, and Basi a $75,600 fine. In vain, the NDP demanded a public inquiry.
Gordon Campbell never mentioned tax breaks for the rich when seeking to topple the NDP in 2001, just pledging them for the middle-class on down. But days after taking office he gave all income levels the same 25 per cent tax cut. A few years later only the well off were benefiting because, for everyone else, the cuts had been eaten up by increases in various taxes and fees.
When you do private public partnerships, partners need to meet — and drink the good stuff. An audit of Partnerships British Columbia Inc.’s expenses revealed its CEO and others had enjoyed much wine and good food at taxpayer expense. At one 2005 meal, for example, 17 guests at Vancouver’s Al Porto Ristorante imbibed five bottles of Wild Goose Pinot Gris, three of Columbia Crest Merlot, two of Penfolds Chardonnay, and three of the d’Arenberg’s The Stump Jump.
The bill also included a martini, a cosmopolitan, a rum, three bottles of beer, and a glass of the Scotch whisky Lagavulin. And they went through 13 bottles of San Pellegrino mineral water for $103.35. Along with food, the bill the CEO paid and charged back to PBC came to $1,567.11, including taxes and a $235 tip. The CEO, by the way, earned $519,448 in salary and bonuses that year and claimed $45,325 in expenses.
In 2002 the BC Liberals held a province-wide referendum on how to frame treaty negotiations that veteran pollster Angus Reid called “one of the most amateurish, one-sided attempts to gauge the public will that I have seen in my professional career,” the federal government opposed, and civil rights scholar Michael Ignatieff compared to the minority-crushing Jim Crow laws of the U.S. South. The referendum, a Gordon Campbell campaign promise, cost $9 million. Only about a third of the ballots were returned, many were trashed or burned, and the First Nations Summit boycotted the process. Some of the eight principles on the ballot proposed by the BC Liberal government were obviated by the Charter of Rights and Freedoms. Of those who participated, 80 per cent voted for the principles, a result that held no binding power but deepened divisions and made negotiating treaties more difficult, noted experts.
The BC Liberal Ministry of Children and Family Development improperly awarded $300,000 in contracts to Doug Walls, a former BC Liberal riding president related by marriage to Gordon Campbell, and wrote off a $1.2-million debt to a society Walls controlled. Despite warnings Walls likely committed fraud in a bankrupted business, to which he’d eventually plead guilty, the ministry put him in charge of $500-million Community Living B.C. After the story broke the minister in charge resigned, was eventually cleared and returned to cabinet. His deputy was fired.
A BC Liberal government report revealed outsourcing job training for unemployed people on government support lost taxpayers millions, and contractors’ success level was barely better than if the poor sought work on their own.
Rather than invest in B.C.’s own shipyards, the BC Liberal government awarded a $542-million contract to a German firm to build three superclass ferries, arguing it was the right deal, period. But once delivered, the ships had major problems including noise, high fuel consumption and vibrations that kept the ferry company from putting them into full service. Supposed to save BC Ferries fuel, the German vessels guzzled much more than similar sized ferries on the same routes.
BC Liberals illegally solicited campaign funds from municipalities, including Kitimat, where officials say they were misled into giving, thinking the money was for a government forum. After The Tyee’s report a BC Liberal official quickly resigned and other news media turned up further donation illegalities by the party.
The ‘Golden Tree’ by artists Dean and Christina Lauzé in Abbotsford, BC, now stands as the first memorial in Canada recognizing seasonal farmworkers – in particular those who died in the 2007 tragedy. Photo by David P. Ball.
B.C.’s independent Therapeutics Initiative reviewed medicines used by Pharmacare, saving, in just one case, an estimated 600 lives and $500 million by blocking a bad drug. But a task force BC Liberals stacked with drug firm reps recommended killing the watchdog. The chief of the task force eventually landed a post with Pfizer Global. Therapeutics Initiative did later see its funding pulled for a year but restored after public pressure.
When the Harper government gave B.C. $200 million for green efforts, the BC Liberals opted to pour most of it into a mega-project British Columbians also were bankrolling, the Northwest Transmission Line. Billed as an alternative to dirty diesel generators in a few small communities along Highway 37, the massive costs for such a small fix didn’t add up until critics pointed out the line was really a huge subsidy to proposed polluting mines with big electricity needs. How huge? Original estimates nearly doubled, soaring to $736 million.
JobWave was fired in the Interior by the province after a 2007 probe found the firm falsely billed, padded fees and fudged results. JobWave had been among the first hired by the BC Liberal government to privatize job training for the poor. Despite the disaster, one JobWave insider was selected a 2009 Liberal MLA candidate, and lost.
For the 2010 Olympics BC Liberals purchased 20 hydrogen powered buses costing roughly $4.5 million each. The total could have paid for 120 hybrid diesel-electric busses with lower maintenance costs and overall emissions. After breaking down a bunch, they were scrapped for diesels.
The government’s media relations arm suppressed the release of potentially embarrassing welfare stats until after the May 12, 2009 election. The Public Affairs Bureau also instructed that government websites be “frozen” during the campaign.
When forest minister Rich Coleman released more than 28,000 hectares of private timber land owned by Western Forest Products to become suburbs, his brother was high up in the corporation. Both denied a conflict. The auditor general found the decision went ahead without sufficiently considering the public interest. And after minister Coleman pledged elk habitat would be protected, the government excused the company from doing so.
In 2003 the BC Liberals turned BC Ferries from a Crown corporation into a private, taxpayer subsidized company with an American CEO. This was supposed to make for less financial drama and happier customers. It’s been the opposite ever since, given a spiral of hiked fares suppressed ridership, debt grew to billions, and ferry dependent communities suffered significant hardship,” a commission found. That American CEO was overpaid at $1 million a year, deduced B.C.’s comptroller general, to which the CEO replied with words like “nonsense,” “craziness” and “dumb.” This, after the premier had recently chucked an extra $20-million taxpayer subsidy at BC Ferries to quell citizen anger a bit by cutting fares for just two months.
BC Ferries is now a private, taxpayer-subsidized company thanks to the BC Liberals. Photo by Judy B – The Travelling Eye in Your BC: The Tyee’s Photo Pool.
Ken Dobell, premier Campbell’s “right hand man” when he worked in the B.C. government, later broke the law lobbying. He avoided federal prosecution by writing an essay about it, and went unpunished despite pleading guilty to violating B.C.’s Lobbyists Registration Act. The Crown prosecutor (whose firm was later revealed to be a long time BC Liberal donor) said there was ample evidence to press influence peddling charges, too, but opted not to do so.
Former Chilliwack mayor John Les received special treatment in an Agricultural Land Reserve rezoning decision and as mayor encouraged staff to see laws as mere “guidelines,” a special prosecutor found in 2010. The start of the probe prompted Les to step down from his cabinet job at the time: B.C.’s top cop. He ended up not charged with any crime.
B.C.’s auditor general found the government awarded a $149-million contract to a private medical records managing firm without a business case for why. Just one of several big contracts the 2008 report said lacked due diligence.
Premier Campbell promised B.C. businesses the Olympics would be their gold rush, but some of his top political aides hired themselves out to U.S. groups to help them win the spoils. Many foreign firms landed millions in contracts over B.C. competitors, to whom the BC Liberal government granted no advantages.
BC Liberals said contracting out admin for Medical Service Plan and PharmaCare programs would improve service at a fixed price. But almost immediately surging customer complaints against U.S.-based Maximus B.C. Health Inc. triggered fines and half way through the 10-year, $324-million contract yearly costs had exploded 60 per cent.
An early pledge by Gordon Campbell’s BC Liberals was to insure better care for disabled seniors by working “with non-profit societies to build and operate an additional 5,000 new intermediate and long-term-care beds by 2006.” By 2009 it still hadn’t happened but the minister in charge pretended victory, as the Globe and Mail reported, by using definitions “at odds with those used by B.C. Medical Association, and his own ministry website.” Back in 2005 premier Campbell had already thrown in the towel. “We’re not going to be able to meet that goal,” he said. There was an election campaign on, and Campbell’s BC Liberals changed their commitment to something more cheaply and easily done: 5,000 new residential and assisted living beds.
During the 2009 provincial campaign, premier Campbell appeared in Delta with MLA candidate Wally Oppal to promise a $17.5-million soccer centre would be built there if the BC Liberals were returned to power. The BC Liberals won but Oppal lost. So did Delta. The centre was built at UBC instead.
Eight years after the BC Liberals stopped regulating recovery houses in the province, the CBC found a flourishing rip-off industry where “operators were taking social assistance cheques from drug addicts in exchange for unsafe, overcrowded accommodation.” To howls from the opposition blaming deregulation, the minister in charge promised to look into the mess.
An election looming, BC Liberal finance minister Colin Hansen assured their economy was expanding with “all leading economists” forecasting more of the same. Not true. B.C.’s economy was in recession. After the BC Liberals won re-election, Hansen revealed that while campaigning he did know revenues were tanking.
BC Liberal solicitor general John van Dongen, the province’s top law enforcement official, resigned from cabinet amidst the 2009 election after his driver’s licence was taken away for speeding offences. He was re-elected.
Kash Heed stepped down as solicitor general in April 2009 amid allegations of Elections Act violations by his campaign staff. In May 2010, charges were laid against two staffers and a contractor, and Heed was cleared of any wrongdoing. The next day he was back in cabinet — for all of 24 hours. Then the special prosecutor who handled the investigation quit, revealing that his law firm had donated to Heed’s campaign. Heed resigned again. Heed was eventually cleared of criminal wrongdoing by a second special prosecutor.
Two men connected with the Heed campaign ended up pleading guilty. In August 2011, Heed was fined $8,000 for going over the spending limit in the 2009 campaign.
BC Rail hadn’t owned any trains for years, but it still carried some high rollers in the executive suite. Railway president and CEO Kevin Mahoney and executive vice-president real estate John Lusney were let go in 2010, seven years after the government sold the railway. Their severance? A combined $600,000.
During the 2009 election the BC Liberal Party was asked by two industry groups if it planned to replace the Provincial Sales Tax (PST) with a Harmonized Sales Tax (HST) that folded in the federal GST. The feds were pushing it, but a lot of people in B.C. worried an HST would hit their pockets hard. The party’s official response was “A harmonized GST is not something that is contemplated in the BC Liberal platform.” Shortly after they were re-elected the BC Liberals announced an additional seven per cent tax would be added to the existing five per cent PST for a combined 12 per cent HST — but it would now apply to hundreds of goods and services previously exempted, including basic telephone and cable, restaurant meals, Canadian air and rail travel and much more.
Accused of keeping the plan secret, Premier Campbell assured the HST “wasn’t on my mind” and “not anywhere on our radar… as we went through the election” but documents later showed the HST was being discussed before and during the election at the highest government levels. Two months before voting day, the B.C. finance minister was briefed on a C.D. Howe report projecting the HST could hurt B.C. jobs and wages for over five years. Post-election, the same minister sold the HST as the best thing to boost the economy. Anger and distrust forced Campbell to resign before voters rejected the HST in an historic B.C.-wide referendum spurred by the first ever successful Citizens’ Initiative petition.
Ron Danderfer was a senior civil servant, in charge of the B.C. government’s eHealth program, which involved computerizing health records. James Taylor was an official with the Fraser Health Authority. Jonathan Burns was a doctor doing business with the health ministry and Fraser Health. Things got sticky when media reports exposed some suspicious links between the three. As it turned out, Taylor’s wife got a $250,000 job with Burns without going through the proper government procedures. Danderfer and Taylor both enjoyed vacations at Burns’s condominium in Kelowna. In the end, all three men pleaded guilty to corruption-related offences.
As the original $495-million budget for the Vancouver Convention Centre kept rising, the federal contribution was capped, leaving the province to pick up the near $400-million overrun. A 2007 auditor general’s report suggested last-minute building changes and a rush to meet a tight Winter Games deadline helped costs skyrocket.
An eager premier Campbell opened its doors April 3, 2009 to tens of thousands of visitors not told safety inspectors had ruled fire risks still needed fixing.
Promises of a grand Olympic windfall never quite materialized. Photo by the Blackbird in Your BC: The Tyee’s Photo Pool.
BC Liberal leaders whipped up support for a taxpayer-backed Olympics by projecting $10.7 billion in generated economic activity. Months before the games they quietly lopped $6.7 billion off the promise, then, when pressed, vaguely mused it would be “billions and billions.” Billion and billion, actually. Post-Olympics, a government-ordered independent study pegged resulting economic activity at $2.3 billion over seven years, or annually about one-sixth of one per cent of B.C.’s then-GDP. Ignorance is no excuse. Since 2002 the B.C. government owned a tool to nail down such forecasts, but didn’t use it.
First the BC Libs said BC Place could be re-roofed for $100 million. A year later, 2009, a fancier German approach was unveiled, for $365 million. But taxpayers’ real bill inflated to over $563 million. All that cash, and the roof still leaked water and grease, the giant videoboard can’t get rained on, and the full business case remains secret as the stadium annually bleeds money, projecting a $52 million loss for 2017. The BC Lions had better attendance before the reno.
Admitting B.C. faced two years of deficits, premier Campbell pledged to save money by eliminating positions of one out of five of the province’s senior bureaucrats. Nine months later The Tyee combed government records and found the goal only halfway achieved. No, we’re “quite confident” we’ve done it, replied the minister in charge, offering zero evidence.
A Ministry of Children and Families worker with a criminal record who used a forged criminal record check to get his job was caught keeping at home 1,400 files with sensitive personal info on low-income clients. To Richard Wainright’s rap sheet a judged added fraud as the government scrambled to shore up lax security.
The BC Liberal government’s tendency has been to push for looser privacy standards for health information. But B.C.’s privacy commissioners have warned repeatedly that the government has the wrong attitude when it comes to protecting citizens’ health information.
The BC Liberal government promised staging and hosting the Olympics would cost the province $600 million, but the government put its own final tally at $925 million and the auditor general and others estimated that left out many Olympics related expenses, including pay for government employees loaned to work on the games, and mega-projects including the Canada Line, the Sea-to-Sky Highway upgrade and the Vancouver Trade Centre that if included would have pushed cost to provincial taxpayers above $2.5 billion.
The BC Liberals, elected in 2001 with a pledge to protect BC Hydro, instead broke it into parts. Responsibility for the province’s electric transmission lines was shifted, along with 276 employees, to the newly created BC Transmission Corp in 2003. Seven years later, BCTC was folded, its mission returned to BC Hydro. B.C. taxpayers and BC Hydro ratepayers were stuck with the expense of setting up, operating and dismantling a Crown corporation that proved unnecessary – about $65 million based on BCTC’s annual filings under the Financial Information Act.
BC taxpayers ultimately paid $6.4 million in legal bills for defendants in the BC Rail corruption trial.
Upon entering guilty pleas that prematurely ended the Railgate corruption trial as several high profile BC Liberal witnesses were slated to testify, Dave Basi and Bob Virk paid not a penny for their defence. In the controversial plea deal, the public picked up the tab.
Twenty-one babies died in their sleep, and not enough was done to protect them, B.C.’s independent watchdog for children and youth found. Her report on deaths of 21 children under two years of age between 2007 and 2009 highlighted the role of poverty and intergenerational trauma in their families, and called for a much more integrated and coordinated approach to child welfare in the province. Had that been in place, some of the babies “very likely” would have lived, said the author. All the deceased children were known to the Ministry of Children and Family Development but warning signs were missed.
Part of Gordon Campbell’s climate change plan forced government bodies to buy carbon credits from the Pacific Carbon Trust in an attempt to claim the government was carbon neutral. Not only did this put a burden on the already-strapped institutions, but a lot of the credits they were forced to buy turned out to be really expensive and pretty dubious. The Pacific Carbon Trust was quietly wound down a few years later.
The Pacific Carbon Trust, set up by the BC Liberal government, diverted piles of public dollars to corporations who didn’t need the incentives. Big companies hauled in around $3 million by reducing carbon emissions and selling credits to the trust, often for projects they would have done without the payments, concluded the auditor general and news media investigations. Taxpayers were further gouged as public institutions paid far more for credits than the price the trust paid for them.
Boss Power Corp. had a legal right to develop a uranium mine near Kelowna. But in 2008, the government got panicky about the political fallout. Instead of just cancelling the permit and compensating Boss for its costs, the government broke the law, according to its own admissions in a lawsuit launched by the company. The province’s Chief Inspector of Mines was ordered by higher-ups to ignore the company’s development application, even though government lawyers had said that would be illegal. Boss added “misfeasance” — government abuse of power — to its lawsuit. In 2011, before the case was due to go to court and government officials would have to testify, the BC Liberal government paid Boss $30 million, plus its legal costs, to avoid the trial. An independent report prepared for the BC Supreme Court had put fair compensation at $8.7 million.
Voters resoundingly rejecting the HST in a 2011 referendum that cost taxpayers $8 million, and B.C. was forced to pay back $1.6 billion to feds who’d tied the money to the province adopting the tax. B.C.’s finance minister predicted the admin costs of going back to how taxes were collected pre-HST would be $30 million a year. In 2010 the BC Liberal government blew $780,000 on a pro-HST flyer to be sent to every household, but scrapped it. Taxpayers also funded a $5-million ad campaign billed as “neutral” HST info but slanted pro-HST. All to reverse the tax surprise so ill conceived it drove premier Gordon Campbell from office.
A PDF version of this list is available here. | 2019-04-23T22:03:49Z | https://thetyee.ca/Opinion/2017/04/10/BC-Liberal-Falsehoods-Scandals-Whole-List/ |
Rubrics in the classroom: do teachers really follow them?
For language teachers, using rubrics has become the norm in assessing performance-based work. When using rubrics, one question stakeholders have is to what extent teachers are true to the rubrics. For classroom teachers, the correct use of rubrics is crucial. Rater training and rater calibration are not commonly offered to teacher-raters; therefore, the accurate use of rubrics is required in assessing student performance.
This study investigates the impact of rubric use in assessing short EFL descriptive writing by asking teacher-Q4raters to rate essays, both with and without a rubric.
The results show that teachers focused more on errors (e.g., grammar and mechanics) when rating without a rubric, but valued comprehension issues (e.g., main idea, author’s voice) when rating with a rubric. Essay scores also increased when teachers assessed with a rubric. Follow-up teacher interviews confirmed that rating changes occurred due to both the assessment criteria in the rubric and the lenient nature of the scale descriptors.
For performance-based assessment, rubrics are a central tool that adds reliability, validity, and transparency to assessments. This study shows that experienced teachers-raters were impacted by the content and nature of the rubric’s scale, and thus made an effort to follow it.
Rubrics are used daily in the classroom, from simple scoring rubrics such as checklists, to more complex and detailed rubrics for final course projects or end-of-semester performances. Rubrics are especially valued in the language classroom, because they contribute to student learning and bring transparency to the assessment process (Wolf & Stevens, 2007). When performance based assessment began to receive attention, many rubric studies focused on covering the benefits of using rubrics (Andrade 2000; Jonsson & Svingby, 2007; Silvestri & Oescher, 2006; Spandel, 2006); how it promotes students’ learning and makes performance based assessment more accurate and reliable. However, with the increase of using rubrics, the limitations of rubrics (Popham 1997; Kohn, 2006; Andrade 2001,) became the interest of many researchers. When students are given rubrics, they might question whether the teacher-rater is assessing them based on the rubric, or whether they are being graded on the teacher-rater’s overall impression. The rating process is still vague and teachers have been criticized for basing assessment on their overall impression (Lumley, 2002) Even though previous studies have found using a rubric adds more confidence in a teacher’s rating (Silvestri & Oescher, 2006), rubrics themselves have been criticized for inconsistent criteria descriptors and vague language (Tierney & Simon, 2004). Popham (2003) warns, not all rubrics are well written and developing reliable and valid rubrics requires expert knowledge (Callison, 2000).
In the rating process, various factors come into play: rater characteristics towards severity or leniency (Schaefer, 2008; Shi 2001), rater training experience (Huot, 1990; Weigle, 1998, 2002), rater’s language background (Kondo-Brown, 2002; Lumley & McNamara, 1995), and task variability (O‘Loughlin and Wigglesworth 2007) are factors that have been researched over the years in performance assessment. Past research on rubric studies has focused on investigating changes in rater reliability (Lumley & McNamara 1995; McNamara, 1996; Weigle, 1998). Studies that show increases in rater reliability by using rubrics may, in part, be due to the training raters go through than by merely using rubrics (Knoch et al., 2007). Of course, learning how to use rubrics is part of rater training; however, we cannot assume that all raters, and especially teachers who are also raters, all receive professional rater training (Knoch et al., 2007). Evidence of rubric effectiveness can be shown through differences in inter-rater and intra-rater reliability (Jonsson & Svingby, 2007). However, measuring inter-rater reliability is only possible when there are two teachers, and for classroom teachers, having two teacher-raters is uncommon.
This study examines how teacher-raters are affected by rubrics by looking at how rating patterns change, with and without using a rubric. The purpose of the study is to research how teacher-raters respond, interpret and use rubrics in assessing EFL students’ short descriptive writing, and to what degree it impacts students’ grades. Through this study, I hope to determine whether teacher-raters work toward being true to a given rubric, or whether their ratings are still based on overall impressions.
Rubrics are used to increase transparency in rater judgments and to decrease subjectivity (Silvestri & Oescher, 2006). Empirical evidence in rubric studies show that using rubrics can make assessments more reliable (Jonsson & Svingby, 2007; Penny, Johnson, & Gordon, 2000; Silvestri & Oescher, 2006; Wolf & Stevens, 2007). Most rubric-related literature has covered the advantages and benefits of rubrics (Jonsson & Svingby, 2007; Silvestri & Oescher, 2006; Spandel, 2006), but rubrics have also been criticized, in that they may limit raters’ judgments and even limit the learning process (Turley & Gallagher, 2008; Wolf & Stevens, 2007). Kohn (2006) states teachers use rubrics to standardize their judgments regarding students work. He (2007) notes, “standardizing assessment for learners may compromise learning (p.13).” Popham (1997) also expressed concerns about rubrics in a similar vein stating that rubrics are used to assess students’ “constructed responses (p.72)”. Wolf and Stevens (2007) p.13 warns students might think “If it is not on the rubric, it must not be important or possible”. The language used in rubrics has been criticized as being vague and unclear (Turley & Gallagher, 2008), which results in different interpretations by different raters (Knoch, 2009; Weigle, 2002).
Although most studies concerning rubrics agree that using rubrics will improve rater reliability (Jonsson & Svingby, 2007; Silvestri & Oescher, 2006; Penny, Johnson, & Gordon 2000), there is also a concern that merely having a rubric does not automatically add reliability and validity to an assessment (Tomkins, 2003). More researchers are stressing the importance of education and training in how to use rubrics (Turley & Gallagher, 2008; Wilson, 2007).
Studies on rubric use or its impacts on ratings are steadily increasing, but are still at a primitive stage. Previous rubric studies concentrated on the development and benefits of rubrics (Jonsson & Svingby, 2007); therefore, studies describing rubric effects on teacher-raters were difficult to find (Rezaei and Lovorn, 2010), and few studies covered the actual effects of their use. Empirical studies concerning rubrics have largely focused on reliability issues (Jonsson & Svingby, 2007), such that the main focus in these studies has been on rater agreement rather than on the rubric itself. Research conducted on how rubrics influence raters’ judgments is limited. Despite many studies done on raters (Brown et al., 2004; Stemler, 2004), the process that raters go through in making final decisions using rubrics is still unclear (Huot, 1990; Lumley 2002; Lim 2011) and there are not many studies that look into the impacts of rubrics on raters.
A study that directly examined the effect of using rubrics compared to not using them when assessing writing was done by Rezaei and Lovorn (2010) with L1 graduate-level social science writing samples. The raters in this study first rated two student essays without a rubric, and later with one. The purpose of the study was to investigate the extent to which incorporating a rubric helps prevent raters from paying too much attention to the mechanical aspects of writing over content. The rubric used in the study put a strong focus on organization and content (75%) compared to mechanics (10%). Raters in the study were asked to rate an essay that was labeled as “correct” and another that was categorized as the “wrong” essay. The “correct” essay fully answered the prompt, but had frequent grammatical and mechanical errors, while the “wrong” essay did not fully answer the prompt, but was well polished and edited. The results show that, regardless of the “correct” or “wrong” essay, raters gave significantly lower scores when ratings were done with a rubric, and the range and variance of the assigned scores increased significantly, as well. The findings show that the inexperienced raters in the study were strongly influenced by the mechanical and grammatical aspects of students’ writing, and this focus did not change by rating with a rubric. It is difficult to say whether the raters in this study closely followed the rubric in rating the essays. Grammar and mechanical factors still strongly impacted the raters’ judgment, regardless of the stated criteria in the rubric.
What do teacher-raters value in assessing short EFL descriptive writing?
Do ratings change when using a rubric?
What are the reasons behind the changes or the decision not to change?
Data for this study came from teacher-raters’ essay ratings, rating justifications and interviews. Essay ratings were checked to identify rating changes, with and without using a rubric (Figure 1). Rating justifications were analyzed to have an idea of the assessment constructs of the teacher-raters. Teacher-rater interviews were conducted to explain the rating changes. This study used a mixed-methods approach, using both quantitative and qualitative methods to strengthen the methodology for this study. The purpose of mixing was for complementarity reasons. The complementary nature of the design strengthened the instruments used for this study. The qualitative findings from the rater interviews complemented the quantitative findings of the essay ratings.
First, each teacher-rater was given 20 student essays via email and was asked to rate short descriptive essays written by Korean EFL writers (Additional file 1) without a rubric. Teacher-raters were asked to grade the essays on a 6-point letter scale: A+, A, B+, B, C+, C and write a justification of the rating next to their letter grade explaining the reasons for the rating. Teacher-raters’ essay justifications were later analyzed to determine the reasons associated with the score when rating without a rubric and to identify valued assessment criteria. The ratings and justifications were sent to the researcher prior to the interview.
During the interview (Additional file 1), teacher-raters were given the Rubric (Additional file 1), and were asked to do a second rating for five selected essays from the original 20 essays. Two essays were rated by all raters and the three were randomly chosen. The purpose of the second rating was to check whether rating changes occurred when raters used the Rubric. When all ratings were completed, an in-depth interview was conducted to compare ratings, with and without a rubric, and the reasons behind the changes or the decision not to change the rating. The interviews were audio-recorded and transcribed by the researcher.
The teacher-raters for this study were native EFL instructors from a large private Korean university. All were experienced teacher-raters who had a wide range of teaching experience from 5 ~ 12 years in higher education. The participants’ rating experience was mostly within the university context. The courses they taught were graded on students’ performance-based activities; moreover, they had experience in rating the English placement test that was conducted every year for freshman students. A few had experience taking part as a judge for an essay contest and presentation contest held on campus.
The Rubric (Additonal file 1), which is the given rubric designed by the researcher, was based on previous writing rubrics used by forty teachers from the target language institute. Prior to developing the Rubric, rubrics that were currently used to assess EFL descriptive writing were collected and analyzed. Frequently used assessment criteria were compiled and incorporated into the Rubric. Writing criteria rubrics from large-scale English tests (e.g., IELTS, TOEFL) were also analyzed. The overall main assessment criteria came from teacher rubrics and well-known essay rubrics but one criterion (i.e., author’s voice) was intentionally added for the purpose of the study. The Rubric was two pages long and used a scale ranging from A+, A, B+, B, C+, C. The Rubric consisted of seven scoring criteria: main idea, support, flow/cohesion, author’s voice, sentence type and variety, vocabulary and word choice, and grammar and mechanics. The Rubric highly emphasized comprehension (e.g., main idea, support, author’s voice) issues rather than sentence- level (e.g., sentence structure, vocabulary) or editing concerns (e.g., grammar, mechanics). The left-hand side of the Rubric contained the assessment criteria and the right-hand side included descriptors that detailed each criterion for each grade level. The descriptors in the Rubric were consistent across levels; thus, descriptions that appeared in one level (e.g., strong author’s voice) were present in all levels (e.g., lack of author’s voice). The first criterion, “main idea” discussed the originality, clarity and intelligibility of the idea; the criterion “support” covered the degree of elaboration and development of supporting details. The third criterion, “flow/cohesion,” involved the logic and organization of the paragraphs, while the next criterion, “author’s voice,” discussed the strength and clarity of the author’s voice. The fifth criterion, “sentence type and variety,” explained variation in sentence length and structure; this criterion also assessed grammatical points such as sentence fragments and run-on sentences. The sixth criterion was “vocabulary and word choice,” which concerned the effective use of words and the use of descriptive language. The final assessment category was “grammar and mechanics,” which described general grammatical errors and correct usage of capitalization, punctuation and spelling. Compared to the rubric that was formerly used to assess similar writing tasks, the Rubric was intentionally designed to be more complex and covered a foreign assessment criterion (e.g., author’s voice) to probe more discussion from the teacher-raters. I also purposely put a strong emphasis on criteria related to essay comprehension rather than sentence structure and grammar to see whether there would be any changes when teacher-raters rated essays with the Rubric.
Essay ratings were submitted as a letter grade and were converted to numerical equivalents ranging from 1 to 6 for the statistical analysis. The essays that were rated twice were compared for each rater and for each essay using paired t-tests using SPSS V.21, and the maximum and minimum ranges of scores were noted. Teacher-rater essay justifications from rating without a rubric were analyzed in order to identify the teacher-raters’ assessment criteria of assessing this task. Essay rating justifications were summarized and condensed by using descriptive coding. Through this analysis, nine assessment criteria were identified: comprehension (COM), paragraph structure (PS), sentence structure (SS), vocabulary (VOC), grammar (GM), mechanics (MC), length (LNT), task completion (TC) and self-correction (SC). Frequencies of the rating justifications for each category were counted across teacher-raters to detect the key criteria used for assessing EFL writing. Teacher-rater interviews were digitally recorded and transcribed for thematic analysis. The interview analysis focused on reasons for making rating changes, meaning of the score and the rubric fit.
The first step of the study was to find the key assessment criteria used by teacher-raters in assessing EFL descriptive writing. This step was needed in order to compare what teacher-raters valued when rating without a rubric, compared to rating with a rubric. The above figure (Figure 2) shows the percentage of commented criteria from the essay justifications when rated without a rubric. The number of times each criterion was mentioned for the 20 essays was calculated for each teacher-rater. The findings show that teacher-raters valued GM (19%, n = 70) as the most important criterion for assessing short EFL descriptive writing. Following this criterion was COM (15%, n = 56), SS (15%, n = 56) and VOC (14%, n = 52).
For the second rating, five essays from the original twenty were rated by teacher-raters according to the Rubric. Out of the 25 ratings, 72% (n = 18) of the essays were given a different score (Figure 3). Only 28% (n = 7) showed no changes in the ratings.
Without rubric: key assessment criteria.
Rating changes with the rubric.
Rating changes by raters were usually within a score point and the average essay score was higher for all teacher-raters (Table 1). The score range and variance of the scores increased after rating with the Rubric but none of the teacher-raters showed a significant difference in scores when rating with or without the Rubric. The rating done with the Rubric was higher for all raters but none showed a statistically significant difference; Eunice, t(4) = -.590, p = .587, Susan, t(4) = -2.449, p = .070, Ben, t(4) = -.534, p = .621, Logan, t(4) = -1.826, p = 1.42, Matt, t(4) = -.535, p = .621. Among the teacher-raters, Logan showed the biggest increase for the mean score and the widest score range after rating with the Rubric. Susan showed no changes in the score range, but the other three teacher-raters’ maximum point increased by a point.
Two essays (#2, #13) that were rated twice by all raters showed a significant increase in scores (Table 2). When essay #2 was rated with the Rubric it received an overall score of 3.4 which showed a significant increase, t(4) = -3.162, p = 0.034. This was the same for essay #13, t(4) = -6.0, p = 0.004.
What are the reasons behind the rating changes or the decision not to change anything?
During the interview, each teacher-rater was asked to describe the reasons behind the rating changes or the reason not to change (Table 3). Eunice, commented that the Rubric deals with fresh ideas and the author’s voice, which she did not consider much when rating without a rubric. When asked to provide reasons for any changes in her ratings, Eunice stated that she did not initially consider the strength of ideas as an important criterion in her initial rating for short EFL descriptive essays. She thought the reason may have been due to different amounts of attention given to specific grammar points when she described a specific essay to which she had made rating changes. Eunice stated, “[In my first rating], I was paying a lot of attention to the run-on sentences. With this [the Rubric], I was more interested in support. If the details were appropriately developed, even though the sentences were run-on, [it was okay]. I think they could have been fixed pretty easily.” Eunice thought her ratings increased because she focused on the idea or support of the idea rather than on other sentence-level concerns, such as sentence variety. “I think [I am more generous] because of the ideas and details. I was trying to see the author’s voice, less on parts of speech or capitalization,” she explained.
Ben felt he was influenced by the Rubric, when explaining the rating changes of the same essay. For an essay which he originally gave a C+ (2 points) and in the second rating changed to a B+ (4 points) he said, he focused on form rather than content when rating without a rubric. Ben states, “I probably put more emphasis on the fact it wasn’t a paragraph [when I rated without the Rubric]. [I found] the sentence structure very simple and there are errors [so] I gave that a C+. [When I rated it for the second time] I felt it [the Rubric] influenced me. I was very close giving that a C+, but the writer had an author’s voice. There is some evidence of author’s voice there. She talked about the college entrance exam but it was about an argument with her mother, so she is trying to get to something that is more personal. It kind of felt there was a little more there. So that is why I gave it a B+.” For essays, he did not make changes in the ratings; he commented that the focus of the assessment criteria was different. Ben felt that the Rubric emphasized completely different things from what he had initially looked for; therefore, the meaning of a “B” grade, in his mind, was different even though he had assigned the same scores when rating, with or without a rubric.
In the interview, Matt commented, “[When I rated without a rubric], I really focused on types of errors, actually pinpointed to detailed error types, for example, incorrect verbs.” Matt stated that he focused on common EFL errors concerning articles or prepositions, capitalization, and punctuation errors for the first rating. Yet, he noticed in the Rubric that grammar errors and mechanics were combined together as a single criterion, so he could not strongly focus on each category, as compared to before.
Unlike other teacher-raters, Susan did not think rating changes occurred due to the different assessment focus of the Rubric; in fact, Susan believed that the Rubric’s criteria were similar to her own assessment focus, which was strength of the ideas.
Other teacher-raters also talked about scale severity in the Rubric. Logan believed that some of the rating changes occurred because of the lenient nature of the Rubric; in specific, Eunice commented that the Rubric had higher expectations for the A+ level than her own. She stated that the Rubric was strict on the high end, but generous on the low end.
The rating changes did not show a statistical significant difference by rater but was statistically significant for the two essays (#2, #13) that were rated twice by all five raters. This different result could be due to the content of student essays. Essays that were weak in grammar and structure but strong in ideas could have resulted into a score change when rating with the Rubric. All raters except Susan, confirmed in the interview their assessment focus shifted from grammar to content when rating with the Rubric. However the findings from the t tests should be interpreted with caution considering the small sample size of raters (n = 5) and lack of essays (n = 2) that were rated twice by all raters.
In terms of the meaning changes associated with the score, findings from this study imply that rating changes can be explained by two different rubric effects; assessment criteria and scale severity. For four teacher-raters, the first ratings primarily focused on errors concerning grammar and mechanics. This phenomenon is consistent with previous studies that conclude when raters rate without a rubric, they are highly influenced by grammar or editing mistakes (Read, Francis, & Robson 2005). The reasons as to why teacher-raters in this study focused on these areas could be due to the style and content of the writing. The writing samples were 1 ~ 3 paragraphs in length, and at times, were underdeveloped. As Eunice commented, for this type of writing task, she focused more on sentence-level errors rather than on the development of a paragraph or an idea. In other words, the teacher-raters could have paid more attention to errors because they did not have a rubric or because those criteria were a better fit for the given task.
Regardless of what influenced the assessment construct of the raters, they showed rating changes or evidenced different meanings associated with the ratings after using a rubric. Teacher-raters were directly influenced by the assessment criteria included in the Rubric. All teacher-raters, except for Susan said that the Rubric focused more on the strength and development of ideas, compared to what they had initially expected. For Susan, her top assessment criterion was idea development; therefore, there was no difference between her understanding of this criterion from that of the Rubric. Teacher-raters changed their ratings after following the descriptors in the Rubric and found evidence to support their ratings. The criterion “author’s voice” had an impact in changing the ratings for Eunice; moreover, Eunice, Logan, and Matt all reported putting less focus on grammar and mechanical errors, which resulted in an increase in their ratings.
An interesting finding with respect to why Susan changed her rating deals not with the difference in the assessment criteria, but with the generous nature of the rating scale. Susan felt that especially for the C+/C level descriptors, the Rubric was much more lenient, compared to her original expectations. Differences in the assessment criteria could be the biggest factor in rating changes for teacher-raters, but differences in the scale severity also had an influence.
Even though the Rubric could have strongly influenced the rating changes, this probably is not the sole factor. Rating changes could have also occurred due to the rating style or characteristics of the teacher-rater. Eunice noted that she is quite lenient whenever she is given a new rubric. She said that it takes time to understand and use a new rubric, and during the learning period, she tends to give higher scores. The level of confidence that teacher-raters have when rating without a rubric may also be a factor. Ben and Mark expressed extreme difficulties when rating without a rubric, and they questioned their judgments. They felt insecure about rating without a scale and believed they lacked consistency in their first ratings. Time can also be an important factor in rating changes, in that the teacher-raters could have given different ratings using the same rubric merely due to the difference in the timing between the ratings.
Nonetheless, the findings from this study indicate that raters are influenced by rubrics to some extent. This finding is different from Rezaei and Lovorn’s (2010) study, which found that using rubrics did not take away raters’ focus on trivial mechanics or superficial aspects of writing. The raters in Rezaei and Lovorn’s study showed a wider variance and score decrease after rating with a rubric. This study, on the other hand, showed a score increase when essays were rated with a rubric. When rating with the Rubric, the maximum score for most teacher-raters did increase which reflects the generous characteristic of the Rubric. One main difference between Rezaei and Lovorn’s study and the present one is the background of the raters and the characteristics of the writing. The raters in this study were experienced teacher-raters who have had many years of experience rating with a rubric. Their understanding of rubrics is likely to be higher than that of non-experienced raters. Although the teacher-raters in this study did not receive any formal rater training for this study, in the interview they did comment on receiving regular rating training once or twice a year from the program they worked at. Previous studies in rater training have found that rubric training helps raters focus on the content of the rubric and helps them discard their personal biases during the rating (Knoch et al., 2007). Experience in essay rating and using rubrics could be the reasons for the divergent results.
Following the criteria and scale in the rubric does not imply that the teacher-raters’ assessment constructs changed or that they agreed the Rubric was the best tool for assessing the given task. In fact, Eunice and Logan expressed dissatisfaction in the Rubric and thought that it did not fit well for assessing short descriptive EFL writing. Specifically, Logan thought that the Rubric was too long, complex and difficult to use. In addition, Eunice believed that the Rubric should put more emphasis on vocabulary and sentence-level issues rather than on the strength of ideas. Ben and Matt did not like the fact that the Rubric covered grammar and mechanics under the same category; both wanted to split the categories and put a stronger emphasis on grammar. Despite their dissatisfaction with certain areas of the Rubric, the teacher-raters in the study still made an effort to follow it. For them, the Rubric overrode their personal assessment beliefs. In the interview, Susan commented, “I usually follow the rubric in the order it is given to me, because I think that is what I am asked to do. I do not put my two cents in. I try to stay true to the intent of the rubric, without any embellishment on my part.” Susan also added that when giving grades she tells her students, “It wasn’t me who gave you this grade, the rubric did”.
Raters may be heavily influenced by their overall impression, but the experienced teacher-raters in this study tried diligently to follow the given the rubric. They were aware of their role as a rater, and even though they may not have accepted the descriptions and criteria in the Rubric, they tried to follow it. Personal intuition could have still played a role in their decision-making process; however, the teacher-raters worked toward making their decisions based on the criteria of the given rubric.
While other factors (e.g., time, assessment confidence, rating style) come into play in describing the rating changes, the impact of a rubric is definitely a crucial factor in guiding teacher-raters to make rating judgments. Teacher-raters in the study tried to be true to the Rubric and found evidence within the document to support their ratings. A rubric is a complex scoring guide consisting of criteria, descriptors and scales. To be used correctly, teacher-raters should be educated in how to use a rubric. Rater training should not only focus on rating practices, but prior to doing ratings, sufficient time should also be given in learning the rubric. Clear explanations should be given for the meaning of each criterion and examples of the descriptors. For example, the criterion “author’s voice” was foreign to the teacher-raters in this study, and was puzzled in how to interpret this criterion. Susan felt that if a person writes something, the essay automatically contains the voice of the author; on the other hand, Eunice and Ben believed it relates more to how creatively the writer expresses his/her thoughts and ideas in the essay.
Susan stated that there is a “learning curve” in adapting to every new rubric. Teacher-raters should form groups and discuss the language and criteria in the rubrics; in addition, they should clarify any questions with respect to meaning. Rubric literacy, which is part of a teacher’s assessment literacy, is a crucial part to being a reliable teacher-rater. What is more important than developing and using rubrics is how to understand and interpret them. In addition to developing one’s knowledge in how to use rubrics, teacher-raters should be trained in how to select an appropriate rubric for a given task. Rubric literacy should cover overall rubric fit in terms of how to select, analyze, develop, and use rubrics.
To help teachers to have a better understanding in developing and using rubrics language program directors should encourage teachers to discuss their expectations of each grade level or task prior to assessing student work. Teachers can get together and develop or adapt a rubric for the same task. Teachers can develop their own rubric and later compare and contrast the criteria, scales, and rubric style. Based on the similarities and differences of individual rubrics, a standard rubric that can be used across all teachers can be produced. This method can give an opportunity to discuss and visualize teachers’ assessment constructs and develop common criteria for a grade or score. After a rubric is developed together, teachers could have a workshop practicing using the rubric. Rubric literacy is not only about possessing the knowledge to develop good rubrics but also knowing how to use them correctly (Andrade, 2005). Rubric practice sessions could be done among teachers and through the practice session a document that describes each criterion can be produced (Andrade, 2005).
For large-scale assessments, there are multiple types of evidence to demonstrate the reliability and validity of a rating. Validity reports can be produced and different psychometric analyses can be done to show that the given score is reliable and valid. In a classroom setting, where the teacher is the only rater, however, these methods cannot be incorporated. Data that can back up a teacher-raters’ judgment can come from rubrics. A rubric justifies the ratings of teacher-raters and adds objectivity to their judgments. If an appropriate rubric is selected and teacher-raters correctly use them, the rating based on the rubric will be accepted as a valid and reliable score.
One of the limitations of this study is that students had two choices in writing the descriptive essay. The reason for giving a choice was to lower the anxiety level of the students and make it more accessible, yet, there is a concern that allowing task choices can bring difficulties in analyzing test results which can be a threat to reliability and validity. However, the purpose of this study was not focused on the use of essay scores but on how raters responded to rubric use. For future studies it would be better to give a single prompt to resolve measurement difficulties.
Another limitation was the few number of essays that were rated for the study. Only twenty essays were given to raters for the first rating and five were given for the second rating. Among the five, only two were rated twice by all raters. This study used both quantitative and qualitative methods but attention was given more towards to the qualitative data. In order to secure sufficient time during the teacher-rater interviews and write up of the rating justifications, a limited number of essays were used. In the future, I suggest studies to increase the number of essays and raters to strengthen the research findings.
This study investigated the impact of using rubrics by comparing essay ratings when rated with or without a rubric. The findings show despite teacher-raters’ different assessment constructs, when they were given a standard rubric all teachers made an effort to follow it. The teachers in this study had extensive experience in using rubrics. The results from this study show compared to novice raters (Rezaei and Lovron, 2010), experienced raters knew how to use a given rubric. The criteria stated in the rubric overrode their personal assessment constructs. Teacher-raters in the study were clear of what was expected to them as a rater and knew how to use a rubric and rated accordingly to the stated criteria. Thus, experienced teacher-raters did not base their ratings on their overall impressions but followed the given rubric. This finding shows the importance of rating experience for teacher-raters and training in how to use rubrics. If regular training is not available for classroom teachers, at least a document that explains how to use a given rubric should be presented.
The increase of performance-based assessment is a universal phenomenon for language classes around the world. Technological improvements have made it easier to document students’ productive skills. Moreover, technology-based assessment has developed over the years, such as automated scoring for writing or speaking tests. The acsmdvancement of computer-based assessment has definitely brought about changes in assessments; nevertheless in the classroom context, the role of the teacher-rater is vital. For performance-based assessment, rubrics are the central tool to add reliability, validity, and transparency in classroom assessment. Despite the conflicts with their personal assessment constructs, the teacher-raters in this study worked diligently in terms of following the Rubric.
Additional file 1: Appendix A. Rating Instructions. Appendix B. Teacher-rater Interview Questions. Appendix C. The Rubric. | 2019-04-19T18:44:27Z | https://languagetestingasia.springeropen.com/articles/10.1186/s40468-015-0013-5 |
2008-02-25 Assigned to PLENUS II, LIMITED PARTNERSHIP, PLENUS III (D.C.M.), LIMITED PARTNERSHIP, PLENUS III, LIMITED PARTNERSHIP, PLENUS II, (D.C.M.), LIMITED PARTNERSHIP, PLENUS III (2), LIMITED PARTNERSHIP, PLENUS III (C.I.), L.P. reassignment PLENUS II, LIMITED PARTNERSHIP SECURITY AGREEMENT Assignors: N-TRIG LTD.
A digitizer for user interaction via an object with an electronically refreshable display screen, the digitizer comprising: a transparent sensing arrangement of detectors located at said electronically refreshable display screen for detecting an electric field of said object, said detectors having outputs, and an arrangement of differential amplifiers associated with said outputs, thereby to apply differential detection between said outputs.
The present application is a divisional of U.S. patent application Ser. No. 10/649,708 filed Aug. 28, 2003, which claims the benefit of priority from U.S. Provisional Patent Application No. 60/406,662 filed Aug. 29, 2002, the contents of which are both incorporated herein by reference.
The present invention relates to a transparent digitizer and, more particularly, but not exclusively to a transparent digitizer with a cordless stylus or like input device.
U.S. patent application Ser. No. 09/628,334 “Physical Object Location Apparatus and Method and a Platform using the same” to Gamalong Ltd, the contents of which are hereby incorporated by reference, describes an electromagnetic method for locating physical objects on a flat screen display, that is to say a digitizer that can be incorporated into the active display screen of an electronic device. The present disclosure concerns further technical methods for implementing a transparent sensor based digitizer.
Touch technologies are commonly used as input devices for a variety of products. The usage of touch devices of various kinds is growing sharply due to the emergence of new mobile devices, such as Web-Pads, Web Tablets, PDAs, Tablet PCs and wireless Flat Screen Displays. These new devices are usually not connected to standard keyboards, mice or like input devices, which are deemed to limit their mobility. Instead there is a tendency to use touch input technologies of one kind or another.
Some of the new mobile devices, such as the Tablet PC, are powerful computer tools. Devices such as the Tablet PC use a stylus based input device, and use of the Tablet PC as a computing tool is dependent on the abilities of the stylus input device. The input devices have the accuracy to support hand writing recognition and full mouse emulation, for example hovering, right click, etc. Manufacturers and designers of these new mobile devices have determined that the stylus input system can be based on various electromagnetic technologies, which can satisfy the very high performance requirements of the computer tools in terms of resolution, fast update rate, and mouse functionality. However, in general, the stylus systems in use are tablet based, that is the stylus is moved over a tablet which in itself is not a screen. There have been attempts in the past to combine non-transparent electro magnetic digitizer technology with a transparent Flat Screen Display. U.S. Pat. No. 6,005,555 to Wacom describes a digitizer comprising two layers of orthogonal conductive loops. One set of conductive loops is used for transmitting an excitation signal while the orthogonal set of loops is used for receiving oscillations. However, a requirement of the Wacom system is high conductivity within the loops. As such, Wacom's method has to use loops made of standard metallic conductors and cannot be used with transparent conductive foils, since the resistance of a conductive transparent line is very high. Using high resistance conductive loops to energize the stylus requires a particularly high voltage input, in excess of 1 KV, which makes this solution impractical. Without the use of transparent conductive material, however, the solution of Wacom merely succeeds in making the display difficult to view.
One way of overcoming the difficulty of viewing the display is to place the non-transparent sensor of Wacom behind the display. Thus the sensor may be located between the FPD back-light and the electronic board of the display device. As such, integration of a non-transparent sensor into a FPD device is a very complicated and expensive process. Such mounting typically requires shielding of noisy components within the device and sometimes requires the manufacturing of a special slot in the FPD structure, in which the sensor is mounted.
A non-transparent sensor, if located behind the display, is inevitably relatively far away from the tip of the stylus whose position it is trying to determine. Due to the relatively long distance from the sensor, non-transparent sensors suffer from parallax, leading to inaccurate positioning of the stylus. Positioning is especially inaccurate, that is parallax effects are especially large, when the stylus is held at an angle to the display. Yet, applications such as handwriting detection demand that the system is tolerant to the stylus being held at an angle to the screen.
Furthermore, again due to the relatively long distance from the sensor, back-mounted sensors suffer from inaccurate positioning of the stylus when the stylus is held close to the edge of the sensor.
In summary, due to the relatively long distance from the sensor, and furthermore due to the number of electronically active components likely to be located between the sensor and the stylus, back-mounted sensors may not achieve reliable positioning resolution.
There have been attempts in the past to overcome the disadvantages of a back mounted sensor by implementation of a sensor based on a transparent foil. As the sensor is transparent it can be mounted on the front of the screen. However, such a detector relies on transparent conductors, which have a high resistivity compared to opaque conductors. U.S. Pat. No. 5,381,160 to Kurta describes a foil comprising two transparent layers of orthogonal conductors. Kurta's disclosure describes a solution to a problem that arises in light of the above-mentioned high resistivity of the conductors, namely how to excite the physical object whose position is to be determined despite the high resistivity. The solution is simply to use an active stylus, internally powered by its own battery. The stylus therefore does not require external excitation. However, an active, battery powered stylus is generally not regarded as a satisfactory solution for a number of reasons. For example, an active stylus requires continuous maintenance and may even stop working and thereby render the entire computer device inoperable. Also the active stylus requires recharging, and is more expensive than a passive device. Therefore, an active stylus is currently unacceptable for the mobile consumer market.
The above-mentioned application to Gamalong discloses a sensor, for a passive stylus, based on transparent foils where a separate excitation coil is located about the screen. The stylus or other object whose position is to be detected comprises a resonant circuit. The resonant circuit is excited by the excitation coil to generate an electric field, and the electric field is detected by the relatively highly resistive detection conductors on the transparent foils. A problem however, is that detection, which is based on electric fields, is carried out on the surface of an electronic display screen, and the screen surface is a relatively high noise environment in terms of electromagnetic activity. The high noise environment necessarily reduces the resolution level of the digitizer.
There is thus a widely recognized need for, and it would be highly advantageous to have, a stylus based transparent digitizer devoid of the above limitations.
It is a general object of the present invention to enable effective usage of a transparent sensor together with a passive stylus in a high noise environment.
It is a further object of the present invention to enable effective usage of a transparent foil sensor mounted on top of a Flat Panel Display (FPD) such as an LCD or an OLED panel in order to overcome the disadvantages emanating from use of a non-transparent sensor.
It is a general object of the present invention to overcome the disadvantages of a complex and thus expensive integration process involved in mounting a non-transparent sensor behind the screen by enabling the usage of a transparent sensor, which can be integrated in front of the FPD in a straightforward manner.
It is a general object of the present invention to overcome the parallax problem by enabling the usage of a transparent sensor that can be located relatively close to the tip of the stylus.
It is a general object of the present invention to overcome the edge problem, that is of inaccuracies in detecting styluses located at the edge of the sensor, by enabling the usage of a transparent sensor, which can be located very close to the tip of the stylus.
It is a general object of the present invention to overcome the problem of poor resolution due to the separation between sensor and stylus which is exacerbated by active electronic components, by enabling the use of a transparent sensor, which can be located very close to the tip of the stylus.
It is a general object of the present invention to provide accurate stylus location to a level of precision beyond the granularity of the detecting grid, and to provide accurate stylus location which is as noise free as possible.
an arrangement of amplifiers for producing differential signals associated with the outputs, the differential signals being signals indicative of a differential between at least two of the outputs, the device being operable to use the signals in the interaction.
Preferably, the amplifiers are differential amplifiers, and preferably the arrangement of detectors is configured for detecting an electric field.
Preferably, the electronically refreshable display screen comprises a flat panel type display screen.
Typically, the object is a pointing device, such as a stylus. Alternatively the object may be a gaming piece. Preferably, the device is integrated with a flat panel display. It may be provided as an accessory for integrating into a mobile computer.
Preferably, the transparent sensing arrangement comprises at least one organic conductive foil.
In one embodiment, the transparent sensing arrangement comprises at least one ITO foil.
The device may comprise at least one high pass amplifier connected between sensors of the sensing arrangement and the amplifier arrangement.
The device may comprise a grid of straight line sensors.
Preferably, the arrangement of differential amplifiers comprises a plurality of differential amplifiers each having a first differential input and a second differential input, and wherein the first differential input is connected to an output of a first sensor, and the second differential input is connected to an output of a second sensor beyond a stylus effective field of the first sensor.
Preferably, the second sensor is at a minimal distance beyond the stylus effective field of the first sensor.
Preferably, each object is configured to produce a field able to affect several neighboring sensors and wherein the respective first and second sensors per amplifier are selected such that different object positions generate outputs at different combinations of amplifiers, thereby permitting different amplifier combinations to be decoded to individual sensors.
The device may be configured to detect phases of signals of the sensors, thereby to distinguish between signals from different sensors.
Preferably, the arrangement of differential amplifiers comprises a plurality of differential amplifiers each having a first differential input and a second differential input, and wherein each of the differential inputs is connected to at least two outputs, each of the at least two outputs being associated with respectively non-neighboring sensors.
Preferably, each object is configured to produce a field able to affect several neighboring sensors and wherein the respectively non-neighboring sensors per amplifier are selected such that different object positions generate outputs at different combinations of amplifiers, thereby permitting different amplifier combinations to be decoded to individual sensors.
The device may be configured to detect phases of the sensor signals, thereby to distinguish between signals from different sensors.
Preferably, each of the differential inputs are connected to at least two outputs, each of the at least two outputs being associated with respectively non-neighboring sensors.
Preferably, the object is a passive object, the digitizer further comprising an excitation arrangement located about the screen for sending an excitation signal to the object, thereby to energize the object to generate an electric field.
Preferably, the excitation arrangement is controllable to generate the excitation signal at a dynamically variable frequency.
Preferably, the excitation arrangement is controllable to generate the excitation signal at a dynamically variable amplitude.
Preferably, the excitation arrangement is controllable to provide a dynamically variable excitation duration.
The device may comprise blanking controllability for blanking of detection during output of the excitation signal.
Preferably, the blanking controllability is operable to continue the blanking for a predetermined delay after output of the excitation signal.
The device may comprise a compensation database in which differences in conductivity between individual sensors are encoded.
The device may comprise a compensation database in which fixed variations in electromagnetic interference over the sensing arrangement are encoded.
Preferably, the compensation database further encodes fixed variations in electromagnetic interference over the sensor arrangement.
The device may comprise an object movement history arrangement for storing data of immediately preceding movement of the object, and using the data in processing of a current location of the object.
Preferably, the processing comprises filtering according to possible hand movements of a user from a prior measured position.
Preferably, the processing comprises filtering according to likely hand movements of a user from a prior measured position.
Preferably, the processing comprises smoothing a locus of the object.
The device may comprise a predictor, associated with the object movement history arrangement for using data of the object movement history arrangement to predict a future locus of the object.
Preferably, the object movement history arrangement with the predictor comprise a slow movement tracker and wherein there is further provided a fast movement tracker for tracking the object, the device being operable to initially set an output of the fast movement tracker as a locus of the object and subsequently to use an output of the slow movement tracker to correct the locus.
Preferably, the object produces an exponentially decaying signal, the digitizer further comprising signal multiplication functionality for multiplying the decaying signal by an opposite, exponentially rising signal, thereby to cancel out frequency side lobes and to increase frequency resolution of the digitizer.
The device may comprise transform functionality for transforming a detected time domain signal into a frequency domain signal, and wherein transform functionality is operable to select a transform type dependent on a likely number of frequencies to be detected.
The device may comprise transform functionality for transforming a detected time domain signal into a frequency domain signal, and wherein transform functionality is operable to dynamically select a transform type dependent on a current number of frequencies to be detected.
Preferably, the transform types for selection comprise the Fast Fourier Transform and the Discrete Fourier Transform.
Preferably, the transform types for dynamic selection include the Fast Fourier transform and the Discrete Fourier Transform.
The device may comprise a thresholder, associated with the transform functionality, for setting a threshold number of frequencies, the threshold for switching between the Fast Fourier transform for a high number of frequencies relative to the threshold and the Discrete Fourier transform for a low number of frequencies relative to the threshold.
a gap at the tip across which the resonator arrangement is coupled, to create an electric field concentration in the vicinity of the front tip.
The stylus may comprise a ferrite coil.
Preferably, the resonator is remotely located from the tip and coupled thereto via a conductor.
The device may comprise switchable components to contribute to the resonator arrangement to modify the predetermined resonant frequency to indicate different mode settings of the stylus.
The device may comprise a modulator for providing detectable variations in the electric field according to different mode settings of the stylus.
The stylus may comprise a reverse tip located at a second end remote from the front tip, a conductor arrangement extending to the reverse tip.
In an embodiment, the geometry in the vicinity of the reverse tip is different from the geometry in the field of the front tip, thereby to provide a detectable difference between the front and reverse tips.
There may be provided switchable components associated with the reverse tip, to contribute to the resonator arrangement to modify the predetermined resonant frequency to indicate different mode settings of the stylus.
Preferably, the detectable variations are variable delays in coupling of the electric field to the gap.
The device may comprise a normally closed switch associated with the front tip.
an arrangement of amplifiers wherein each amplifier is connected over at least two outputs of the sensing grid to produce an output signal being a function of the at least two outputs.
an excitation arrangement for generating excitation signals for the passive object to enable the passive object to generate or issue the electric field, the excitation arrangement being dynamically controllable to change a sampling rate at which the excitation signal is generated or issued.
Preferably there is provided a state detector to detect a state of the object, thereby to carry out the dynamic control of the sampling rate.
Preferably, the state detector is operable to detect at least one of a group comprising a user-switched state, a contact state of the object with a surface, a contact state of the object with the screen, a right click and eraser action.
The digitizer may comprise a frequency detector to detect a number of object frequencies present, the number being usable in the dynamic control of the sampling rate.
and wherein the arrangement of amplifiers is controllable, in association with the excitation arrangement, with a blanking period such that the arrangement of amplifiers is prevented from detecting during issuance of the excitation signal.
an arrangement of amplifiers associated with the outputs, each amplifier being connected to outputs of at least two respectively non-neighboring sensors, the respectively non-neighboring sensors per amplifier being selected such that different object positions generate outputs at different combinations of amplifiers, thereby permitting different amplifier combinations to be decoded to individual sensors.
an excitation arrangement for generating an excitation signal for the passive object to enable the passive object to generate the electric field, the excitation arrangement being dynamically controllable to change a property of the excitation signal.
Preferably, the property is one of frequency, amplitude and phase.
Preferably, the arrangement is operable to use a state of the object to set the dynamically controllable property.
Preferably, with a surface, a contact state of the object with the screen, a current velocity of the object, a current acceleration state of the object, and a current orientation of the object.
According to a seventh aspect of the present invention there is provided a device for user interaction via object location in conjunction with an electronically refreshable display screen, wherein the object is a passive electromagnetic stylus, and the screen is overlaid with a transparent sensing arrangement.
Preferably, the transparent sensing arrangement is configured for detecting an electric field.
FIG. 14 is a simplified diagram illustrating a stylus located in proximity to three sensing lines and generating signals in the sensing lines respectively.
The present embodiments disclose a method and apparatus for locating and identifying physical objects, such as a stylus or game tokens, on top of a Flat Panel Display. The location of the physical objects is sensed by an electro magnetic transparent digitizer, which is preferably mounted on top of the display. The physical objects are preferably passive elements, that is they do not include any kind of internal power source. The passive elements are energized by a non-transparent excitation coil, which is placed substantially about the transparent sensor. The transparent sensor comprises a sensing grid or an arrangement of sensing loops, whose outputs are connected to sensing amplifiers. In one preferred embodiment the sensing amplifiers are differential amplifiers and in one preferred embodiment each sensing amplifier is connected to at least two non-adjacent outputs from the grid.
A further preferred embodiment comprises an arrangement of the passive stylus in which a projection of wires into the tip is made in order to provide a sharp and therefore more easily detectable electric field. The concentration of the field at the tip allows the field to be distinguished more easily from noise and thereby improves the resolution of the digitizer.
The principles and operation of a transparent digitizer according to the present invention may be better understood with reference to the drawings and accompanying descriptions.
A preferred use for the present embodiments is a transparent digitizer for a mobile computing device that uses a flat panel display (FPD) screen. The digitizer of the present embodiments detects the position of one or more styluses at a very high resolution and update rate. The stylus is applicable to any standard stylus use, including pointing, painting, writing, including handwriting recognition applications, and deleting, and may also be applied to any other activity that can be stylus based. The stylus, together with the digitizer, may for example support full mouse emulation. In a typical mouse emulation application, as long as the stylus hovers above the FPD, a mouse cursor follows the stylus position. Touching the screen is equivalent to the left click of a mouse and a switch located on the stylus emulates right click operation. As well as full, or partial, mouse emulation, different embodiments may support various additional features such as an Eraser, change of color, etc.
In a preferred embodiment, the digitizer communicates with the host computer using a serial link, such as RS232. However, in different embodiments the digitizer may communicate via USB or any other type of communication. In some embodiments the digitizer may even communicate with the host using a wireless link such as based on Infrared, Ultrasonics or RF.
In a preferred embodiment, the mobile device is an independent computer system having its own CPU. In different embodiments the mobile device may only be a part of system, for example it may be a wireless mobile screen for a Personal Computer. In other embodiments the digitizer is used with a standard desktop computer. A digitizer built into the screen may be particularly useful for computers in hazardous environments such as on a factory floor.
In a preferred embodiment, the digitizer is integrated into the host device on top of the FPD screen. In additional embodiments the transparent digitizer may be provided as an accessory to be placed on top of an existing screen. Such a configuration can be very useful for laptop computers already in the market in very large numbers. An embodiment of the present invention may comprise an accessory to transform an existing laptop into a powerful device that supports hand writing, painting or any other operation enabled by the transparent digitizer.
In a preferred embodiment, the digitizer supports a single stylus. However, different embodiments may be used for supporting more than one stylus operating simultaneously on the same screen. Such a configuration is very useful for entertainment applications which require more than one user to paint or write to the same paper-like screen, perhaps even simultaneously. The present embodiments may further be used in applications which require more than one object to be detected, for example games with a plurality of playing pieces. In such a game, the display may for example show a game board for a particular game. The physical objects are shaped as the tokens, gaming pieces, toys, simulation figures and the like as required by the game being displayed. An arrangement supporting gaming over a transparent screen is described in U.S. patent application Ser. No. 09/628,334 to Gamalong, the contents of which are hereby incorporated by reference, wherein each of the playing pieces is distinguished by a different resonant frequency.
U.S. Provisional Patent Application 60-333,770 to N-trig, the contents of which are hereby incorporated by reference, describes a combination of a transparent electromagnetic sensor for detecting a stylus, and pressure sensitive stripes for detection of finger touch on the screen. In a preferred embodiment of the present invention, such pressure sensitive stripes are likewise combined in the electro magnetic foil. In other embodiments, electromagnetic sensing is the only form of sensing used, and the pressure sensitive stripes are dispensed with.
In a preferred embodiment, the digitizer is implemented using a set of transparent foils which are placed on the transparent screen, as will be explained in greater detail below. However, certain embodiments may be implemented using other kinds of transparent, or even a non-transparent, sensor. One example of an embodiment which does not use a transparent screen is a Write Pad device, which is a thin digitizer that is placed below normal paper. The user writes on the paper using a stylus that combines real ink with electromagnetic functionality. The user writes on the normal paper and the input is simultaneously transferred to a host computer to store or analyze the data. It will be appreciated that, given the thinness of paper, the parallax effects of the screen thickness do not apply. Furthermore, the noise effects due to intervening electronic components also do not apply.
An additional example of how the present invention can be applied to a non-transparent sensor is an electronic entertainment board. The digitizer, in this example, is mounted below a graphic image of a board, and detects the position and identity of gaming figures that are placed on top of the board. The graphic image in this case is static, but it could be manually replaced from time to time, such as when switching to a different game.
In one preferred embodiment of the present invention, a non-transparent sensor may be integrated into the back of a FPD. One example of such an embodiment is an electronic entertainment device having a FPD display. The device may be used for games, during the course of which the digitizer detects the position and identity of gaming figures. It could also be used for painting and/or writing, and the digitizer may be required to detect one or more styluses. In many cases, a configuration of a non-transparent sensor with an FPD can be sufficient when high performance is not critical for the application.
Reference is now made to FIG. 1, which is a simplified block diagram of a first preferred embodiment of the present invention. A digitizer arrangement is applied to a display screen host arrangement 10. The digitizer arrangement comprises a grid-based sensor 12, which is preferably transparent, and which is located on top of an FPD 14. Analog front-end ASICs 16 are preferably mounted on the frame of the sensor. The ASICS are preferably connected to outputs of the various conductors in the grid as will be explained in greater detail hereinbelow. Each front-end receives very low amplitude signals as output by the sensor conductors. It will be recalled that the sensor conductors, being transparent, have relatively high resistivity, limiting the amplitude of output signals. The ASIC 16 comprises circuitry to amplify the signal, identify and filter out irrelevant frequencies, sample the output into a digital representation and forward the sampled data to a data bus 18 for further digital processing at digital processing unit 20. Digital processing unit 20 is responsible for running various digital processing algorithms, as will be discussed in greater detail hereinbelow. The outcome of the digital processing performed by unit 20 is preferably the position of one or more physical objects, typically the position of the stylus, and the outcome, once determined, is forwarded to host 22 via interface 24 for processing by the operating system or any current application. In a preferred embodiment the digital unit communicates with the host via a simple serial interface. Additional interfaces, such as USB, are possible.
An additional task of the digital processing unit 20 is to produce and manage a triggering pulse to be provided to excitation coil 26 that surrounds the sensor arrangement and the display screen. The excitation coil provides a trigger pulse that excites passive circuitry in the stylus to produce a response from the stylus that can subsequently be detected.
Reference is now made to FIG. 2, which is a simplified schematic diagram showing the stylus, sensors and excitation coil and describing the general principal of the preferred embodiments. Parts that are the same as in FIG. 1 are given the same reference numerals and are not described again except to the extent necessary for an understanding of the present figure. Triggering pulse 30 is provided to excitation coil 26 that surrounds the sensor. Stylus 32 comprises a resonant circuit 34, which is triggered by the excitation coil to oscillate at its resonant frequency. At the resonant frequency the circuit produces oscillations that continue after the end of the excitation pulse and steadily decay. The decaying oscillations are sensed by the sensor arrangement which comprises a matrix or grid 12 of conductors. Accurate stylus positioning can be obtained, as will be explained below, from low amplitude vertical and horizontal signals that are picked up in the sensor arrangement and output to the front end units of FIG. 1.
Reference is now made to FIG. 3, which is a simplified diagram illustrating a preferred embodiment of the sensor arrangement. As explained above, the sensor arrangement in one preferred embodiment comprises a grid 12 of conductive lines. The grid preferably comprises conductive polymers patterned on a polyester thermoplastic (PET) foil 40. The grid preferably comprises two separate layers 42 and 44, electrically separated from each other by the PET layer 40. One of the layers 42 contains a set of parallel conductors arranged in one direction. The other layer 44 contains a set of parallel conductors orthogonal to those of the first layer.
In a preferred embodiment, the parallel conductors are straight antenna lines, connected at one end to an analog amplifier and at the other end to a common ground via a high value resistor. In an alternative embodiment, pairs of conductors are shorted together to create conductive coil loops. In such an embodiment, one side of the loop is connected to the analog amplifier and the other side to the common ground. Alternatively, in the case of loops, the two sides of the loop may be connected to two inputs of a differential amplifier.
In a preferred embodiment, the sensor is patterned using transparent conductive materials so as to be mounted on top of a FPD. The use of such materials is to enable the highest possible transparency of the sensor. It is preferable to minimize the visual difference between conductive and non-conductive sensor areas, as the user desires an unimpeded view of the screen.
The use of organic conductive materials on a PET foil is preferred as a solution which is flexible, easy to handle and minimizes the visual difference between conductive and non-conductive areas, as compared to other available solutions. However, for certain applications, different considerations may apply and thus implementations using other transparent conductive materials may be considered. An example of an alternative choice is semiconductor-based indium tin oxide (ITO).
In a preferred embodiment, the resistance of the conductive lines is relatively high and may exceed 100 KOhm for a line. In general, higher resistance in the transparent conductors corresponds to a higher transparency of the material. Therefore, it is desirable to work, in the present embodiments, with levels of resistance of the sensor grid that are as high as possible. However, in alternative embodiments the sensor may be constructed of low resistance conductors, usually not transparent.
There are a number of possible methods of applying the conductors to the film. In a first preferred embodiment, patterning of the transparent sensor is implemented by printing conductive material in areas which are intended to conduct, that is to say the conductors are printed onto the film. An alternative embodiment comprises forming a continuous layer of conductive material on the film and then removing the conductive materials from those areas which are not intended to conduct. Suitable methods for selectively removing the conductive material are well known in the art. Both of the above-mentioned ways are suitable as methods of manufacture, however, an advantage of the first mentioned method is the practically infinite resistance between the conductors. In the second, a finite leakage conductivity remains between the conductors as etching is not perfect. A disadvantage of both methods is a relatively noticeable visual difference between the conductive and non-conductive areas.
A further embodiment comprises a method of manufacturing the grid which minimizes the visual difference between conductive and non-conductive sensor areas. In the further embodiment, the entire area is coated with conductive material as before and then the non-conductive areas are passivated, that is to say they are treated to increase their resistance. As the same layers are present throughout the film, the visual difference between conductive and non-conductive areas is minimized.
One disadvantage of using the above process, and selectively increasing resistance after forming the conductive layer, is that whilst high resistivity is produced, it is still far short of an insulator. The process thus results in relatively high parasitic inductance and leakage current between the patterned lines. Careful selection of parameters during the passivation process can minimize such effects.
Considering the embodiment in which conductive polymer is coated and then passivated, a film coated with the conductive polymer is subsequently further coated with a protective coating in those areas where conductivity is intended to be retained, that is the areas that are intended to conduct. The coating can be provided in many ways, for example screen printing, photolithography, etc. The film with the protective, or masking, layer, is then rinsed with water in such a way as to avoid mechanical stress during rinsing. After rinsing it is immersed in a bath with a solution of hypochlorite at a defined chlorine concentration, PH, temperature and time, as will be clear to the person skilled in the art. The parameters are a key factor to achieve a result at the correct resistivity with the appropriate contrast between conductive and non-conductive lines, and the skilled person be able to carry out a certain amount of experimentation in order to optimize these parameters. After the hypochlorite bath the film is then immediately passed through a series of distilled water baths to remove the chlorine. Finally the film is dried in an oven.
In an example, the concentration of hypochorite used was 0.1%, immersion time was for 45 seconds, and the temperature was 25 degrees. Three distilled water baths were used, and drying was carried out for 3 minutes at 50 degrees.
In a preferred embodiment, the conductors are straight lines having 1 mm width, equally spaced at 4 mm intervals. Depending on the application however, different sizes and spacings may be used. Large intervals between the lines may be selected in order to reduce the total number of conductors and therefore to reduce the complexity of the electronics and thus the price of the system and also increase reliability. Smaller intervals on the other hand may be selected to give higher resolution. Wider line width may be selected in order to reduce the resistance of a conductive line, again, at the cost of resolution.
The magnitude of a signal received by a specific line is dependent on the resistance of that line, and the position of the stylus is determined by the relative magnitude of the signals received by the whole grid. Therefore, in one embodiment, the resistance of parallel conductors in a certain foil is similar, and up to 5% tolerance is considered acceptable. However, other embodiments may be implemented with various differences between the line impedances, that is to say with larger tolerances, for example to reduce manufacturing costs. Such non-uniformity in principle leads to lower positioning accuracy. However, in one preferred embodiment, following manufacture of a given foil, testing is carried out over the conductors and a database is constructed to calibrate for any differences measured between the different conductors. The system thereby compensates automatically for the manufacturing tolerances. Such a database can be built either manually or automatically by the system. One way of automatic creation of such a database comprises providing the sensor with a common signal using the excitation coil, and then measuring the magnitude of the signals received by each of the conductors. The signals at each of the conductors are compared to a value that would be expected at zero tolerance and the differences are encoded in the database.
Returning to the issue of construction of the sensing apparatus, and in one embodiment, the transparent sensor is constructed using three separate layers, which are implemented on three different foils. As shown in FIG. 3, two layers 42 and 44 are used for the sensor grid, one for the x axis conductors and one for the y axis conductors respectively, and the third layer, shown as 46 in the figure, is used to provide hard coating and anti-glare properties. Advantages of the three-layer embodiment include overall simplicity and, additionally, an ability to build the sensor using off-the-shelf components. A disadvantage of the approach is the relatively low overall transparency due to the presence of three separate foils in front of the display screen.
A further embodiment is now described in which the sensing arrangement is constructed using a single foil and thereby improving overall transparency. Reference is now made to FIG. 4 which shows such a one-foil configuration. In FIG. 4, a polyester PET foil 50 is patterned on its lower size with horizontal conductors 52 and on its upper side with vertical conductors 54. The upper side is covered and/or treated with suitable coatings to form hard coating layer 56, and the lower side is covered by a protective layer 58, helpful for avoiding integration or shipping damage.
The skilled person will note that additional implementations are possible such as embodiments based on two foils.
In a preferred embodiment, the grid is patterned onto Polyester PET foils. However, in different embodiments, the grid, or part thereof, or any of the layers, may be patterned onto different materials such as glass or semiconductors or onto different types of plastic foils.
In a preferred embodiment, the sensor is surrounded by a non-transparent frame constructed from a PCB or any kind of flexible circuit. The frame preferably hosts the following components: front-end analog components, conductors for connecting the grid to the front-end, conductors for connecting the front-end to the digital processing section, and the excitation coil.
In a preferred embodiment, the transparent conductors are connected to the frame using vertically (Z) conductive glue. An example of such a vertically conductive glue is product no. 9703 manufactured by 3M Corporation. In order to get a reliable connection to the frame, silver pads may be printed on the edge of the transparent conductors. In an alternative embodiment, the silver pads may be avoided and the foil may be connected directly to the surrounding frame.
In another preferred embodiment, the front-end components are mounted directly on the transparent foil. In this case conductors to and from the front-end may be implemented either by patterning applied to the transparent conductive material or by printing different materials, such as silver, onto the foil.
In one preferred embodiment, the digital processing unit comprises a separate board that is connected to the sensor via a cable. In an additional embodiment, the size of the digital processing unit is reduced such that it may be mounted on the sensor frame or even on the edge of the foil.
Reference is now made to FIG. 5, which is a simplified block diagram showing the internal configuration of the front-end unit 16 of FIG. 1 according to a preferred embodiment of the present invention. The front end unit 16 comprises a series of differential amplifiers 60.1 . . . 60.n. The differential amplifiers are connected in groups to switches 62.1 . . . 62.m. The switches pass on signals from one of the connected amplifiers to the next stage. The switches are in turn connected to filter and amplifier circuits 64.1 . . . 64.m, and A/D converters 66.1 . . . 66.m. The A/D converters are connected to an output buffer 68, which produces a final output signal for the digital processing unit.
Each of the differential amplifiers 60.1 . . . 60.n is preferably connected via each of its differential inputs to a different one of the sensors of the grid. As will be explained below, the two sensors that are connected to a single differential amplifier are preferably not adjacent sensors. The individual sensor signals are thus converted into signals indicating the difference between two sensors. The difference signal is amplified and forward to switch 62. Each switch is connected between four amplifiers and selects one of the four available amplifier inputs to be further processed. The selected signal is amplified and filtered by the Filter & Amplifier 64, after which it is sampled by A/D converter 66. The digitized sample is then forwarded to buffer 68 and sent on to the processing unit.
In a preferred embodiment, the front end is implemented by a dedicated ASIC. However, in different embodiments, the front-end may be built from a combination of off-the-shelf components.
In the preferred embodiment illustrated, each front-end ASIC contains two identical channels, each handling four differential inputs, so that, in the reference numerals of the figures, n=8 and m=2. Such an ASIC contains two A/D converters, two Filter & Amplifier units, two switches and eight differential amplifiers. Alternate embodiments may of course utilize different ASIC configurations, for example a different number of channels may be arranged in each IC or a different number of inputs may be provided to each of the switches. In one embodiment the switch may be dispensed with altogether and the differential amplifiers may be connected directly to respective A/D converters. An advantage of such a configuration is that it is possible to sample all input lines at the same time, but at a cost of increased complexity. Full simultaneous sampling is useful for energy saving, since all inputs are sampled at each excitation pulse, thus requiring only a single excitation pulse per detection. A significant disadvantage of the above embodiment, where all inputs are sampled simultaneously, is its relatively higher price.
In a preferred embodiment, the switch 62 is located before the Filter & Amplifier 64 thus saving on redundant components More particularly relocation of switch 62 in front of the filter and amplifier 64 reduces the total number of filters needed from 8 to 2. Such a configuration prevents fast switching between the inputs since the filter requires a relatively long setup time. However, in a different embodiment, the switch 62 is placed after the Filter & amplifier 64 so that the filter and amplifier 64 is in proximity to the differential amplifier 60. In such a case it is possible to provide one filter 64 per differential amplifier 60. Such a configuration allows relatively fast switching between the inputs. In such a case, it is possible to add an A/D converter having a sampling rate which is several times higher than that required by the straightforward sampling procedure, so that more than one input can be sampled simultaneously.
Reference is now made to FIG. 6, which is a simplified schematic diagram illustrating a scheme for connecting individual sensors of the grid to the differential amplifiers. Parts that are the same as in previous figures are given the same reference numerals and are not described again except to the extent necessary for an understanding of the present figure. In the scheme, two sensor lines 71 and 73, that are close but not adjacent to one another, are selected. One of the two is then connected to the positive input of the differential amplifier 77 and the other is connected to the negative input of the same differential amplifier. The amplifier is thus able to generate an output signal which is an amplification of the difference between the two sensor line signals. An amplifier having a stylus on one of its two sensor lines will produce a relatively high amplitude output. A major advantage of such a differential based scheme is its inherent noise reduction. If the two lines in the pair are placed relatively close to each other, than both lines probably sense the same parasitic noise and other effects, and the differential amplifier, which subtracts its inputs, thus eliminates any such noise. It is noted that the two input lines which are chosen for connection to the same amplifier are preferably not placed too close to each other, otherwise, a real input signal, such as the stylus signal, is likely to be sensed by both lines and removed by the differential amplifier. Therefore, in a preferred topology, the physical distance between lines connected to the same differential amplifier is slightly larger than the effective range of the stylus transmission. The digital processing unit is subsequently able to use the phase of the sampled signal to determine which of the two inputs of the amplifier have actually received the signal. If the phase is positive than the stylus is probably next to the line that is connected to the positive input of the amplifier and vice versa.
In an alternative embodiment, regular amplifiers may be used in place of differential amplifiers. In such a case the sensor lines are connected to the single inputs of the regular amplifiers.
In a further alternative embodiment the sensor lines may be patterned as loops, rather than straight lines arranged as a grid. In such a case one end of the loop may be connected to a regular amplifier and the other end to a common ground. Alternatively, the two ends of a loop may be connected to the positive and negative connections of a differential amplifier.
In a preferred embodiment, the sensor lines are directly connected to the inputs of the differential amplifiers. However, as an alternative, the lines may be connected via filters, preferably passive, to avoid saturation of the input amplifier due to large noise levels that may occur from time to time at the inputs.
A further embodiment is now explained with respect to FIG. 7, which is a schematic diagram illustrating a variation of the scheme of FIG. 6. Parts that are the same as in FIG. 6 are given the same reference numerals and are not described again except to the extent necessary for an understanding of the present figure. In the variation of FIG. 7, each of the inputs to differential amplifier 77 is connected to two unrelated sensor lines. Thus both sensor lines 72 and 75 are connected to the same positive input of differential amplifier 77. Stylus 78 is located next to sensor line number 2 and transmits a signal that can be picked up by line number 2 and its neighbors 71 and 73. The digital unit receives a signal from differential amplifier 77, but initially does not know whether the signal source is line 72 or line 75. However, since corresponding signals can also be traced to lines 71 and 73, and not to lines 74 and 76, the digital unit is able to deduce the correct source of the signal. Thus, preferably, neighboring sensors are connected to different amplifiers. Furthermore the neighbors of any two sensors connected to the same input should not be connected to corresponding inputs.
As mentioned, the present embodiments are especially applicable to mobile devices, generally battery powered. It is thus helpful to reduce energy consumption to a minimum. Preferably, the front-end components contain a shutdown input command, which switches off various energy consuming chip activities. The digital processing unit may then activate the shut down command as soon as the front-end is not required. Such an action may be activated periodically at a relatively high rate.
Reference is now made to FIG. 8, which is a simplified block diagram of the internal structure of a preferred embodiment of the digital processing unit 20 of FIG. 1. A front-end interface 80 receives serial inputs of sampled signals from the various front-end units 16 and arranges the inputs into a parallel representation. The parallel representation is transferred to DSP 82, which reads the sampled data, processes the data and determines or calculates the position of the physical objects such as the stylus. The calculated position is then sent to the host computer via link, preferably a serial link 84. Code for operating the DSP 84 is preferably stored in Flash memory 86 and sampled data is stored in RAM 88. Excitation pulses for sending to the excitation coil are produced by the DSP 84, and then transformed into analog signals and amplified by unit 90 for output.
In a preferred embodiment, the digital unit is implemented by a dedicated ASIC, which is preferably mounted on the sensor frame or foil edge. However, in different embodiments, the digital unit may be constructed from off-the-shelf components.
In a preferred embodiment, a DSP core provides the above-described digital unit. Such a DSP core is tailored for signal processing, enables high update rate and is capable of handling more than one object simultaneously. In different embodiments, for products which are more sensitive to price and in which performance can be degraded, a cheaper micro-controller may be selected for doing digital unit processing in place of a DSP.
In a preferred embodiment, the DSP operating code is stored in a Flash memory. Flash memory is easy to update and thus future improvements are simple to incorporate. However, if an update capability can be dispensed with, then cheaper ROM memory can be selected for storing the code.
In a preferred embodiment, the DSP interfaces a host computer via serial link 84. In different embodiments, other types of interfaces, such as USB, may be used. The USB interface is the preferred selection for an accessory type application, that is for an enhancement to an existing screen, since a USB is capable of providing the position detection arrangement of the present embodiments with a power supply. The USB is therefore a natural choice of connection type. If a USB interface is implemented, a USB interface component may be added to the digital unit 20 for handling communication with the host.
The preferred embodiments utilize a passive stylus, that is a stylus with no internal power source and no wired connection. Thus, in order to energize the stylus, as described above there is provided external excitation coil 26 which surrounds the sensor and thereby energizes the stylus resonance circuit. An advantage of external excitation is that it inherently provides synchronization of the stylus to the digitizer, since both components are aware of the excitation pulse timing. In alternative embodiments, the stylus may be internally powered using a battery.
In the passive stylus, energy from the external excitation coil induces currents in a receiving coil within the stylus. In order to maximize energy transfer between the external excitation and the stylus, the receiving coil preferably comprises a ferrite core. However, additional embodiments may utilize different types of receiving coils, such as air core or those having other types of cores. The receiving coil is preferably part of a resonant circuit within the stylus.
In a preferred embodiment, COG capacitors are selected to be included in the resonant circuit of the stylus. The advantages of such capacitors are a low sensitivity to changes in temperature and good energy efficiency, the latter being important for a high Q factor and the former being important for a stable resonance frequency. In different embodiments, especially when degraded performance is acceptable and price is critical, other types of capacitor may be used.
Reference is now made to FIG. 9, which is a simplified diagram of the internal construction of a stylus according to a preferred embodiment of the present invention. Stylus 100 comprises a resonant circuit 102, and a frame 104 which defines a tip 106. Upon excitation, resonant circuit 102 oscillates at its resonant frequency. One side of the resonant circuit 102 is electrically connected to the stylus tip 106, which preferably comprises a conductive material. The other side of the resonant circuit is electrically connected to frame 104, which likewise comprises conductive material.
In order to avoid parallax, and to achieve the maximum available accuracy, it is advantageous to transmit the position indication response signal from the stylus at a position which is as close as possible to the stylus tip. FIG. 9 illustrates a preferred way of providing such proximity. An electric field 108, synchronized to the resonant circuit oscillations, is formed in a gap 110 located between the tip 106 and the frame 104. The geometric dimensions of the gap and the consequent field are relatively small and the field source is substantially close to the stylus tip.
Reference is now made to FIG. 10, which is a simplified diagram illustrating a simplified circuit diagram for the stylus of FIG. 9. A resonant circuit 120 comprises a basic resonant section 122 and a variation section 124. The basic resonant section comprises an inductor 126 and capacitor 128. and is excited to oscillate at a basic resonant frequency selected for the stylus. The stylus further comprises a touch switch 130 and a right click switch 132. The stylus tip 134 includes a gap as discussed previously for formation of the electric field. Furthermore the tip is designed to sense when it is in contact with the screen. When the screen is in contact it causes touch switch 130 to close, thereby adding to the basic resonant circuit an additional capacitance 136 in parallel to capacitance 128. The effective capacity thus becomes C1+C2 and the resonant frequency is altered. The signal processing unit 20 is thereby able to determine whether the stylus is actually in contact with the screen or not. The application may for example interpret touch of the stylus on the screen as the equivalent of a left click on the mouse.
User pressure may be used to close Right Click switch 132, thereby to connect capacitor 138 in parallel with capacitor 128. The switch thus changes the effective capacity to be C1+C3 and again changes the resonance frequency. The digital unit detects the change in the frequency and the application interprets the right click accordingly. If both switches 130 and 132 are closed at the same time a fourth frequency is detected by the digital unit equivalent to the capacitance of C1+C2+C3. The system may interpret the fourth frequency as a simultaneous left and right click.
The above embodiment may require excitation at four different frequencies, which wastes energy. It also requires analysis of four separate frequencies in the reception algorithm, thereby consuming CPU resources and energy.
The above method further requires use of a mechanical touch switch, which is placed in the path of the resonance circuit and therefore is required to pass relatively high current. In order to allow a natural feel to handwriting, the stylus touch switch needs to be sensitive and thus designed to be closed under very low pressure. However, mechanical switches with low actuating force do not guarantee a stable and reliable contact.
Reference is now made to FIG. 11, which is a simplified diagram illustrating an alternative circuit diagram for the stylus of FIG. 9. A resonant circuit comprises inductor 142 and capacitor 144 which are excited to oscillate at a predetermined resonant frequency. The resonance oscillations are supplied to a modulator 146 which serves both as a source signal for modulation and as a power supply to the electronic components. The modulator is fed by three inputs; a Tip touch switch 148 which indicates whether the tip of the stylus is touching a surface, a Right click switch 150 which indicates whether the user is pressing the right click button and a rear touch switch 152 which indicates whether the rear of the stylus is touching a surface. The latter may be useful for example for the purpose of using the stylus as an eraser. It is noted that the normal state of any of the switches may be either closed or open. For example, the tip touch switch 148 may be closed when not in touch and open when in touch and vice versa. However, a normally closed state is preferred to avoid bouncing whilst moving when in contact with the surface.
One of the modulated signals is provided to front tip 154 of the stylus, so that the position thereof may be determined during activities such as writing and pointing. The other signal is provided to the stylus rear 156, so that the stylus position can be detected for activities such as erasing, for which the stylus rear might be used. In addition to modulation, the modulator 146 is capable of switching an output off, for example it may switch the rear signal off altogether when the rear switch does not indicate touch.
In a preferred embodiment, the stylus state, that is any of hovering, left click, right click etc may be indicated by modulations introduced by modulator 146. Thus the modulator may introduce a variable time delay between the end of the excitation pulse and the beginning of the stylus signal. An exemplary modulation scheme is as follows: no delay for left click, that is stylus touching the surface, a delay of one oscillation when not touching, that is hovering, a delay of two oscillations for right click and a delay of three oscillations for erasing.
In alternative embodiments, different modulation types are used in place of delays to indicate the stylus state. Suitable modulation types include phase shift (PSK), amplitude modulation (ASK), frequency shift (FSK), and others.
In a further alternative, the modulator can block transmission for a pre-defined amount of time, not during the course of the mode itself but when switching between modes. An example of such a technique is stopping tip transmission for one excitation cycle when switching from hovering to touch (left click down), stopping for two cycles when switching from touch to hovering (left click up), and so forth.
The above embodiments thus provide a stylus which is able to indicate its mode and yet only requires excitation and detection of a single frequency, thus saving energy and other resources.
In a further variation, applicable to any of the above embodiments, different gap geometries may be used for the tip and the rear of the stylus. Thus, for example, with suitable geometry, the electric field at the tip may be geometrically smaller and therefore sensed by fewer sensor lines than the rear field which is more spread out. The digital processing unit may detect such a difference in field size and be able to determine which side of the stylus is touching the surface.
Reference is now made to FIG. 12, which is a simplified graphical illustration of waveform against time to describe the basic duty cycle of a preferred embodiment of the present invention. The cycle is divided into time periods t0 . . . t4 which need not be of equal duration. The cycle begins with the issuance of an excitation pulse 260 that lasts from t0 to t1. The excitation pulse is produced by the digital unit 20, as described above, and transmitted by the excitation coil 26 surrounding the sensor. The pulse drives relatively high signals on the sensor lines, which could cause saturation and other effects such as undesirable filter oscillations in the detection electronics. In order to avoid such ill effects the various detection channels at the front-end are blanked for the duration of the pulse. A blanking period 162 is set, which preferably begins at t0 and ends at the beginning of t2. The system then waits for a predetermined period that allows the front-end filters to enter a ready state. This second wait, 164 is known as the setup period, and upon completion thereof the detection electronics at the front end units sample the input signals during a sampling period 166 and convert the signals to digital representation as described above.
In one embodiment, all of the sensor input lines are sampled simultaneously during a single duty cycle. However, alternative embodiments may lack the resources to carry out such comprehensive sampling in a single cycle. In such embodiments, in which sampling resources are limited, the system may repeat the sampling cycle, two or more times, thus sampling a portion of the inputs for each cycle.
In a preferred embodiment, the sampling rate is steady and is at least twice as fast as the highest sampled frequency, the Nyquist rate. However, additional implementations may change the sampling frequency in response to specific applications or in response to a specific situation.
In a preferred embodiment, the digital unit has functionality for dynamically changing the sampling period. A longer sampling period results in a better signal to noise ratio (SNR) and greater ability to distinguish between neighboring frequencies. On the other hand, a shorter sampling period saves energy, saves computation and enables a faster update rate. Dynamic changing of the sampling period can be used to optimize between energy consumption and update rate as per the requirements of specific applications or specific situations. Alternatively, a constant sampling period can be provided.
An example of how optimization may be achieved is as follows: Whilst the stylus is in contact with the screen surface a relatively high update rate is used. However, as soon as the stylus leaves the surface a slower update rate is sufficient and the system switches to a slower energy saving rate. As an alternative, the update rate may be increased during rapid motion of the stylus and decreased when the location of the stylus becomes more steady. Preferably, both the analog front end units and the digital processing unit switch to an energy saving or standby mode when not in use.
Reference is now made to FIG. 13, which is a simplified flow chart illustrating the procedure for processing the sensed data in order to determine a current position, according to a preferred embodiment of the present invention. As soon as the system completes sampling of all the sensor inputs, the digital unit starts processing the data in order to determine the physical object's position. Detection is performed in two basic phases; the first is a loop over each one of the sampled sensor lines, performing time-domain algorithms, and the second is a loop over frequency indexes, performing frequency domain algorithms.
In a preferred embodiment, time domain activities begin with averaging S10, in which samples from different cycles are averaged to improve SNR. Next, in a stage S20, the algorithm compensates for the exponential decay of the oscillations. There follows a stage of windowing S30, after which the sampled data is transformed into the frequency domain using either FFT or DFT in a stage S40. Time domain activity is repeated for all of the sensor lines.
At the end of the time domain loop, the system enters the frequency domain loop. In a preferred embodiment, frequency domain activities start with peak detection S50, in which the algorithm finds a location at which the signal at a given frequency is maximal, the frequency being selected to correspond to a given stylus in a given state. Then, in a stage S60, if a valid peak is detected, the algorithm interpolates the relevant signals to determine an accurate position. As will be recalled, a given signal is detected over a number of nearby sensors, and a position can be determined by interpolation to a greater accuracy than the granularity of the sensors. Issues of resolution, averaging and interpolation are discussed in greater detail below. In stage S70, fixed errors, if any, may be corrected, for example to compensate for steady electrical interference. Finally, in a stage S80, a determined position may be smoothed on the basis of positions from previous cycles.
It is a general object of the present embodiments to be able to provide the best available resolution. One of the major factors affecting the resolution is instability caused by noise. Therefore, preferred embodiments attempt to improve SNR. One of the ways to improve SNR is averaging between samples taken at different times. However, with such averaging, there is a corresponding decrease in update rate. Thus, in a preferred embodiment, averaging is dynamically managed by the digital unit to optimize stability vs. update rate in accordance with requirements of specific applications or specific situations. In other embodiments, averaging may be avoided or may be carried out in a static manner.
It should be noted that averaging may either be carried out in the time domain, by averaging the samples themselves, or in the frequency domain, by averaging frequency coefficients. Both possibilities have the same mathematical affect in terms of masking noise and thus improving the SNR. However, time domain averaging is generally computationally more efficient since transforms need only be done once, however time domain averaging is wasteful of memory. In embodiments where memory capacity is at a greater premium than computational capacity, averaging may be carried out in the frequency domain.
As described above, the signal emitted by the stylus is sampled during exponential decay of the resonance circuit oscillations. Transforming a decaying signal from the time to the frequency domain can result in undesirable side lobes, which interfere with resolution. It is desirable to enable as good as possible distinction between close frequencies and to prevent false detection of frequencies not actually in use. Therefore, in a preferred embodiment, the system compensates for decay by multiplying the signal with the opposite exponential function.
The resonance circuit Q factor drives the exponential coefficient of the decaying function. The Q factor may differ slightly from one physical object to another. In a preferred embodiment, for simplicity, the exponential compensation coefficient is a static value standing for the average Q factor. However, other embodiments may utilize a dynamic compensation coefficient that is specifically tuned, either manually or automatically, for each relevant object.
In a preferred embodiment, the input samples are multiplied by Hamming window coefficients prior to FFT/DFT transforming. As a result, undesired frequency side lobes are eliminated and false detections are avoided. However, different embodiments use different types of windows, such as Hanning, triangular or the like, or even use a simple square window with no additional modifications.
As described above, the input samples are transformed from the time to the frequency domain using either the DFT (Discrete Fourier Transform or FFT (Fast Fourier Transform). There is no mathematical difference between the results of the above transforms. However, FFT is more efficient when processing a large number of frequencies and DFT is more efficient when processing a small number of frequencies. In a preferred embodiment, the digital unit dynamically selects between FFT and DFT in accordance with the number of frequencies currently in use. Other possibilities are to preselect one or the other of the transforms based on the likely number of frequencies to be used in a given application. Thus an application in which only a single stylus is ever likely to be used may initially be set to DFT. A chess game, in which each playing piece has a different frequency may be set to FFT, and a general purpose application may switch between the two transforms as the number of frequencies being used changes. Yet further embodiments may use other transformation from time to frequency domain.
In a preferred embodiment, for simplicity, the magnitude or energy at the given frequency may be used for calculating the object location after the transformation into the frequency domain. However, since the phase of the input signal may also be known, it may be possible to use the component of the frequency magnitude in the pre-known phase. Furthermore, if only one frequency is used at a certain time, then it may be possible to tune the time point at which sampling starts, so that the phase of the signal exactly matches the real or imaginary part of the frequency coefficients. Such tuning permits an improvement in overall computational efficiency.
Having isolated the energy at the given frequency, a peak detection phase follows in which a first rough determination is made of a location where the signal in is maximal. In a preferred embodiment, the algorithm looks for the maximal magnitude in the X axis and simultaneously looks for the maximal magnitude in the Y-axis. If both the X and Y maximal magnitudes are determined to exceed a preset threshold, than a physical object is likely to be located about the intersection of the two maximal coordinates.
where X2 and X3 stand for the location of L2 and L3 on the X-axis, M2 and M3 are the signal magnitudes and K is a constant set according to the geometric shape of the stylus electric field.
Different embodiments may use different interpolation functions, different interpolation algorithms or larger number of lines in the interpolation process. Thus interpolation based on the three lines having the highest signals may be expected to provide improved location accuracy for relatively little increase in processing cost.
The error compensation stage, S70 in FIG. 13, corrects systematic errors that are caused by static electric interference, such as that imposed by the FPD structure and topology. In many cases, a front mounted sensor is not sensitive to this type of interference and therefore no error compensation is used. However, there are many applications in which error compensation of this kind is useful. One way of implementing such an error correction process is to use a customized look-up table. The look up table may be operated on the host computer or be configured into the digital processing unit, and is typically in the form of a two-dimensional matrix. The matrix cells represents sensor coordinates and the cells content is a two-dimensional error value for the relevant position. Such a matrix may automatically be built as a final stage of the manufacture process by a robot arm system that moves a stylus through a series of pre-defined known locations and stores data relating to the difference between the known and the actually detected positions. At run time, the system may either select the error value stored in the matrix cell closest to the reported position, or may interpolate a detected value by a number of matrix cells around the reported position according to the error value given. The matrix may be combined with the sensor line tolerance compensation database referred to above if present.
Stage 80 of the flow chart of FIG. 13 relates to smoothing. The object of the smoothing stage is to smooth stylus movement using the history of the previous stylus positions. The smoothing filters out temporary and static fluctuations that are not a reasonable human movement, in order to display a smoother image on the graphical display.
In one preferred embodiment, the smoothing phase is implemented at the host computer. Implementation may be as a dedicated package in the system driver or as part of general support provided within the operating system. In another embodiment, smoothing is carried out at the digital unit 20.
In a preferred embodiment, smoothing comprises filtering undesired frequencies from the movement pattern. This may, for example, be achieved by transforming the vector obtained of successive stylus positions into the frequency domain, setting undesired frequency coefficients to zero, and switching back to the time domain for display purposes. Other embodiments of the present invention may use other types of filters, such as filters that fit a best curve, and the like.
It is noted that smoothing filters that use both history and future positions normally perform better than those that use history alone. However, using both historical and future positions can make it difficult to produce real time results, due to the need to make an assessment of likely future positions. The above disadvantage is significant while writing or painting on a display such as an FPD, wherein the user expects the drawing to match the tip of the stylus closely. One solution is to use a combination of two filters; the first being a reactive filter, or even no filter at all, that has a tiny delay and which is used to provide stylus movement tracking on the screen in real time. The second is a slower filter that uses future knowledge and back-corrects the already displayed curve, so that glitches disappear before they are able to do any harm.
The excitation pulse is a dominant energy consumer. It is desirable to minimize energy consumption overall, especially as many likely applications for the present embodiments are on battery-powered portable devices of one kind or another. It is therefore preferable to minimize the pulse energy consumption.
In a preferred embodiment, the excitation pulse comprises one or more sine waves. In different embodiments, other types of pulse, such as impulse, square wave and like pulses may be used.
In a preferred embodiment, the digital unit dynamically controls the excitation signal pattern. The system is aware of the objects and corresponding frequencies currently taking part in a given session, and produces excitation waves accordingly. System awareness of participating objects may be provided as pre-knowledge from the application or as a dynamic analysis of the current inputs. Thus, at the start of the session, the system obtains the frequencies of the participating devices from the application, or interrogates the participating devices or analyzes its inputs to determine the frequencies present. The system then restricts the excitation signal pattern to that optimal for those frequencies. Other embodiments may use a static pulse pattern that ensures the excitation of all relevant frequencies.
In general, a longer excitation pulse results in lower energy consumption. On the other hand, a long pulse may limit the overall update rate. As discussed above, preferred embodiments optimize energy consumption and update rate to the requirements of specific applications or specific situations, either by preselecting an optimal excitation pulse length for the application or by dynamically changing the pulse length during operation.
a gap at said tip across which said resonator arrangement is coupled, to create an electric field concentration in the vicinity of said front tip.
2. The passive stylus of claim 1, further comprising a ferrite coil.
3. The passive stylus of claim 1, wherein said resonator is remotely located from said tip and coupled thereto via a conductor.
4. The passive stylus of claim 1, further comprising switchable components to contribute to said resonator arrangement to modify said predetermined resonant frequency to indicate different mode settings of said stylus.
5. The passive stylus of claim 1, further comprising a modulator for providing detectable variations in said electric field according to different mode settings of said stylus.
6. The passive stylus of claim 1, comprising a reverse tip located at a second end remote from said front tip, a conductor arrangement extending to said reverse tip.
7. The passive stylus of claim 6, wherein the geometry in the vicinity of said reverse tip is different from the geometry in the field of said front tip, thereby to provide a detectable difference between said front and reverse tips.
8. The passive stylus of claim 6, further comprising switchable components associated with said reverse tip, to contribute to said resonator arrangement to modify said predetermined resonant frequency to indicate different mode settings of said stylus.
9. The passive stylus of claim 5, wherein said detectable variations are variable delays in coupling of said electric field to said gap.
10. The passive stylus of claim 5, further comprising a normally closed switch associated with said front tip. | 2019-04-23T07:17:45Z | https://patents.google.com/patent/US20080023232A1/en |
2. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Copyright 2005 Teresa Evans. All rights reserved. Permission is given for the making of copies for use in the home or classroom of the purchaser only.
5. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Hints for Using Games Parents Selecting the games Not all games will be suitable for the ability level of your child. Ages are given as a general guide and may not be applicable to your child. Your childs teacher may be able to help identify which games would be most suitable. Involve your child in selecting the games that he/she would like to play. If he/she is able, let him/her read the instructions and choose a game or you can describe how the game is played and let the child choose. Letting the child read the instructions is a great reading comprehension activity. If your child has a favorite game it cant hurt to let them play it over and over. Preparing the games Print the games that you require for your child. If the game requires cards to be printed or made, store the cards in a separate plastic bag, a paper bag or an envelope. Allow the child to decorate the bag or the envelope with drawings or fancy writing. Store games in a box. A shoe box can be covered with paper and decorated by the child. Card can be used to make the games but laminating the card will make the games more durable and more visually appealing. Involve the child in preparing the games, e.g. cutting out pieces and putting into bags. Playing the games Set aside a special games time each day, e.g. just before bed or straight after homework is done. Involve the whole family in playing the games. Older children can also play. Once a week involve the whole family in a games session. Discuss with you child the skills that your child can improve by playing the game. Encourage and praise the child for their efforts. Emphasize that having a go is more important that winning. Stop playing the games before the child has had enough. Only play while the child is still enjoying the game.
6. Making Math More Fun Math Games Ideas www.makingmathmorefun.com To make the games more interesting, sweets can be used as a prize for the winner. Although many games have been designed for 2 -4 players, some games can be played by one child. If a game requires 2 players, you can play against your child. Teachers Selecting the games These games are an ideal way to cater for different ability levels in your classroom. Students who are struggling may be given easier games to practice basic skills. The more advanced games can be used to extend brighter students. Games can be used to reinforce the skills that are being taught in the classroom, e.g. When time is being taught, play Time Bingo. Students can also be involved in selecting which games they would like to play. This will create a sense of ownership of the games. The games can be used as a reward for working well. Allow students to select the game they would like to play. Preparing the games Games that require cards can be printed in the size shown or can be enlarged on a photocopier to create large cards that can be used for whole class games. Students can be involved in preparing the games. Students can print the cards, cut out cards and decorate the bags or envelopes. This will lighten the teachers work load and give students a sense of ownership of the games. The students will take pride in the fact they made the games. At the same time it is also giving the students responsibility. Laminating the cards will make them more durable and also more appealing. Playing the games These games are suitable for a variety of classroom uses. Whole class games can be made by enlarging the games on a photocopier. The class can be divided into teams and one player at a time can come to the front for a turn. Students can also be seated in a circle and sit with their teams. The cards can be placed in the centre of the circle.
7. Making Math More Fun Math Games Ideas www.makingmathmorefun.com When playing with the whole class, this provides an ideal time to discuss the skills relevant to the game, e.g. discuss place value when playing a number game. The games also provide an ideal introduction or conclusion to a lesson on a particular skill, e.g. Play Build One as an introduction to a lesson on decimal numbers. These games can be part of a Math activity centre or an activity for a Math rotation. These games are also an ideal activity for students who finish work early. I always have a box of games at the back of the classroom. Students who finish work early then choose a game and play quietly in a designated area. Games can also be sent home with students so they can play them with their parents. Parents will enjoy this as it is a fun way for them to help their child and be involved in what the child is doing at school.
8. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Math Games Ideas 1. Addition Duel 7+ years 2 players or teams Need set of playing cards with the jacks, queens, kings and jokers removed. Aces are to count as 1. Children will be practicing addition without even realizing it. Makes a good classroom game with 2 teams playing against each other! Shuffle the cards and deal them out. Each player puts their cards in a pile facing down. Together players flip the top card over and place it in the centre. The first player to add the amounts on the two cards together and call out the answer takes the cards. If a player calls an incorrect answer the cards are returned to the bottom of the pile. When all cards have been drawn the winner is the player with the most cards. Variations Multiplication Duel / Subtraction Duel Played as above but players multiply or find the difference instead. See Double Draw for a similar game of division. 2. Basketball Facts 5+ years 2 players or teams Need soft foam ball, waste bin or bucket to be the hoop Fun way to practice number facts! Two players stand side by side. If playing in teams, teams can line up in two lines with the first player in each line taking the first turn and then moving to the end of the line after this turn.
9. Making Math More Fun Math Games Ideas www.makingmathmorefun.com The caller calls a number fact, e.g. 3+9, 15-6, 4X5 or 36 4. The first player to call out the correct answer then has a turn at shooting for a point (throwing the ball into the waste bin or bucket). The player scores a point if he is successful. If playing in teams, the next two players then have a turn. VARIATION Basketball Fractions This game is played in the same way with the caller calling out a fraction and a number, e.g. What is of 12? 3. Battleships 8+ years 2 players Need pencil, paper (squared paper if possible) A great game for practicing coordinates! Use squared paper if available. Each player needs 2 grids that are 10 squares by 10 squares. Label A-J along the bottom and 1-10 down the left side. Each player marks in their ships - 1 battleship (4 squares long) - 2 cruisers (3 squares long) - 3 destroyers (2 squares long) - 4 submarines (1 square). Use Bs, Cs, Ds and Ss. No two vessels may touch. Players take turns to try to hit the opponents fleet by calling out a grid coordinate, e.g. H4. Keep a record of what you call on the empty grid. The other player tells if it is a miss or hit. If it is a hit he tells the type of vessel. Players put a X on their fleet when it is hit. Players mark their hits on the enemy with a letter to show the type of vessel. Misses can be marked with a o. First person to destroy the enemys fleet is the winner.
11. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Develops concept of decimal numbers! Cards are placed in a pile face down. Players take turns to turn over a card and read the decimal number. They then color this amount on their grid, e.g. If a player draws a card with 0.35, they then color this much of the grid. First to color the whole grid is the winner. 6. Bundles 6+ years 2+ players Need popsicle sticks, dice, elastic bands A game to develop tens place value concepts. Popsicle sticks are placed in the center. Before beginning decide what the winning number is to be, e.g. 50, 80 or 100. Players take turns to roll the dice and take that number of popsicle sticks. When a player has tens sticks they can bundle these into a bundle of ten using the elastic band. The first player to reach the winning number, e.g. 50 which is 5 bundles of ten is the winner. HINT During play, encourage players to count their sticks, e.g. 3 bundles and 7 sticks is 10, 20, 30 and seven more make 37. 7. Buzz 8+ years 2+ players A game that requires concentration and a need to know Times Tables! Great for classrooms! Decide upon the number that will have its multiples missed (a number from 3-9). For larger groups children could stand in a circle.
12. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Count around the group saying one number each but when a multiple of the chosen number comes up, children dont say the number but instead say BUZZ. E.g. If 4 is the chosen number, counting around the group would sound like this - 1, 2, 3, BUZZ, 5, 6, 7, BUZZ, 9, 10, 11, BUZZ etc. A player is out if he makes a mistake. Usually the game will stop at 100. Another number can then be chosen. For older children it is possible and good math practice to go over 100. Variation Double Buzz A more advanced version is to also use BUZZ for any number that contains the chosen number as one of its digits, e.g. If 4 is the chosen number, counting around the group would sound like this -1, 2, 3, BUZZ, 5, 6, 7, BUZZ, 9, 10, 11, BUZZ, 13, BUZZ. For 24, 34, 40 and 41 a player would say BUZZ. 8. Coin Toss 6+ years 2-4 players or teams Need a large 6x6 grid filled with random numbers to be studied, coins (counters or bottle tops can be used). Fun way to compare values of numbers! The large grid is placed on the floor. Use 2 digit numbers if studying 2 digit numbers. Or use 3, 4 or 5 digit numbers. Each player or one player from each team takes a turn at tossing a coin onto the grid. If the coins lands off the grid the player is out. If the coin lands on 2 spaces the space that has most of the coin is the number that is used. Players compare the numbers. The player whose number is the largest, scores a point. Repeat keeping score. Variation Decimal Coin Toss Played as above but the grid can be filled with decimal numbers.
14. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Other players take turns at joining to a tile joining a number to the same number. If a player cant put down a tile, he picks one up. First player to put down all of his tiles is the winner. 11. Dominoes - Keepers 6+ years 2 players or 2 teams Need set of Dominoes Helps children learn addition facts. All of the dominoes are placed in the centre face down. Both players or one from each team pick up a domino at the same time. Each player tells the sum of the dots on their domino, e.g. 2+4=6, 5+3=8. The player with the highest answer keeps both dominoes. If both players have the same answer, each of them keeps a domino. The winner is the player or team with the most dominoes when all dominoes have been picked up. Variation Dominoes Keepers Multiplication Played as above but players multiply the two ends of the domino instead of adding. 12. Dominoes - Sevens 6+ years 2-4 players Need set of Dominoes Helps children learn addition facts. Played as above in Game 10. Dominoes but this time only combinations that add to seven can be put down, e.g. if a 2 is down a 5 can be joined to it. 13. Double Dice Addition 6+ years 2- 4 players Need 2 dice for each player, counters, markers (or sweets) Develops basic addition skills.
15. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Each player rolls 2 dice. The numbers shown on a players dice are then added together. The player with the highest number wins the round and takes a counter. Continue play until a player has a given number of counters, e.g. 10. Variation Double Dice to 100 Players can also add their scores for each round and the winner can be the first to reach 100. 14. Double Dice Multiplication 8 + years 2- 4 players Need 2 dice for each player, counters, markers (or sweets) Develops basic multiplication skills. Each player rolls 2 dice. The numbers shown on a players dice are then multiplied together. The player with the highest number wins the round and takes a counter. Continue play until a player has a given number of counters, e.g. 10. 15. Double Draw 9+ years 2- 4 players Need 2 sets of number cards ( BLM 1 and BLM 2) (2 copies of each BLM one set in one color and the other set in another color) Remove the cards with 0 on them. Develops basic division skills. Cards are shuffled and placed in 2 piles. (Keep each set of cards in a separate pile.) First player takes a card from each pile and turns it over. If the numbers are the same the player scores a point. If one number can be divided evenly into the other number, the player scores a point.
16. Making Math More Fun Math Games Ideas www.makingmathmorefun.com The cards are then put in 2 discard piles and the next player has a turn. Winner is the person who has the highest score when all cards have been drawn. OR The game can continue for longer if the discarded piles are shuffled and returned to play. 16. Families Race 8+ years 2+ players or teams Need pencil and paper Helps children to recognize the relationship between addition and subtraction or multiplication and division! Play as a team game in the classroom with children in the team taking turns to write one fact. Addition and Subtraction Show children a triangle of related numbers, e.g. 12 7 5 Children then race to be the first to write the 2 addition facts and 2 subtraction facts in the family, i.e. 7+5=12, 5+7=12, 12-5=7, 12-7=5. Multiplication and Division Show children a triangle of related numbers, e.g. 24 3 8 Children then race to be the first to write the 2 multiplication facts and 2 division facts in the family, i.e. 3x8=24, 8x3=24, 243=8, 248=3.
17. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 17. Find It First Facts 5+ years 2 players or teams Fun way to practice number facts! On the board or a piece of card write the answers to the facts to be studied. e.g. to study multiplication facts write 12, 15, 18, 20, 21, 24, 25, 27, 28, 30, 32, etc Write the numbers low enough for the players to reach them. The two players stand beside the numbers. If playing in teams one person from each team is sent to the board at a time. The caller calls a number fact, e.g. 4x8 and the first person to find the answer and point to it scores a point. If playing in teams the next two players come to the board. 18. Find It First Numbers 5+ years 2 players or teams Practice recognition of numbers and digits! On the board or a piece of card write the numbers to be studied. e.g. to study digits from 0-9, write the digits from 0-9. - to study 2 digit numbers write a selection of 2 digit numbers, e.g. 23, 45, 76, 29, 44, 40, 14 etc. - for 3 or 4 digit numbers write a selection of 3 or 4 digit numbers. Write the numbers low enough for the players to reach them. The two players stand beside the numbers. If playing in teams one person from each team is sent to the board at a time. The caller calls a number and the first person to find it and point to it scores a point. If playing in teams the next two players come to the board.
18. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 19. Find It First Place Value Practice place value! 6+ years 2+ players or teams On the board or a piece of card write several numbers to be studied. e.g. to study 2 digit numbers write a selection of 2 digit numbers. - to study 3, 4, or 5 digit numbers write a selection of 3, 4 or 5 digit numbers. Write the numbers low enough for the players to reach them. The two players stand beside the numbers. If playing in teams one person from each team is sent to the board at a time. The caller calls out the value of the number that is to be found, e.g. Find a number that has 4 tens. or Find a number that has 3 ones, 6 tens and 2 hundreds. The first person to find it and point to it scores a point. If playing in teams the next two players come to the board. 20. First to 100 7+ years 2 players Great way to practice addition! Start with 0. Players take it in turns to add any number from 1-9. The player who reaches 100 first is the winner. The winning player must reach 100 exactly to win. E.g. Black is the 1st player and red is the 2nd player. 6+7=13+8=21+9=30+7=37+2=39+8=47+5=52+9=61+5=66+8=74+5=79+6=85+5 =90+1=91+9=100 Red is the winner.
19. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 21. Four in a Row Bingo 5+ years 2+ players Need Bingo cards (premade or created by the players), counters, cubes (or sweets) A fun game to practice addition, subtraction, multiplication or division facts. If players are to make their own bingo cards, the caller writes the answers to the 16 facts to be studied on the board. (More than 16 facts and answers can be used if desired.) Players then write the answers on 4x4 gird in any order. The caller then calls a fact and the players cover the answer. The first player to cover a line of 4 in a row, column or diagonal is the winner and calls out Bingo. The caller then checks that the correct answers have been covered. Repeat. Variation Five in a Row Bingo Played as above but use a grid of 5x5 and 25 facts instead. The winner is the first to create a line of 5. 22. Fraction Fun 10+ years 2+ players or teams Need 2 sets of cards one with fractions and one with numbers, See Black Line Masters 3 and 4 for simple sets Develops the concept of fractions and provides practice at working out fractions of numbers. Turn cards face down. Each player or team selects one Fraction Card and one Number Card. Players then work out the amount that they have to the nearest whole number, e.g. 3/8 of 48 is 18. The player or team with the most is the winner of the round. Scoring can be done in 2 ways.
20. Making Math More Fun Math Games Ideas www.makingmathmorefun.com - The winner can score a point. - Or each player or team can record the amount for that round and total their amounts at the end of the game. FOR THE CLASSROOM I use this game as a game show. Every student participates in one round. Winner of each round goes into the final. Winner of the final wins a prize. Can be played in one day or held over a week with one round each day. (See also Percentages Prizes for a similar game show) 23. Grab and Group 7+ years 2+ players Need 30+ markers or small items Helps children to develop the concept of division! Older children can practice dividing with this game! The first player grabs a small handful of markers. (Players are not allowed to count how many as they grab.) Now the player sees if she can make - groups of 2 with her markers. She scores 2 points if she can. - then groups of 3. She scores 3 points if she can. - then groups of 4. She scores 4 points if she can. - then groups of 5. She scores 5 points if she can. - then groups of 6. She scores 6 points if she can. Groups must be made without any marker being left over. The player records her score and the next player has a turn to grab and group. HINT Younger children will need to put the markers into groups but older children can be encouraged to count the markers and divide by 2, 3, 4, 5 and 6.
21. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 24. Groups - Addition 7+ years 12+ players Need cards with an addition fact on each one several cards must have the same answer Great revision and practice for addition facts (or multiplication, subtraction or division facts)! Great classroom game but it will be noisy! Each child is given a card with a fact on it. On GO children move around calling out their facts and try to find their group, i.e. the others that have the same answer as they do. Children are told previously how many people will be in each group. When the group is all together, they quickly sit down as a group. First group to assemble is the winner. Variations Groups Multiplication, Subtraction or Division Players can be given cards with multiplication, subtraction or division facts. 25. Guess It 8+ years 2+ players Develops concept of addition, subtraction, multiplication and division. Great classroom game! One child or an adult writes a basic operation but does not show it to the others, e.g. 4x3=12. Others have to guess the operation by asking questions about the digits and signs. E.g. Does it have a 7 as a digit? No Does it have an addition sign? No Does it have a 3 as a digit? Yes First child to guess the operation is the winner.
23. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 27. Higher or Lower 7+ years 2+ players A thinking game to improve number skills! Great for classrooms! This is a Guess my number game. First decide how big the number can be, i.e. is it between 0 and 100; 100 and 1000 or 1000 and 10000. This will depend upon the ages of the children. One person is IT. (This might be an adult or the teacher.) IT thinks of a number and writes it down without telling or showing the others. The other players take turns guessing the number and listening to the clues given by IT. These clues will only be Higher or Lower. IT says Higher if her number is higher than the guessed number or lower if her number is lower than the guessed number. Winner is the child who guesses the number. HINT children might need to be encouraged to listen to the clues. Variations Higher or Lower - Decimals Played as above but with a decimal number instead. Decide how many decimal places the number will have before starting, i.e. 1, 2 or 3 decimal places. Players could be told that the number is between 2 and 4. (2.56) 28. Jumbled Operation 7+ years 2+ players Really makes players think! Players are shown the digits and signs from an operation in jumbled form. E.g. 1, 3, 6, 7, +, = The first player to make it into a correct operation is the winner of that round. For older children the format of the operation could be show to them.
25. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Players take turns to remove 1, 2, 3 or 4 matches from a row on their turns. The player to remove the last match is the loser. 31. Make 20 7+ years 2+ players Need 5 sets of number cards (see BLM 1) or a pack of playing cards with jacks, queens, kings and jokers removed, Aces are to be 1. A game to develop skills with math facts and equations! Shuffle cards and place in a pile in the centre or spread out cards face down. Players take turns to pick up 3 cards. If a player can make the numbers on the cards total 20 in some way they get to keep the cards, e.g. 7+8+5=20, 2x8+4=20, 5x5-5=20, (1+3)x5=20. If a player can not find a way to total to 20 they return the cards to the bottom of the pile or to the centre if cards are spread out (then mix up the cards again). When all cards have been taken or only a few remain, players total the numbers on their cards. Highest score is the winner. For a simpler version winner could be the player with the most cards. Variation Make 10 A simpler game where only 2 cards are picked up each time. 32. Math Champs 6+ years 3+ players A quick game to practice addition, subtraction, multiplication or division. A play off can be held in the classroom. Winner can verse the teacher! Two challengers are chosen and stand either side of the caller.
26. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Caller calls out a number fact, e.g. 9+6. First player to call out the answer scores a point. Caller can hold up 1 finger on this players side. Play continues until one of the players has 3 points and is the winner. 33. Money Bucket 6+ years 2+ players or teams Need bucket, coins (real or plastic play money) A fun way to practice adding money amounts! Set up the bucket about 6 ft in front of a starting line. Players or teams take turns to toss the coins into the bucket. If a coin misses the bucket it cant be picked up again. When all coins have been tossed, the player or team total the amount in the bucket. After each player or team has had a turn, the winner is the one with the highest amount. Several rounds of the game could be played, keeping a running total. 34. Multiples Race 9+ years 2+ players Need pencils and paper Practices counting skills and multiples! Select the number to have its multiples written, e.g. 4 or 7 or 20. On GO the players start by writing the selected number and multiples of that number in counting order. Give a time limit, e.g. 1 minute. The player who correctly writes the most multiples is the winner. 35. Nim 6+ years 2+ players Need Several markers or counters (12+) A game of strategy! Similar to Last One Loses!
28. Making Math More Fun Math Games Ideas www.makingmathmorefun.com pile and adds it the bottom of her pile. A player is out of the game if he runs out of cards. Last player to have cards left is the winner. 38. Number Tic Tac Toe 7+ years 2+ players Need pencil and paper Children will be practicing addition without even realizing it. One player uses odd numbers 1, 3, 5, 7, 9; while the other player uses even numbers 0, 2, 4, 6, 8. On a Tic Tac Toe grid, players take turns to write one of their numbers. The player with odd numbers starts. Each number can only be used once. The object of the game is to make a line horizontally, vertically or diagonally that adds up to 15. The line can consist of both odd and even numbers. 39. Number Washing Line 5+ years 1+ players Need Rope strung up to be a washing line. (tied between 2 chairs is fine), pegs, cards with numbers to be sorted into order from smallest to largest. Comparing and sorting numbers. Use numbers appropriate to the ability level of the players, e.g. 0-9 for younger players or 2, 3 or 4 digit numbers for older players. The number cards are pegged onto the line. Players take turns to sort and peg the numbers into order the smallest to the largest. Variation Decimal Washing Line Played as above but use decimal numbers to sort into order. 40. Odds and Evens 5+ years 2-4+ players or teams Need Cards with the words odd and even written on them.
30. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Examples of advanced patterns . Also allow children to create a pattern for other children to continue. 43. Patterns - Numbers 7+ years 1+ players Need paper, pencils, markers. Patterning is an important skill to develop in math. Write a number pattern and ask children to identify the pattern and add the next 2 or 3 numbers. Example of simple pattern 3, 6, 9, 12, . (add 3) Example of more advanced pattern 2, 4, 8, 16, . (double each number) Patterns can also be made where there are 2 steps to creating the next number. Example 2, 3, 5, 9, 17, . (double the number and take off 1) Numbers can also be left out of a pattern for children to fill in the missing number. Examples 4, __, 12, 16, 20. 49, 44, 39, __, 29, 24. Also allow children to create a pattern for other children to continue. A variety of number patterns are given below. 20, 24, 28, 32, ___. 20, 17, ___, 11, 8. 12, 15, 18, ___, 24. 100, 88, 76, ___, 52. 30, 60, 90, ___, 150. 71, 61, 51, ___, 31. 80, 40, ___, 10, 5. 23, 34, 45, ___, 67. 1, 4, 9, 16, ___. , 1, 1, 2, ___. 364, 356, 348, ___. 25, 24, 22, 19, 15, ___. 0.1, 0.2, 0.4, 0.8, ___. 1, 3, 6, 10, ___. 88, 78, 69, 61, 54, ___.
36. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 53. Take Off 7+ years 2+ players Great way to practice subtraction! Before starting decide upon a start number, e.g. 20, 50 or 100. Players take turns to subtract any number from 1-9. The player who gets to 0 is the winner. E.g. - 1st player 20-3=17 - 2nd player 17-4= 13 - 1st player 13-3=10 - 2nd player 10-2=8 - 1st player 8-8=0 Winner The older the child, the higher the start number can be. 54. Tangram Tangles 7+ years 2 players Need 2 tangrams (some stores sell them in wood or plastic) or print the following twice.
38. Making Math More Fun Math Games Ideas www.makingmathmorefun.com 56. Toothpick Grab 5+ years 2+ players Need toothpicks in a bowl Develops number concepts! Players take turns to grab as close as possible to 10 (or 20) toothpicks. Count the number grabbed. The player with the closest to 10 can score a point or players score a point for grabbing exactly the right number. 57. Twenty Questions Number Game Great for classrooms! 7+ years 2+ players IT selects a number within the range to be played, e.g. 1- 20, 1-100, 100-1000. The number is written on a piece of paper but not shown to the others. The other players then ask questions to help them to identify the number. Only yes/no questions can be asked. HINT Encourage children to ask general questions to begin with, e.g. Is it odd? Is it higher than 50? instead of guessing the number, e.g. Is it 38? 58. Vanishing Numbers 7+ years 2 players Need - calculator Great game for practicing place value! 1st player enters a number into a calculator. (Specify how many digits it should have, 3, 4, 5, 6 or 7.) 2nd player tells which digit is to vanish, i.e. change to a zero. 1st player then enters one operation into the calculator to change it to a 0. One point is scored if she is successful. 1st player then nominates to the 2nd player which digit he is to make disappear. Take turns entering a new number when necessary.
39. Making Math More Fun Math Games Ideas www.makingmathmorefun.com e.g. 1st player might enter 457. 2nd player might say make the 5 vanish. (1st player then enters 50 = to turn the 5 into a 0. 1st player then says make the 4 vanish (2nd player has to enter - 400 =) 59. Whats My Number? 6+ years 1+ players Great for all ages and levels of ability! An adult or child selects a number within the specified range and writes it on a piece of paper. Clues are then given for others to guess the number. If children are to give the clues encourage them to use mathematical terms within their vocabulary, e.g. odd, even, digits, larger than, smaller than, prime, composite, multiples, divisible by. 60. Whats My Shape? 6+ years 2 teams Need Cards with shapes on them See - BLM 7 and 8 Shape Cards Select cards appropriate for childrens ability Revises geometric shapes! One team has a turn then the other team has a turn. Cards are placed in a pile face down. The first player in the team takes a card and looks at it. This player then describes the shape without naming it, e.g. It has four sides and all of them are equal. Whats My Number? I am odd. I am larger than 10 and smaller than 20. One of my digits is a 5. Whats My Number? I have 2 digits. One is an odd number and one is and even number. The sum of my digits is 6. I am divisible by 5. Whats My Number? I am larger than 50 and less than 60. I am even. I am divisible by 3. Whats My Number? I have 2 digits. I am less than 30. I am prime. One of my digits is a 7.
40. Making Math More Fun Math Games Ideas www.makingmathmorefun.com The team has to guess the shape. When the team guesses the correct shape the next player takes a card and describes the shape. The team is given a time limit, 1-2 minutes and scores 1 point for every correct shape that they name. Cards are shuffled and the next team has their turn. The winning team is the team with the most points. 61. Who Am I? 7+ years 6+ players Need- a card with a number on it for each child, pins An interesting but noisy game! Each player has one number pinned to their back that they havent seen. On GO children walk around and ask questions of others to help them to identify their number. Rules - Only Yes/No questions can be asked. - Children can only ask one question of a person and must then move to another person. They can ask a question of the same person after visiting others to ask questions. First player to identify her number is the winner. Play can continue until each child has identified his/her number.
47. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Black Line Master 7 Cut out cards for Whats My Shape?
48. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Black Line Master 8 Cut out cards for Whats My Shape?
52. Making Math More Fun Math Games Ideas www.makingmathmorefun.com Black Line Master 12 Cut out grids for Build One. | 2019-04-21T14:35:09Z | https://docslide.net/education/making-math-more-fun-math-games-ideas.html |
Here I’ll look back on over 50 years of photography – thoughts, equipment, objectives, ideas.
It still looks good, mainly because I never used it a lot. I was very much an amateur geologist in those days, collecting rocks, fossils and minerals for all I was worth, and black and white shots from this camera were used to illustrate two school projects – one on the geology of Kilve beach, in Somerset; and the other for a study of coastal features around Weston-super-Mare (also in Somerset), for which I won the school’s regional study prize.
Aged around 15 or 16, I spent much of my free time caving in Somerset’s Mendip Hills. A small group of us were interested in geology, and descending into caves was a natural progression of this interest. My friends started taking flash photographs underground with cameras only a little more sophisticated than my (flashless) Kodak 127, and then they progressed onto 35mm format – and I wanted 35mm too! However, times were bad – my family had just fallen apart. My father had left, and my mother and I lived in distinctly reduced circumstances, with my mother’s parents. However, Mum found the money somehow and, for Christmas 1966 I received an Ilford Sportsman 35mm camera.
I was in heaven! The Brownie 127 had but a single aperture and shutter speed, but the Sportsman had apertures from of F2.8 to F22, and shutter speeds from 1 second to 1/500th, and it would synchronise with flash. I couldn’t afford an electronic flash, and so used flashbulbs. You fitted a flash bulb into the flashbulb holder on the flash, and then took your flash photo – after which the bulb was cloudy, bloated and busted, and you ejected it from the flash unit and threw it away – which all seems impossibly archaic now!
I used several handheld exposure meters, remembered to point them a little towards the ground if that was what I wanted to expose for, and photographed with mainly Ilford black and white films: FP3 and the faster HP3. My films were developed commercially and, my school (and later my university too) having a darkroom, I made mostly clumsy and blundering attempts at printing. My friends were also shooting (and projecting) colour slides and I soon followed suit, although only being able to afford a slide viewer, rather than a projector.
And here’s something I want to be honest about, because it troubles me. Later in life, in my twenties and entangled with a woman, I gave her that Sportsman to (further) curry her favours – and still regret it, and feel guilty about it, to this day. How could I give away my mother’s hard won gift? We are capable of such heartless things in our youth.
Later, I yearned for a Single Lens Reflex (SLR) camera with Through The Lens (TTL) exposure metering, and bought a Praktica LTL SLR, sometime in the early to mid 1970s. Composing and metering via the viewfinder were just fantastic! The camera took screw fit lenses, which wasn’t ideal – both in terms of the time needed to change the lenses and the increased likelihood of introducing dirt into the camera body (i.e. as against a bayonet mount) – but being able to change the lenses at all was just wonderful.
The camera came with a 50mm F2.8 Tessar standard lens, and I can also remember adding a 29mm Pentacon wideangle, and a far superior Pentax 135mm SMC (Super Multi-Coated) Takumar telephoto. I was very much a birdwatcher in those days and so aspired to photographing birds. I bought a preset (i.e. non auto-aperture) 400mm telephoto and used it mounted on a rifle stock, but my efforts were seldom much above mediocre, and bird photography – which requires much time, know how, patience and good equipment – has never been a favourite of mine, except on rare, opportunistic occasions.
After a while I tired of the limitations of the Praktica kit (or were the limitations I tired of my own?) – sold the lot and started a long love affair with the smallest and trendiest SLRs around.
Here is the OM-1 that I bought as a second camera in case my OM-2 expired – but which I enjoyed using more than the OM-2. This is the OM-1 used for most of my Kenya photos, and the one I took on the trek up Mt Kenya. The lens is not the original 50mm: this camera body is heavily infested by mould, and so I bought a cheap, more modern 50mm F1.8 Zuiko just to keep on the front of the camera.
The Olympus OM-1 SLR burst onto the market in 1972 – and instantly made most of the other SLRs of the time look big, cumbersome and rather dated. The OM-1 was small, quiet, tough and lightweight and, a true system camera, it came onto the market along with a wealth of small and really good quality Zuiko lenses and other accessories. The viewfinder was wonderfully big and bright, making focusing very fast and positive and, and – and I wanted one! The unfortunate thing was that, at that time, I was a relatively poor postgraduate student and the OM-1 was financially far beyond my grasp. I bought a cheaper Praktica SLR and some lenses.
However, by the time the OM-2 appeared in 1975, I had a ‘real job’ and more money – and the thought of an automatic (aperture priority) version of the OM-1 was both highly attractive and financially attainable. I bought one. It came with a 50mm F1.4 Zuiko standard lens which I still use, and I also splurged on the first of Olympus’s OM zooms, the 75mm-150mm F4. Both of these lenses are silver noses, i.e. they have the silver coloured front mount ring characteristic of the earliest Zuikos. An excellent and truly diminutive 28mm F3.5 Zuiko was added later, as was a secondhand OM-1, bought as a back up to the OM-2. And, lastly, when a job in Kenya appeared I added a Vivitar 400mm F5.6, to photograph wildlife.
The classic, uncluttered top plate of this OM-1. From left to right: huge, easily grasped rewind knob, with long rewind leaver folded down; simple On/Off meter switch (one of the OM-1’s weak points); screw socket to mount a hotshoe flash; ASA (ISO) dial, which is adjusted by depressing the small button almost directly below the shutter release; shutter release in metal cup which makes for very gentle depressing of the release; sturdy wind on lever; frame counter under protective window. Just above the shutter release is a very small red spot: this spot is on the small switch that is turned to allow rewinding. Note the shutter speed ring concentric with the lens mount: all OM cameras had this.
So when I departed for Kenya in 1977, with me went the OM-1, OM-2, 28mm, 50mm, 75mm-150mm and 400mm, and some other accessories like auto extension tubes and a polarising filter. I should explain that the main reason for my going to Kenya was to see the birdlife of sub Saharan Africa, the Earth’s Afrotropical Region. I was very much a birdwatcher first and a photographer second in those days – but I did very little photography of birds. So, travelling around Kenya, my most prized possession were the pair of Zeiss Dialyt 10x40B binoculars that habitually hung around my neck. The camera gear was not so important and, not wishing to be weighed down with more camera gear than could be carried in my old but prized WWII gas mask bag, I took to carrying just one OM body, and the small 28mm, 50mm and 75mm-150mm Zuikos. The 400mm was just too big to carry around all of the time, and also required a tripod to be of much use with slow slide film, and so only came into play on comparatively few, definitely targeted trips, e.g. early mornings at Lake Nakuru.
Two interesting points about my photography emerged in Kenya. First, although the OM-2 was undeniably the more advanced camera, I felt happier using the purely manual OM-1, and I think that I took most of my better Kenya photos with it. I can’t entirely rationalise this, but the OM-1 just seemed to feed my creativity more, I got into better shooting positions with it. However, as with many OM-1s, the exposure meter switch eventually stopped working and I was pushed onto the less enjoyable but still hugely capable OM-2.
Second, its well known that every photographer has his or her own favourite focal length(s) for lenses – these are the lens or lenses that best replicate how each individual photographer sees the world. Carrying the 28mm, 50mm and 75mm-150mm, the vast majority of my Kenya photos were taken at either 28mm or 150mm – and I often felt that I wanted both of these lenses to be more extreme, i.e. wider than 28mm and longer than 150mm. So, at that time, I could probably have made more productive use of 24mm and 200mm optics but, not being primarily a photographer, I didn’t buy them. I did upgrade to a superb 28mm F2 Zuiko but, by the time I had it, I was heavily involved in work on the Kenya bird atlas and photography – except for snaps of my family – really did take a back seat.
And finally, although my later years in Kenya saw me manoeuvring vehicles full of safari clients into optimum positions to photograph the incredible wildlife, I never carried a camera on those trips because it would have been just one more thing to lose, break or have stolen, and having my own camera would doubtless have led to a nagging, ongoing conflict of interest with my job, i.e. do I set up photographic opportunities for my clients – or for myself?
The Zuiko lenses that I used in Kenya are still in good condition, and I used them in the UK in later years (see below), but both the OM-1 and the OM-2 have succumbed to use in the tropics by growing a lush crop of internal mould. I still keep them on display, for sentimental reasons. Listening to my old OM-1’s shutter fire is magical, its so quiet – and of course that’s just what Olympus’s Chief Designer, Yoshihisa Maitani, had in mind for the OM series – that they would be the japanese equivalents of Leica’s famed M series rangefinders. In fact the very first camera of the OM series was actually called the M-1, until a legal challenge from Leica (based on the M3, M6 and so on names of their world beating rangefinders) forced Olympus to change to the name to the OM-1.
I returned from Kenya to live in England and photography took a backseat for awhile. But in 2003, having really done as much birdwatching as I felt I wanted to do, I began to have ideas about starting up my photography again, and this time I did so with a deep interest in creativity, personal expression and modern art – especially the likes of van Gogh, Toulouse-Lautrec, Picasso, Degas, Monet, Manet, Hopper, Rothko. I began to think about my photography more than I had ever done before.
Top plate of my OM-4Ti, fitted with the 50mm F1.4 Zuiko – this is the silver nose 50mm but the actual silver nose not visible in this picture. Note the spot metering button below the word ‘SPOT’: to take a reading you simply placed the part of the photo to be spot metered inside the microprism circle visible in the viewfinder and pressed this button; up to eight readings could be averaged. For photos with vivid whites, you spot metered the white, and then pressed the “HI.LIGHT” button, to achieve pure whites as opposed to muddy grey ones. Similarly, for photos where pure blacks were required, you spot metered the blacks and pressed the “SHADOW” button.
So, both my OM-1 and OM-2 being unserviceable, I bought a second hand OM-4 and started using my 28mm, 50mm and 75mm-150mm Zuikos again, shooting Fuji Sensia and Provia colour transparencies. At first it was an uphill struggle and progress was slow: my pictures were really uninspired and I felt like I was back with the Kodak ‘Brownie’ again. The OM-4 was a joy to use. It has multiple spotmetering, able to average up to eight spot meter readings, together with the ability to set spot metering to render the brightest tones of a photo white or the darkest tones black. Yes, lightweight, compact, precise, the OM-4 was great – but those three Zuiko lenses just weren’t doing it for me any more.
So cash flowed and more Zuikos appeared – and really the most useful of them all was a 21mm F3.5: extremely compact and with more of the wideangle width that I’d been hankering for. Telephotos of 85mm–250mm and 300mm focal length came and went: they were just too heavy to carry around. And I paid out a lot of money for the rare and fabled 90mm macro Zuiko but also found that lacking and sold it.
For some reason I’d thought that landscapes and other rural subjects were the only genre for me, and while some of these photos were not bad, many were dreadful. But, without making any conscious effort to do so, I’d been seeing visually attractive scenarios in towns and cities for as long back as I can remember – these were mainly patterns resulting from colours, textures, lines, form and so on seen in such things as pavements, cars, shadows, architecture, water and reflections. I’d thought nothing about these, but now started wondering if I might be able to photograph them.
And on 8th September 2003, in the grip of turmoil in my private life, I determined to do something about it, in two ways. First, I decided to walk around central Bristol, photographing anything I thought visually attractive, and especially so if the attraction arose from some kind of abstract design – graphics in the city, something I’d never tried before. Then, second, because I could see that low ISO colour slides were going to be a hindrance to handheld photography – and also that I’d heard that raising the ISO of films could provide attractively larger grain and more intense, even garish, colours, I pushed my Fuji Sensia 400 ISO slides two stops to 1600 ISO.
The wait for the return of these pushed colour transparencies from the processing lab was filled with trepidation – but I was both amazed and pleased to find them really not at all bad. And so a new type of photography, looking for the graphic elements produced by pattern, colour, line, form and texture – what John Shaw (Landscape Photography; 1994) calls “Photo-graphics” – opened new possibilities for me and has been doing so ever since. I’ve since applied this graphic approach to everything else I photograph.
There was a last flowering of my Olympus OM gear around this time. Most of my graphic images were taken with the 21mm Zuiko and the long end of the 75mm-150mm zoom: 21mm and150mm were the focal lengths I “saw” these graphics in – but I still felt a need for wider wideangles and longer telephotos. I later acquired a beautiful 135mm F2.8 Zuiko, and also an OM-4Ti, a more modern version of the OM-4, to accompany the OM-4 I already used.
However, thinking and reading more and more about present day photography, it started to become clear to me that modern SLRs provided options that the Olympus cameras, good as they are, simply couldn’t match, e.g. autofocus both to aid my ageing eyes and to assist composition, dynamic autofocus, simplified access to multiple exposures, Nikon’s 3 dimensional colour matrix metering, the ability to customise your camera to your personal needs via custom functions, and so on.
And gradually, as I read more and became more and more enthusiastic about photography as a means of personal expression, it became apparent that, much as I loved them, my Olympus OM cameras and lenses – all out of production and becoming more liable to breakdown by the day, were not the way forward. I began to look at other camera makes with currently available models. Purchasing of second hand (I mean, pre-owned!) equipment had ceased – I wanted something slap bang up to date.
I wanted an SLR, and the two dominant brands were (and are) Canon and Nikon, and going through specifications and systems I favoured the latter. Thinking of their more moderately priced offerings, I eschewed the tank-like professional Nikon F5 in favour of the smaller and lighter F100 – and was fairly quickly disappointed. Much of this disappointment may well have been due to my own ineptitude, but I also had problems with the F100’s spot meter readings and a Google search shows that I was not the only F100 user encountering this problem. I was downcast – I’d spent a lot of money on this F100 and now it just wasn’t doing the business.
And then, at the very time that development of professional 35mm film cameras was going down the tubes in the face of the rise of digital – at one minute to midnight, you might say – Nikon stunned the world by bringing out a final, high end film camera, the F6. I read and reread the F6’s review in the 4th December 2004 issue of Amateur Photographer, noting things like “bombproof” exposure metering; 100% viewfinder (so useful for shooting slides); exemplary build quality and design reflecting Nikon’s F series experience since 1959; lighter, more capable and far less bulky than the F5 and there was no question – regardless of expense, I had to get one!
The F100 was speedily part exchanged for an F6, and here at last was a camera that didn’t disappoint in the slightest. I used to tell fellow enthusiasts that the F6 was the best thing I’d ever bought, making the point that I wasn’t just talking about the photographic gear that I’d bought, I was talking about the best of any sort of item they’d like to mention! I may not be so OTT now but, still, the F6 is a joy to use, it has never let me down, and it has taken some very solid pictures. There is the very slight possibility that I might part exchange my F6 if Nikon were to bring out something truly extraordinary in the digital camera field – but those thoughts are for later on, after something really completely different: compact film cameras.
Then, having decided to stay with film rather than convert to digital capture, and having obtained the truly superb F6 and a useful collection of lenses to go with it, I went through the phase – well we all do I suppose, don’t we – where I didn’t want to have to carry all of this weighty photographic equipment around all of the time. I wanted to be able to go out for a stroll or to pop into town unencumbered by my formidable array of photographic gear, but to still have a small camera in my pocket … just in case.
And so I researched compact film cameras and bought some – and then even tried going on holiday with only a compact. Did it all work? Was I freed from carting Nikon gear about? Well, partly, but nothing like entirely – and with nothing like the success that I’ve had with my Canon G11 digital “compact” – but more about that later on.
Which film compacts did I try? Quite improbably, The Sun newspaper advertised brand new Olympus mju-ii cameras at only £45 each – an offer too good to miss. A delightful and truly diminutive, semi weatherproof 35mm film camera, with 35mm F2.8 lens, autofocus and a lovely large and clear viewfinder, even for spectacle wearers. It is so small and easy to use that it has sold in millions around the world. I haven’t used it a lot but it does the business and it is truly pocketable.
Then there is the Leica Minilux: built like a tank or, as one magazine (I think AP) put it, the size and shape of a tin of sardines. The Minilux has the famous Leica red spot and oozes class, the 40mm F2.4 Leica Summarit lens is sharp and the inbuilt exposure meter very accurate, easily good enough for colour slides.
And last but not least, the beautiful, classic Ricoh GR1v. Once more, very pocketable and very photographically capable, but I’d bought it to use its manually adjustable ISO settings to push film (i.e. to circumvent automatic ISO setting via the DX bar code), only to find that its top speed is only 1/500th , which is not really fast enough for highly uprated ISOs.
In summary, I found the film compacts enjoyable to use, but only rarely carried one around with me. We were on holiday in St Ives when the Minilux was the only camera with me and, although it did return some good pictures, I wished that I’d taken the F6 and the 24mm-120mm Nikkor zoom instead.
So, film compacts were not really my thing. What next? A very big surprise was just around the corner, and it changed my photography completely.
So, there I was, photographing with the superb Nikon F6, and also tootling around now and again with film compacts and with my Olympus OM-4 gear. Had digital photography not arrived, I would doubtless have stayed with the F6, shooting some black and white, but far more favouring colour transparency films like Fuji Provia 400X (excellent quality, and readily accepting being pushed to 3,200 ISO or more) and Velvia 50. I’ve already mentioned the sad and unfortunate demise of Agfa Scala monochrome reversal film.
and, because of my collection of Nikkor lenses, I was and remain, for better or for worse (actually it has definitely got to be for better), brand loyal to Nikon – whose whole DSLR range used digital sensors smaller than the 35mm format film frame (Nikon’s DX format). My prejudices against digital capture were exacerbated by the thoughts that (a) the focal lengths of all my lenses would be increased by x1.5 on DX camera bodies, while (b) their depths of field would be increased, making the isolation of subjects by selective focus more difficult.
Nikon’s great rival, Canon, had already brought out full (35mm format sized) frame DSLRs, and Nikon users were clamouring for the same. Some professional Nikon users switched to Canon because of the lack of a full frame Nikon DSLR.
Then, late in 2007, Nikon introduced the groundbreaking D3 DSLR, which at last presented Nikon users with a full frame machine that can use the Nikon F mount of the lenses they were using on their film Nikons and, the cruncher really, that boasted totally unheard of picture quality in poor light – up to an astonishing 25,600 ISO. There were tales of professional photographers going back to Nikon, and of the D3’s “filmlike” quality. I read all about the D3 with a kind of awe, while realising that it was still not for me – because it is too big and heavy (it has a built in high speed motor drive) – and also because of the pricetag, which was then not far off £4,000.
So >>> I continued burning film, continuing to marvel at the F6’s capabilities and simply enjoying using it – what a camera!
But then, out of the blue in 2008, the unthinkable happened – Nikon brought out a full frame DSLR, the D700, that equalled the D3’s performance while being decidedly lighter and less bulky (it has no incorporated high speed motor drive) – and £1,000 cheaper. I read the in depth review in Amateur Photographer (23 Aug 2008 issue) and it was a no-brainer. Here was a universally acclaimed camera, that many once more said produced filmlike results, and that would accept all of my Nikon F mount lenses – without any focal length changes.
However, I procrastinated >>> and was appalled when Nikon announced price rises right across their camera range! Panic! – but offering a dealer in Bath an instant sale if he could secure me a D700 at the old price, he rapidly found one in (where else?) Merthyr Tydfil. I remember getting it home, charging the battery and taking a random shot, which instantly appeared in its LCD screen – and I thought “This is the start of something new!”. And it was.
Nikon have been building single lens reflex cameras since the Nikon F, way back in 1959, and they are very good at it. The F6 is a dream with regard to handling and performance, and the D700 is right up there alongside it – in fact I often think of the D700 as the digital equivalent of the F6 – and I know I’m not alone in that view. The F6 is of course a really top notch professional camera and the D700 is not quite that, but for me they are two versions of the same, wonderful thing.
Much has been made of the fact that the D700 has ‘only’ 12 megapixels but I have found this no drawback at all. I only print my pictures up to 9 inches by 6 inches – but even when I crop to just small portions of the images, I cannot detect any significant drop off in quality. And this ‘low’ MP size is more than compensated for by the camera’s abilities in low light – e.g. blasting away at 6,400 ISO across the Christmas dinner table and producing very acceptable results. If I were to design a ‘perfect D700’, I would give it a 100% viewfinder like that on the F6. But the D700’s 95% has caused me no problems – because, unlike when using colour transparencies, any misframing with the D700 can mended digitally, i.e. with a slight crop. I’m concerned about getting dust on the D700’s sensor (more about that later), but the fact is that the restriction of the D700’s viewfinder to 95% field of view was due to the incorporation into the body of a self-cleaning sensor unit – which is not something found on the far more expensive D3.
So, I’m more than happy with the D700. Its hard to imagine a more enjoyable introduction to digital photography. I’m intrigued by the prospect of Nikon updating the D700, I’m looking forward to seeing that camera very much – but should the new model merely feature more megapixels and perhaps very adept movie abilities, I think I may just stay with what I’ve got – we shall see!
I regard the Nikon F6 and D700 as exceptional cameras. But – and there’s always a ‘but’, isn’t there? – the F6 and D700 and their Nikkor lenses are neither the smallest nor the lightest bits of photographic gear around, and there inevitably come times when either I don’t want to carry bulky gear around or I’m simply unable to. It’s the same for every photographer who doesn’t use relatively compact cameras as their primary weapon – however good your main gear, there always comes a time when you need something more pocketable – and your mind turns to more compact and lightweight cameras. I’ve already written about my rather ambivalent dalliance with film compacts.
So, I thought about a good digital compact >>> and criteria instantly arose. I needed a camera to have a viewfinder because I was (and am) simply unwilling to settle for a fixed LCD screen on a camera’s back. Even the rear LCD on my D700 is hard to use in anything like bright light – and there is no way in the world, no way at all, that I am going to be continually restricted to holding a camera out in front of my face in order to take a picture.
Having made this decision, I was depressed to find just how few modern digital compacts do have a viewfinder. And then, out of the very few alternatives, I had a tremendous stroke of luck – even though it was plain that its viewfinder is really not top class, I decided to buy a Canon PowerShot G11 – and became more or less instantly captivated with its fully articulated LCD screen!
The situation has been very straightforward. I have (successfully) used the G11’s viewfinder when my subject is moving too fast for the LCD to catch it. The G11 has a special Quick Shot Mode in which, when you are looking through the viewfinder and have the shutter release partly depressed, the G11 continuously adjusts the focus and exposure of what you are looking at through the viewfinder, so that when you see a picture, quickly depressing the shutter release for the rest of its travel gets you that picture. I was rather surprised when I found that this procedure works, but work it does.
However, the vast majority of my pictures have been taken via the wonderful articulated LCD screen – which can even be turned to face towards the photographer, making self-portraits easy.
So, the G11 – a just about adequate viewfinder, Quick Shot Mode, a fantastic fully articulated LCD – but what else? In section 4 of these screeds I wrote about the Leica Minilux, noting that it is built like a tank, and that Amateur Photographer considered it the size and shape of a tin of sardines. Well, I am sitting here now with the Minilux in one hand and the G11 in the other, and they’re both about the same weight, and there’s not much in it as regards height/width/depth. Which means that the G11 is not the smallest – or even smaller – of the compacts around, but it does have a reassuring weightiness and build quality – it feels like a camera built to last. And when carrying it around, I have never noticed its weight or (relative) bulk in the least.
Furthermore, the G11 has a very useful and instantly available macro mode. I’ve evolved a grip for using the G11 in situations, especially those in close up photography or spatially awkward places, where low shutter speed might lead to camera shake. I always use the G11’s in camera vibration reduction of course, but I find that if I lay the first two fingers of my right hand under the G11’s bottom plate, I can keep my thumb resting on the shutter release, holding it at half depression – and gazing down into LCD I can give the very gentlest squeeze with my thumb to achieve a shake free exposure at the instant that I require it.
I can successfully use the G11 like this, using only my right hand. Another useful grip that I’ve discovered is to have my right hand holding the G11 as described – and with the articulated screen out at 180 degrees to the camera’s body and facing straight upwards. In this configuration, I can use my left hand to firmly take hold of the screen, while looking closely down into it, to see exactly what the camera is seeing. Once again, a very gentle press of my right thumb and the picture is there.
In terms of speed of use, the G11 has very visible and easily adjustable dials on its top plate for exposure mode, ISO speed and exposure compensation – far better than having these important items buried in a menu somewhere – and this makes the G11 very easy and quick to use. I realise that I’m naïve and technologically often behind the times >>> but I still find a tinge of magic in looking at the picture in the articulated LCD screen – and then seeing that screen lighten and darken as I alter the exposure compensation – its so useful to be able to see the picture as its going to be, before taking it!
And, as every photographer knows, when we elect to take to take only a compact out with us, there are times when we wish we had taken our better gear instead. I’ve found this – notably on the Somerset Levels – and wished I’d had the D700 with me. I can only say that the G11 has often done a remarkable job in such situations – which builds up my confidence in it no end. And any worries that I might have had about the smaller sensor size vis a vis the D700 have really not manifested themselves in reality.
I feel extremely lucky to have chosen the G11 – but I’m not going to buy its (already produced) ‘upgrade’, the G12, as I don’t need its extra features. Being a definite Nikon fan, I would have liked a Nikon compact, but from my reading here and there I’m not impressed – and being that their SLRs and DSLRs are so good, I find this situation frustrating. And the fact that Nikon’s recent Coolpix P7000 digital compact is so similar in looks to the G11 and G12 also starts alarm bells ringing in my mind …..
So, here I am, with two very capable digital cameras. Next time >>> how do I use them, what is my take on digital photography, workflow, file types, white balance, software, the whole box of tricks?
I suppose that my first concern about digital photography – and perhaps my foremost concern – is the danger of getting dirt on the camera’s sensor. This concern is most probably fuelled by the high cost of the D700, and the hope that the one I have will last a long time!
The sensor in a film camera is the film, and thus film camera sensors get changed every 36 shots, when a fresh sensor is inserted. So, any dust on a film will only affect that particular film – except of course that dust getting into the camera can have many other serious consequences, far over and beyond making linear scratch marks on the resulting pictures. However, be that as it may, except in dusty / sea spray etc environments, I never have a second thought about changing lenses on my F6 or OM-4 – the ability to change lenses is one of the huge benefits of an SLR.
and to more or less expensive professional cleaning facilities.
The bottom line here – signalling that the problem of dirty sensors is far from resolved – came in an article in Amateur Photographer, I think a year or two back, which ended with the advice that the most important thing that you can do to keep your sensor clean is to be extra careful when changing the lenses of your digital camera outdoors.
lastly the second lens is swiftly attached to the camera, still with the camera body facing down.
This sounds rather an awkward process, but it soon becomes habitual and easy – and, fingers crossed, I’ve had no dust problems to date (my D700 is just over two years old).
BUT, not having had any dust problems may also in part be due to two other factors. First, the D700 has an inbuilt sensor cleaning system which I have to set to activate whenever the camera is switched on or off.
Then second, I often take the D700 out on photographic forays with no other lenses but the one prime or zoom that is attached to it – so that I never have to make any lens changes at all while outdoors. This may seem a little extreme and, after all, what is the point of having an interchangeable lens camera if you don’t change its lenses? Well, yes, but I find that going somewhere with only a single lens is something of a challenge – and also a very worthwhile discipline – because it forces me to look for pictures that can be captured with my single available optic.
It is perhaps a strange thing to say, but the simple fact is that I have been photographing for so long now, and have taken so many photos, that I no longer care whether a photographic trip yields any pictures or not –>>> as its simply a pleasure being out and about with the camera – and having the potential to create photos if I want to. And so I just stroll around – enjoying the moment, enjoying where I am – and if my eyes spot something visually interesting and attractive, I may photograph it.
Perhaps its useful to add here that if I see something with real photographic potential, I often take at least several shots of it, if not far more than several. This is because I’ve found that, in many instances, my initial shot does not end up as the leader of the pack – something taken later on, when the subject has been more thoroughly studied and thought about, turns out to be better.
And having only a camera and one lens means, of course, that my kit is (relatively) lightweight and portable – I’m not weighed down by taking a lens to cover absolutely every photographic opportunity that might conceivably arise.
Sometimes I’ll go out with a favourite lens – a lens that matches how I ‘see’ – like the 70mm-300mm VR Nikkor, but other times I’ll take something quite different – the Sigma 15mm fullframe fisheye for example – just to ‘see what happens visually’.
So, what next? Let’s take a look at hardware and software.
I have only an average, run of the mill PC, purchased from a High Street store. Since I never print any of my own photos (more on that in the next article), this PC is accompanied by a cheap and basic Epson printer. The only item that may be a little up market is my monitor, a 47×30 cm flat screen which is very useful for photographic work.
In terms of digital storage, all of the my photos are on my hard drive. Every two weeks or so, I back them up onto a Transcend 320Gb portable hard drive. Several SanDisk Cruzer MicroSkin memory sticks, up to 8Gb capacity, are used for more frequent backing up of ongoing projects – like this one.
My digital capture is entirely in Raw format, with both the D700 and the G11. The D700 has a SanDisk 8Gb Extreme IV memory card which facilitates shooting extended sequences with the motor drive, on the very rare occasions that I use it. This SanDisk card allows me around 300 Raw photos with the D700 – this figure far exceeds the number of photos I shoot on days out or holidays and so this card is never taken out of the camera. The same is true of the 8Gb SanDisk Ultra card that is in the G11: it never leaves the camera and it can store similarly large numbers of Raw files.
The D700 came with two very useful batches of software. Nikon Transfer efficiently copies pictures from camera to computer, and ViewNX is very useful for organising and viewing pictures. Since I use Nikon gear, I started off digitally manipulating photos with that company’s Capture NX2 image processing software, and have stayed with it. Its not as powerful as Photoshop, but it fulfils my rather limited needs – and I feel very much at home with it.
The G11 was bundled with Canon’s CameraWindow for file transfer from the G11, ZoomBrowser EX for viewing and organising pictures, and Digital Photo Professional for manipulating them. All of these packages work well, but most of my manipulation takes place in Capture NX2 and Silver Efex Pro (see below).
I also have Photoshop Elements 7, which I mainly use as a conduit for two plug-ins. Alien Skin’s Exposure 2 was purchased mainly to nourish my enthusiasm for monochrome photography. However, I tend not to use Exposure 2 much now, having shifted very decidedly to using Nik Software’s Silver Efex Pro which I (and many others) consider essential for mono work. I hear that Nik have released an upgrade. I’ve yet to see it (but definitely want it!) – although there are stories about problems with this upgrade’s first release.
The photographic tool which I’ve been most impressed with recently however – the tool that makes much of this blog possible – is a Plustek OpticFilm 7600i film scanner. Its not for anyone wanting speedy scanning but – far more important to me – it really does the business with both negative and positive film – and it has produced most of the film shots presented in this blog (prior to getting this scanner, I had a few films scanned commercially). I think the Plustek cost just over £200 – and, based on its results, I rate this excellent value. This little machine, for all its strange operating noises and unhurried workflow, is a gem – it makes old photos come alive again, either in their original guise, or in new, digitally manipulated permutations.
What’s coming here next? Finally in my take on digital, its printing and presentation.
In the (good???) ‘old’ days, I shot mostly colour transparencies and presented them – in bright, beautiful and very vibrant colours – in slide shows. Points of interest were pointed out initially with a long stick and later, in a nod to modernisation, with a laser pointer. People came round expecting to see dreary holiday snaps (“and here is another one of us in front of those frightful toilets at Crudwell-On-Sea, but this one’s a bit dark though… don’t know why …”) and got something different. The Nikon F6 is ideal for slides: it has a bright, 100% viewfinder for precise framing, and its superb exposure metering facilities ensure precisely correct exposure – which colour slides demand. The OM-4, especially in view of its advanced multi-spot metering, is also excellent for shooting slides.
The transparency film that I used most was Fuji Provia 400 and then its even better reincarnation, Fuji Provia 400X – a fine grained 400 ISO reversal film with excellent colour rendition – that can readily be pushed to 3200 ISO at least, with good results. I often rated these two Provia films at 500 ISO, to improve colour saturation. When very fine detail was required, especially for macro and similar work that required a tripod, I favoured the 50 ISO version of Fuji Velvia, often rated at 64 ISO to further improve the already excellent colour saturation – and sometimes I pushed this film to 100 ISO, with good results.
And I used Agfa Scala monochrome slides until that truly superb film was discontinued. It was rated at 200 ISO, but could readily be pushed to 1600 ISO. For me, the loss of Agfa Scala has been the saddest result of the digital photography revolution.
I also shot monochrome prints sometimes, using Ilford HP5 and Kodak Tri-X, and sometimes higher speed Ilford offerings. And another film that I really liked but which may by now be discontinued was Fuji Neopan 1600 – just wonderful stuff. Decades ago I printed my own black and white photos in wet darkrooms, but all of my recent monochrome prints were (very well) printed by Karen Willson http://www.karenwillsontraditionalphotoprocessing.co.uk , here in Bristol. I used to take some colour prints too – but the name of the films elude me – which means they can’t have been very special.
That was presentation of film images. Now, onto digital – but how to approach it, what to do?
An immediate and firm decision was that no worthwhile photos were going to be stored only on digital media – which meant that they were going to be printed. This decision to print was arrived at relatively easily. First, I spend my days working with computers in the office, and I am all to conscious of the risks of hardware and software failure. Second, rather than a computer image, I definitely want to “have something in my hand”, a real, tangible photograph, not an electronic one. And I want prints to put into albums (see more on this below), which lend themselves to viewing anywhere, as opposed to being tied to a computer, even if a laptop.
… AND I LANDED ON MY FEET!!! A company in Cheltenham, The Darkroom UK Ltd, had been processing (and often push processing) my colour transparencies for sometime, with faultless results and very quick turnaround, and so I thought to try them with my digital files. Uploading pictures to them over the internet was easy, and our post very soon contained the resulting prints – which were just what I wanted – the photos appeared just as they do on my PC! In particular, black and white is black and white, and not some muddy mixture of dirty white and pale greenish grey. Wonderful! The door to digital printing was open!
The Darkroom is at http://www.the-darkroom.co.uk , and I fully recommend them, both for the quality of their film and digital services, and for their very customer oriented approach – any problem is immediately addressed. If you are like me and know little about modern printing, I recommend Lee Frost’s article Print On Demand in the June 2010 issue of B+W Photography magasine. Lee goes through the basics of commercial digital printing, and assesses the services of eight reputable companies. Lee rates The Darkroom right up there with the best – “…print quality is as good as it gets – images are rendered super-sharp, perfectly neutral and wonderfully crisp.”. This article is worth reading. Back issues of B+W can be obtained from their credit card hotline +44 (0) 1273 488005, or by emailing pubs@thegmcgroup.com, or by sending a cheque to GMC Publications Ltd, FREEPOST BR2265, Lewes, East Sussex BN7 1BR. Last year back issues cost around £5 + 50p postage – check for the current price.
One thing that Lee delves into is the difference between inkjet (aka giclee) prints and C-type prints. Everyone understands the way in which inkjet prints are made – indeed many make their own inkjet prints at home. But C-type prints are less well known I suspect – and quite different. They are generated by substantial and highly expensive machines that produce their images by exposing real photographic paper to digital images via LEDs or CCDs, after which the pictures are developed by the usual wet chemical methods. The disadvantage here is that C-type prints are made with only a small selection of photographic papers – The Darkroom offers gloss, matt or metallic options – but the advantage is excellent image quality, as Lee says “… supposedly much better than anything an inkjet printer can do.”.
All I can say here is that I’ve been ordering C-type prints from The Darkroom for over two years and the quality has been superb – as I said before, what I see on my PC’s monitor is what I get back on the prints.
I standardise on 9×6 inch prints to fit in albums (more on this below), and The Darkroom’s pricing structure soon makes them inexpensive. If you order up to 9 prints (either 9 of the same print or 9 different prints or any mixture of the two), they are a hefty £3.15 each, but if you order anywhere between 10 and 24, they drop to 69p each, and they go on getting cheaper the more you order – until 100+ are 50p each.
So now, in the digital age, how do I share my photos with others? Well, latterly of course, via this blog. Next, digital projectors are available, but I’ve heard that those of any quality are quite pricey – and perhaps not designed for enthusiasts, but more for presentations in the sectors of commerce and business.
For family and good friends I make up collections of The Darkroom’s excellent 9×6 inch prints, mounted in black-leaved photograph albums. These are traditional photograph albums – not the self adhesive or pocket types – and the photos are secured to the pages by Multi-Mount, which is an inexpensive, easy to use, acid free, double sided mounting tape, which I obtain from WH Smith. If you have trouble finding this product, it is made by Aerodex Floyd, Buckingham MK18 1FY.
I’ve used black-leaved albums with page size about 10×11 inches produced by WH Smith – and often available at half price on this firm’s website. I’ve also used a black-leaved album of page size around 11″ square from Harrison Cameras, and this also looks to be a good product – with many more pages than the Smith’s product. However, while they continue to be produced, I’m standardising in the Smith’s version.
Each album page displays a single 9×6” photo and, bottom right, a small, white, handwritten page number. The lists of photos and page numbers in each album are word processed, and these indexes are used in two ways. First, an index in Arial font size 12 is kept loose leaved, and stapled top right. This index is for reading while the photos are actually in view – and many have commented favourably on this – you can read about each photo as you are looking at it. Then a second index at font size 10 is stuck into the end pages of each album – in case the loose leaf version is ever lost.
To me, the giving of albums is a very personal thing – and especially so where an album contains photos of the recipients. In a nutshell, I put a lot of myself – character, visual philosophy, written sections, mindsets, opinions, etc – into these albums and they are a part of me.
As noted above, they are tangible objects, which have weight, three dimensional presence, smell, physical textures >>> and when I die, they will remain as much more personal reminders of how I was than can be formed from the dialling up of a web address to see images and written pieces – held on some unknown server – on a computer monitor.
Having said all of that though, the publishing of photos via this blog provides very substantial satisfaction, and very certainly continues to be a means of significant creative output – I enjoy showing my photos to others worldwide and, in particular, I enjoy writing about these images – and I’m also greatly enjoying meeting like minds from around the globe. I’ve recently added Twitter to these proceedings, in the hope of reaching an even greater global audience.
greatly enjoying firing off my pics around the globe, and meeting like-minded souls.
What comes next here? No idea at all, but I’ll think about it!
I have looked at your web pages many times, probably spent hours doing so. Excellent, but tell me what theme is it run on?
Hello, Mike, very good to hear from you. I’ve been running my blog for 7 years now and, throughout, it has used the Enterprise theme – which must be getting a bit long in the tooth by now, but which I chose, at least in part, because it has a sidebar, which I find a very useful thing. It might be better to have a blog with a black background, but I’m happy enough with Enterprise, and I’m really into unhindered photography and writing which – touch wood!!! – is what this theme facilitates.
Evening Adrian. Well that passed away half an hour reading your article. I wish I could remeber a fraction of what you remember and written down. An interesting read.
Okay, now I see. You’ve been in Kenya before. And I’m sure have a quite a story with you.
Yes, quite a story. I think that my years in Kenya have helped shape who I am, and I am very grateful for them. I have been back in England a long time now, but I don’t think I’ve ever fitted completely back in here.
I see that your Brownie had a ‘Dakon” lens. With an extra i you could’ve had a ‘Daikon’ to munch on if you got hungry from being out and about while taking pictures.
Now that you know what daikon is, you might try adding some to the next green salad you make. Daikon is very large (in fact the word means ‘big radish’ in Japanese) so you get a lot for your money—assuming, of course, that daikon is sold in grocery stores in your area. It’s readily available here in Austin.
Hi Adrian – V much enjoyed your information-packed tale of your photographic upbringing! You’ve reminded me of some things that I’d forgotten about the Olympus OM-1 in particular. I do like your monochromes, esp the more abstract images.
And thanks, glad you like my blog page about my own battle weary OM-1, 38 years young! I’m putting up some favourite shots on my blog page, many from the OM-1, which I hope you’ll enjoy.
Recently, I have been using a pocketable digital compact, the Canon S90…which shares some DNA with your G11.
Have you had much recent success with slide-scanning (to digital files)?
Hello, Owen, glad you enjoyed my photographic history – that all seems a long time ago now! I’ve scanned a lot of my colour slides, and also some mono (Agfa Scala) slides too – I used a plustek OpticFilm 7600i slide scanner, which puffed and chugged away, which was not fast, but which certainly did the job – you can see many of my scanned slides on my blog eg all of the Kenyan ones and some from Bristol and the Somerset Levels. I think this company has more recent scanner offerings now.
This scanner came with software, but I set up standard settings, and then processed the resulting files in Nikon’s Capture NX2, and also Nik Software’s Silver Efex Pro – which I very much recommend.
I tried getting to your blog via your darklanternowen name but your blog could not be found. However when I tried the link you gave, it found it fine. But unless I’m looking in the wrong place, I couldn’t find many images there – could well be my error.
Sorry Adrian, I am scanning & uploading old pics gradually – I’ve put up a couple more nice ones today – http://darklanternforowen.wordpress.com/ Enjoy!
Yes, there is something aniss with my wordpress username link, I will try to sort it.
Great post. I miss my Om-2n, great cameras with fantastic lens. The good ole days.
Thanks, Darrell – and good to see your photos this morning! Yes, the good ole days – I’d never have been able to carry an SLR + 3 lenses around Kenya if the OM gear had been the size of my Nikon gear.
But, as you say on your blog, the advent of digital has brought vastly enhanced flexibility and creative potential >>> its a no brainer! In fact I’ve recently traded in a lot of my OM gear for a Nikon D800 – I’m simply not going to use film cameras any more.
Like you, I hung on with film, certain that it was my medium – but when Nikon brought out the D700, it seemed – and was – so comparable to my Nikon F6, that it changed everything.
Hi Rob, good to hear from you! Yes, I’m a big OM fan, tho I never use the gear now – and I have the 28mm f2 lens, which is simply beautiful.
Hello Adrian – good to see that old Olympus kit – I still use my Om1/2 every week and it’s never let me down yet.
Really like your stuff – good to see it! | 2019-04-19T23:09:04Z | https://eccentric99.wordpress.com/my-photography/ |
Despite the progress achieved in breast cancer screening and therapeutic innovations, the basal-like subtype of breast cancer (BLBC) still represents a particular clinical challenge. In order to make an impact on survival in this type of aggressive breast cancer, new targeted therapeutic agents are urgently needed. Aberrant activation of the Hedgehog (Hh) signalling pathway has been unambiguously tied to cancer development and progression in a variety of solid malignancies, and the recent approval of vismodegib, an orally bioavailable small-molecule inhibitor of Smoothened, validates Hh signalling as a valuable therapeutic target. A number of recent publications have highlighted a role for Hh signalling in breast cancer models and clinical specimens. Interestingly, Hh ligand overexpression is associated with the BLBC phenotype and a poor outcome in terms of metastasis and breast cancer-related death. In this review, we provide a comprehensive overview of the canonical Hh signalling pathway in mammals, highlight its roles in mammary gland development and breast carcinogenesis and discuss its potential therapeutic value in BLBC.
Breast cancer remains the leading cause of cancer-related death among women worldwide and accounts for 23% of all cancers diagnosed in 2008 , totalling approximately 1.4 million cases globally. With a lifetime risk of developing invasive breast cancer of 1 in 8, breast cancer is one of the top three cancers that caused the greatest economic impact worldwide in 2008 . Due to its frequency and cost, breast cancer represents a major public health concern.
Despite progress in early detection and adjuvant therapy, the outlook for women with locally advanced or metastatic disease remains bleak . This may be due to a number of factors, including the molecular heterogeneity of breast tumours, intrinsic tumour resistance to conventional therapy, or inadequate therapy due to borderline pathological features. Extensive research has been carried out to understand breast carcinogenesis, and to develop new-targeted therapeutic agents and biomarkers to improve patient outcomes.
In recent years, the Hedgehog (Hh) signalling pathway has emerged as a critical determinant of cancer initiation, progression and metastasis of an important subset of human cancers [3–5]. Recent studies have underlined an important though less understood function of the Hh pathway in breast cancer malignancy. This review will provide an update on the Hh signalling pathway and its role in the regulation of normal mammary development and the aetiology of breast cancer.
The Hh pathway is an evolutionarily conserved system for regulating patterning and cell fate from Drosophila to humans. Hh proteins are secreted morphogens that play essential roles in regulation of embryogenesis, development, tissue homeostasis, regeneration and stem cell maintenance in a concentration-dependent manner . Genetic or teratogenic disruption of Hh signalling during development in vertebrates results in a characteristic series of anomalies . Perhaps most dramatic of these is holoprosencephaly, a congenital anomaly characterised by a failure of the embryonic forebrain to separate into two chambers. Normally, Hh ligand secreted by the notochord induces the ventral cell fate specification in the entire neural tube. Absence of this signal results in midline fusion of forebrain structures, including the optic vesicles, leading to cyclopia, a signature defect commonly associated with loss of function mutations in the Hh pathway [3, 4]. In addition, aberrant Hh signalling in adults results in carcinogenesis, metastasis and chemoresistance .
Three mammalian Hh ligands have been identified, namely Sonic Hedgehog (SHH), Indian Hedgehog (IHH) and Desert Hedgehog (DHH) . They are synthesised as 45 kDa precursor proteins that are auto-processed into two fragments, an amino-terminal (HhN) and a carboxyterminal (HhC) polypeptide. HhN mediates Hh signalling whereas the function of HhC is still not firmly established . HhN is coupled to a cholesterol moiety at its carboxyl terminus as part of this processing reaction, and then undergoes palmitoylation at its amino terminus, mediated by the Hedgehog acyltransferase (HHAT) . This process of dual lipid modification has important implications in intracellular trafficking, secretion and range of action of the Hh ligand. Subsequent release of Hh requires Dispatched (DISP), a large multipass transmembrane protein that transports the ligand across the plasma membrane .
In vertebrate species, Hh signalling requires an intact microtubule-based organelle named primary cilium. In the absence of ligand binding, the Hh receptor Patched (PTCH) localises at the base of the primary cilium and constitutively inhibits pathway activity (Figure 1A). Binding of the processed and dual lipid-modified Hh ligand to PTCH abolishes the inhibitory effect of PTCH on Smoothened (SMO), the essential positive mediator of the entire pathway (Figure 1B). PTCH is a large 12-pass transmembrane protein of 1,500 amino acids . There are two structurally related PTCH homologs in mammals, named PTCH1 and PTCH2. The amount of SHH available to bind PTCH is tightly regulated by Hh-binding proteins such as Hh-interacting protein (HHIP) and Growth arrest-specific gene (GAS1), which act as negative and positive regulators, respectively (Figure 1A) . In parallel, CDO (Commodo) and BOC (Brother of Commodo) facilitate Hh-binding to PTCH1 in a calciumdependant manner . Glypican-3, a member of the heparan sulfate proteoglycan family, interacts with high affinity to the Hh ligand and has also been implicated in inhibiting the Hh pathway by competing with PTCH for Hh binding . Other proteins such as Megalin, Vitronectin, Perlecan, Scube2 and Shifted have been reported to bind Hh ligand in vertebrates but the nature and consequences of their interaction are not well understood .
Model of the canonical Hedgehog signalling pathway in mammals. (A) In the absence of Hedgehog (Hh) ligand, the receptor Patched (Ptch) inhibits the activation of Smoothened (Smo) by preventing its surface translocation into the cilium. The Glioma-associated (GLI) proteins are phosphorylated and processed to truncated repressor forms. This inactive GLI protein complex functions as a transcriptional repressor of Hh target gene expression. Suppressor of fused (SUFU) inhibits GLI1 and GLI2 from entering the nucleus by sequestering the complex to the microtubules and represses transcription. (B) The binding of Hh ligands to Ptch releases the repression on Smo, leading to the movement of Smo from an intracellular vesicle to the tip of the primary cilium. Activated GLI proteins then translocate to the nucleus and promote the transcription of target genes. To note, Hh ligand binding is regulated by cell surface proteins: Hh-interacting protein (HHIP) and heparan sulfate proteoglycans (HSPGs) compete with the Hh-binding while GAS1 (Growth arrest-specific gene), Cdo (Commodo) and Boc (Brother of Commodo) proteins facilitate Hh-binding to Ptch.
Following binding of Hh ligand, the Hh-PTCH complex is internalised and SMO then moves from intracellular vesicles to the primary cilia, promoting Hh downstream signalling (Figure 1B). SMO is a 7-pass transmembrane-spanning protein with homology to G-protein-coupled receptors . Activated SMO translocates to primary cilia at the cell membrane and in turn decouples Glioma-associated oncoproteins (GLIs) from an inhibitory multi-protein proteolytic complex, leading to stabilisation of full length, transactivating GLI proteins (Figure 1B). The GLI proteins, composed of three family members, GLI1 to GLI3, belong to the Kruppel family of zinc finger transcription factors. GLI1 acts exclusively as a trans criptional activator whereas GLI3 is mainly repressive . GLI2 displays both activating and repressive functions, depending on the cellular context and the level of SMO-regulated proteins . The balance of the activator and repressor functions of these three GLI factors, the so-called 'GLI code', determines the status of the Hh transcriptional program and ultimately the behaviour of the responding cells . Genomic analysis has identified several hundred GLI target genes, many of which can exhibit either a global (multiple Hh-responsive tissues) or a tissue/cell-specific pattern of expression . However, a number of commonly identified targets have been characterised in detail. Apart from GLI, PTCH, and HHIP, the GLI1 and GLI2 proteins activate genes involved in cellular proliferation (CCND1/2, MYCN, SPP1, BMI-1, IGFBP6, FOXM1), survival (BCL2, MDM2), angiogenesis (VEGF, ANGPTL1/2, CYR61) and epithelialmesenchymal transition (BMP1, MUC5AC, SNAI1, JAG2) .
Although Hh signal transduction is dependent on the presence of an intact primary cilium in normal developing cells, the role of cilia in human tumour development and aggressiveness is more complex . By using a transgenic model of ligand-driven Hh pathway activation, García-Zaragoza and collaborators showed that the Hh-responding cells within the epithelial compartment of the mouse mammary gland are ciliated basal cells, which expand in response to the secretion of SHH ligand. In contrast, SHH-expressing luminal cells rarely exhibit an intact primary cilium and therefore do not respond to Hh activation . Other studies in mouse models demonstrated that primary cilia are either required for or inhibit tumour formation, depending on the nature of the oncogenic initiating event [18, 19]. Ciliary ablation strongly inhibited the development of basal cell carcinoma (BCC) and medulloblastoma when these tumours were driven by an activated form of the transmembrane protein SMO. Conversely, removal of cilia accelerated tumourigenesis induced by constitutively active GLI2 [18, 19].
It is important to consider that 'non-canonical' Hh signalling, in which Hh pathway components signal outside of the HH-PTCH1-SMO-GLI paradigm, also occurs and can play important physiological roles, as reviewed by Jenkins . At least three scenarios of noncanonical Hh signalling activation have been observed: 1) Hh signalling through Hh pathway members but independently to GLI-mediated transcription (for example, PTCH1 can act as a dependence-receptor, recruiting a protein complex in the absence of HH that ultimately enhances cell death through a caspase-9-dependent mechanism ); 2) atypical interaction between Hh pathway components; 3) crosstalk between Hh signalling and components of other molecular pathways . Non-canonical signalling has functions in regulating cell motility, cell proliferation via activation of the cell cycle and in activating the programmed cell death . Recent evidence has also defined a contribution of non-canonical Hh signalling in malignancy, and especially in breast cancer metastasis to bone .
Mammary gland development is unique in that it occurs predominantly in the postnatal period. While there are certain differences, mammary development in mice and humans is relatively similar, and the mouse has been extensively used as a model to define the role of Hh signalling in mammary development .
Mammary gland development can be divided into three phases-embryonic, non-parous and pregnant/lactating . Mammary gland development begins with the formation of rudimentary ductal trees that remain quiescent until the onset of puberty. During puberty in the mouse, terminal end buds (TEBs), bulb-shaped structures made up of multiple layers of immature, rapidly dividing epithelial cells, appear at the end of the ductal tree and generate secondary and tertiary branches. Once the ducts invade the mammary fat pads, the TEBs regress and proliferation ceases. Extensive lobuloalveolar development and differentiation occur during pregnancy, followed by milk production and secretion at parturition. Upon weaning, the alveolar epithelium undergoes apoptosis and the mammary gland is remodelled, returning to its mature virgin state .
Components of the Hh pathway have been identified in the mouse mammary gland during the embryonic, nonparous and pregnant phases. Although Shh and Ihh mRNA are detected within the mammary epithelium of mouse embryo, neither is required for bud development . Microarray profiling of the mouse postnatal mammary gland reveals that Dhh is upregulated in TEBs compared to the stroma and ducts whereas Shh and Ihh are not , although the requirement for DHH in this process has not be examined. GLI1 expression is absent from mammary epithelium and mesenchyme. The repressor GLI3 is present in the epithelium and stroma whilst GLI2 is detected only in the stromal component during embryonic and non-parous phases of development [26, 27]. During the pregnancy and lactation state, GLI2 is expressed within both the epithelial and the stromal compartment .
Despite the presence of these components, it appears that active Hh signalling is dispensable for mouse mammary gland morphogenesis both before and after birth. In fact, normal mammary gland development seems to be dependent on Hh pathway repression. Embryos that are null for either Gli1 or Gli2 have no obvious defects in mammary bud formation . In contrast, constitutive activation of GLI1 or lack of functional GLI3 have individually resulted in failure of mammary bud formation in mouse models . Additionally, overexpression of SHH in transgenic mouse embryos results in mammary bud anomalies, including the absence of mammary buds .
In pubertal mice, constitutive activation of SMO or heterozygous loss of PTCH1 results in morphologic TEB abnormalities, which are reminiscent of human ductal hyperplasia [29, 30]. Further studies using phenotypic and transplantation analyses of mice carrying the mesenchymal dysplasia allele of patched 1 (Ptch1(mes)) revealed a failure of gland development, post-pubertal ductal elongation and delayed growth with ductal hyperplasia in these mice [30, 31].
It has been also shown that the transcriptional repressor GLI2 cooperates wiThGLI3 in normal postnatal mouse mammary gland development. This theory is supported by the development of abnormal and distended branching in mice transplanted with Gli2-null glands . GLI1 overexpression in mouse mammary epithelial cells leads to a defect in the complexity of the alveolar network, an inability to lactate and, importantly, the appearance of hyperplastic lesions and tumour development . Finally, ciliary dysfunction in the mammary gland results in abnormal branching morphogenesis along with reduced lobular-alveolar development during pregnancy and lactation . Altogether, these data demonstrate that de-regulation of Hh signalling can perturb mammary development and promote mammary carcinogenesis.
Delineation of the mammary stem cell hierarchy is still a work in progress. Visvader and colleagues and Eaves and colleagues provided the first evidence for a rare multipotent mammary stem cell identified by a combination of cell surface markers (CD24, CD29, CD44, CD49f and EpCAM). Recent genetic lineage-tracing experiments in mice enlighten our understanding of the cellular hierarchy of the mammary gland during development and in adult [36, 37]. By using specific lineage-tracing of the mammary gland in luminal or in myoepithelial cells, Van Keymeulen and collaborators demonstrated the existence of long-lived unipotent basal and luminal stem cells that display extensive renewing capacities during puberty and the cycles of pregnancy and lactation.
Interestingly, these studies have also shed light on the cellular origin of breast cancer, with recent works demonstrating that luminal progenitors, rather than basal cells, can give rise to the basal-like subtype of breast cancer (BLBC) [37–39].
PTCH1, GLI1 and GLI2 genes are expressed in normal human mammary stem/progenitor cells cultured as mammospheres and are down-regulated during differentiation . Activation of Hh signalling using Hh ligand or GLI1/GLI2 overexpression increases mammosphere formation, mammosphere size and multi-lineage progenitors, whereas inhibition of the pathway via cyclopamine results in a reduction of tumourigenic potential . GLI1-induced tumours are histologically heterogeneous and involve the expansion of a population of epithelial cells expressing the putative progenitor cell marker cytokeratin 6 . Hh effects on mammary stem cell self-renewal are associated with activation of the polycomb gene BMI-1 . In parallel, activated human SMO under the mouse mammary tumour virus (MMTV) promoter in transgenic mice also increased the mammosphere-forming efficiency of primary mammary epithelial cells but decreased the frequency of regenerative stem cells in vivo, suggesting that enhanced mammosphere-forming efficiency is attributable to increased survival or activity of division-competent cell types under anchorage-independent growth conditions .
Interestingly, intra-epithelial paracrine Hh signalling has been proposed to regulate the elaboration of the mammary progenitor compartment . Hh ligand exerts a mitogenic effect on mammary stem cells, thereby activating the differentiation of mammary epithelial progenitor cells via differential TP63 promoter selection. Differential TP63 promoter usage underlies the specific expression of IHH ligand, which promotes further a positive feedback elaboration of mammary progenitors . Enhanced Hh activity then plays a role during pregnancy-associated mammary gland expansion. Interestingly, emerging data have suggested that Hh signalling regulates cancer stem cells and could play a crucial role in carcinogenesis [43–46].
Two main mechanisms have been demonstrated for Hh-mediated malignancy. Constitutive Hh signalling activation is due either to mutation of the Hh pathway components (ligand-independent) or through Hh overexpression (ligand-dependent) (Figure 2). GLI gene amplification was first reported in malignant glioma . Subsequently, inactivating mutations in the PTCH1 gene and activating SMO mutations were identified in BCC, medulloblastoma and rhabdomyosarcoma (Figure 2.1) . Other Hh pathway components may also be genetically altered in human cancers, including SUFU, GLI1 and GLI3 . In parallel, an expanding range of ligand-dependent cancers involving Hh overexpression has been identified in the past few years. Different models of Hh ligand-dependent activation have been demonstrated. Tumour cells can produce the Hh ligand and stimulate themselves in an autocrine/juxtacrine manner (Figure 2.2) or induce pathway activity within the neighbouring stromal cells in a paracrine manner (Figure 2.3B). Paracrine Hh signalling is then amplified by the fact that stromal cells secrete additional factors that promote tumourigenesis and survival of the tumour. Hh protein can also be produced by the stroma and stimulate the tumour cells, as demonstrated in multiple myeloma (Figure 2.3A) .
Three basic mechanisms of Hedgehog constitutive activation in cancer. 1. Hedgehog (Hh) ligand-independent signalling observed in basal cell carcinoma, medulloblastoma and rhabdomyosarcoma is caused by inactivating mutations in the Ptch1 gene (red asterisk) or activating Smo mutations (yellow star). It leads to the constitutive activation and transcription of the Hh target genes even in the absence of Hh ligand. 2. Hh ligand-dependent autocrine/juxtacrine activation observed in melanoma and lung cancers is associated with an over-expression of Hh ligand by the neoplastic cells, leading to a cell-autonomous stimulation. 3. Hh ligand-dependent paracrine activation is due to the over-secretion of Hh ligand by the non-malignant stromal (A) or the neoplastic cells (B). In the basal-like subtype of breast cancer, a crucial paracrine mode of canonical Hh signalling has been described by our group: the epithelial tumour cells secrete Hh ligand, leading to Hh pathway activation by the stroma. Stromal cells produce unknown additional growth or survival signals within the microenvironment that promote tumourigenesis (B). GLI, Glioma-associated oncoprotein.
The potential role of Hh signalling in breast cancer is not well defined; however, recent studies have begun to shed light on its potential importance, particularly in aggressive subgroups such as triple-negative disease . Early studies on small numbers of breast cancer samples showed rare mutation events in SHH and PTCH genes [50, 51]. However, subsequent studies evaluating larger cohorts did not reveal any mutations in SHH, PTCH or SMO . More recently, comparative genomic hybridisation analysis identified a frequent loss of PTCH1 locus and amplification of GLI1, independently of the breast tumour subtype [53, 54]. Furthermore, a nonsynonymous mutation in PTCH2 has been described in the primary tumour and brain metastasis of a patient with BLBC . However, a functional importance for any of these identified genetic anomalies requires further investigation in breast cancer.
Evidence for ligand-dependent breast carcinogenesis has been demonstrated by several groups. It was first reported when Kubo and colleagues identified the expression of SHH, PTCH1 and GLI1 in invasive carcinomas but not in normal breast epithelium by immunohistochemistry. These data correlate with findings that our group recently published regarding a cohort of 292 human infiltrating ductal carcinomas . We showed that different subsets of cancers express Hh ligand in the epithelium and/or stroma. Interestingly, we reported that epithelial Hh ligand expression is an early event in mammary carcinogenesis, strongly associated with a basal-like phenotype and poor outcome in terms of metastasis and breast cancer-related death . We further demonstrated that ectopic expression of Hh ligand in a mouse model of BLBC led to the development of rapidly growing, high grade invasive tumours compared to controls .
Little is known about the mechanism underlying the up-regulation of the Hh ligand in solid malignancies, including breast cancer. SHH promoter region hypomethylation is frequently observed in breast carcinomas and is significantly associated with SHH up-regulation [58, 59]. SHH gene transcription may not be solely dependent on promoter demethylation but could also be regulated by transcription factors . A positive correlation between the expression of the transcription factor NF-κB and SHH up-regulation was observed in breast clinical samples . The transcription factors p63 (a homologue of the tumour suppressor protein p53) and Runx2 (a key factor for osteolytic metastasis induced by breast cancer cells) have also been found to regulate the expression of Hh ligands [61, 62].
Several groups have evaluated the clinicopathological significance of Hh signalling in human breast neoplasms. A progressive increase in Hh expression and Hh pathway activation has been observed in lesions with greater cytological and atypical disease: from nonneoplastic masses to ductal carcinoma in situ (DCIS), DCIS with microinvasion, to invasive ductal carcinoma (IDC) [57, 63]. Hh pathway activation also correlates with younger age of diagnosis (<50 years), high proliferating index of Ki67, larger tumour size, invasion, lymph node metastasis, progesterone receptor-negative status and poorer overall survival [57, 63, 64]. Additionally, our laboratory also identified a strong correlation between Hh overexpression and BLBC. No association was found with any other subtype . In parallel, Moraes and collaborators observed a loss of expression of epithelial and stromal PTCH1 in approximately 50% of DCIS and IDC. Methylation of the PTCH promoter was further correlated with low PTCH1 expression in human breast neoplasms . Conversely, SMO, undetectable in the normal tissue, was ectopically expressed in approximately 70% of DCIS and approximately 30% of IDC . Recently, Ramaswamy and colleagues demonstrated that the non-canonical Hh signalling is an alternative growth-promoting mechanism in tamoxifen-resistant breast tumours.
Early studies suggested autocrine/juxtacrine Hh signalling in a variety of cancers, including small cell lung, gastric, colorectal, pancreatic, melanoma and prostate cancers. Significant evidence exists to support an important role for the Hh-GLI1 pathway within neoplastic cells in promoting growth, stem cell self-renewal and metastatic behaviour in advanced cancers [45, 46, 66–68]. For instance, tissue sections of metastatic melanoma showed expression of SHH, PTCH1, and the three transcriptional mediators GLI1-3 specifically in melanocytes . Similarly, GLI1 protein expression has been detected within the epithelial tumour mass of colon cancer both in the primary site and in liver metastases . Interestingly, RNA interference-mediated knockdown of GLI1 or GLI2 in melanoma and colon cell lines or treatment with the SMO antagonist cyclopamine in vitro or as xenografts in vivo strikingly reduced tumour growth [45, 46, 66–68]. Recently, Park and collaborators demonstrated that the Hh signalling acts within an autocrine/juxtacrine loop in small cell lung cancer, autonomously and independently of the lung cellular microenvironment.
However, given that the Hh pathway regulates embryogenesis through stromal-mesenchymal interaction, several recent publications have provided compelling evidence that Hh signalling operates through paracrine signalling between neoplastic cells and the tumour microenvironment in many cancers [69–71]. Yauch and colleagues highlighted the paracrine requirement for Hh signalling in pancreatic primary tumours. Using a specific small molecule SMO antagonist, a neutralising anti-Hh antibody and genetic ablation of SMO in the murine stroma, the investigators made the key observation that the secretion of Hh ligand by epithelial cells does not correlate with the expression of the Hh target genes in the tumour compartment but rather is associated with canonical activity in stromal cells. Co-culture of SHH-producing pancreatic cell lines with fibroblasts stably transfected with a GLI reporter construct results in the induction of GLI reporter activity in the fibroblasts. Surrounding stromal cells in turn may support tumour growth by secreting soluble factors, which remain to be determined. Additional evidence for a paracrine model of Hh signalling in cancer progression has been discussed comprehensively elsewhere [70, 71].
In the context of breast cancer, paracrine Hh signalling appears to be an important mechanism by which Hh supports tumour growth. The epithelial breast tumour cells secrete Hh ligand, leading to Hh pathway activation by the stroma. Among the earliest pieces of evidence was the observation that whole mammary gland transplantation from Ptch1 heterozygous mice into athymic mice with intact PTCH1 maintained their dysplastic phenotype . Conversely, transplantation of epithelium from Ptch1 heterozygous mice into wild-type cleared fat pad recipients resulted in the loss of dysplasia, suggesting a stromal requirement for PTCH1 . Interestingly, similar observations were made with a Gli2-null mouse model, reinforcing the theory of Hh paracrine signalling in breast tumours . Mammary luminal epithelial cells expressing a SMO transgene stimulate specifically the proliferation of surrounding wild-type cells in a short-range paracrine or juxtacrine manner, while the proliferation of SMO-positive cells themselves was not altered . These results correlate with the observation that SMO-positive cells are rarely proliferative in DCIS and IDC samples .
Furthermore, analysis of Hh pathway localisation in primary breast cancers reveals that, in many cases, SHH and DHH ligands are expressed in the neoplastic epithelial cells rather than in stroma. In contrast, the expression of GLI1, GLI2 and SMO transcripts is considerably higher in fibroblasts than in epithelial cells . Patients with evidence of such paracrine signalling have a poor prognosis phenotype . Mouse models of BLBC also provide further evidence for paracrine signalling. The M6 cell line model of BLBC displays exclusively paracrine signalling in response to Hh overexpression in the epithelium . Furthermore, treatment of mice carrying three different primary patient-derived BLBC xenografts with the Hh-neutralising antibody 5E1 led to reductions in GLI1 and PTCH1 expression in the mouse stromal cells but not in the human neoplastic cells (unpublished data) . Other groups have also identified a potentially important role for Hh signalling in breast cancer. Harris and collaborators validated our finding that over-expression of SHH in breast cancer cells promotes aggressive behaviour of xenografts, but in addition demonstrated that SHH through GLI1 upregulates a pro-angiogenic (VEGF-independent) secreted molecule, CYR61. Furthermore, silencing CYR61 in their triple-negative model attenuated the malignant phenotype associated with reduced tumour vasculature and less haematogenous spread . These findings suggest a crucial paracrine mode of canonical Hh signalling in the progression and invasiveness of BLBC, although we cannot exclude autocrine signalling within other subsets of patients or a subpopulation of epithelial cells within cancers such as cancer stem cells.
The epithelial-to-mesenchymal transition (EMT) program is a biological process that allows polarised epithelial cells to become invasive and motile mesenchymal-like cells and has emerged as a topic of intense interest in breast cancer metastasis research . Oncogenic EMT is linked to other pro-metastatic phenotypes, including resistance to chemo-and radiation therapy, self-renewal, evasion of the immune system and anoikis resistance . Repression of E-cadherin expression by the action of several EMT-inducing transcription factors, such as Snail and Slug, is a critical step driving EMT. The expression of Snail correlates inversely with the prognosis of breast cancer patients . The function of the Hh pathway in inducing EMT and invasion of breast cancer has not been well assessed. Ectopic expression of GLI1 induces the nuclear Snail expression and concomitant loss of E-cadherin expression in mouse mammary gland tissue during pregnancy . Moreover, the transcription factor FOXC2 promotes mesenchymal differentiation during EMT via the Hh pathway and Snail up-regulation. FOXC2 is required for the ability of the BLBC subtype to metastasise specifically to the lung .
The Hh signalling pathway is associated with the metastatic process in a variety of solid malignancies [19, 46, 67]. Studies specific to Hh-mediated breast cancer metastasis have focused essentially on skeletal metastases. Complex paracrine signalling mediates osteolysis in the bone matrix, releasing cytokines such as transforming growth factor-β, which acts in a non-canonical manner [22, 79]. GLI2 then induces the secretion of the parathyroid hormone-related protein (PTHrP), perpetuating a cycle of bone resorption and macrometastatic outgrowth [22, 79]. Runx2, a transcription factor highly expressed in bone metastatic breast cancer cells, also mediates PTHrP activation through IHH up-regulation . In parallel, the secretion of Hh ligand by breast tumour cells mediates a crosstalk with the bone environment in a paracrine manner, disrupting the homeostasis between the osteoclasts and osteoblasts [80, 81]. Hh ligand activates the transcription of osteopontin (OPN) by the osteoclasts, promotes osteoclast maturation and resorptive activity, and facilitates osteoblast-enhanced osteolytic metastases [80–82]. Thus, colonisation of the bone metastatic site is facilitated by the cross-activation of the Hh pathway by breast cancer cells.
Despite advances in terms of radio-, chemo-and hormonal therapy, 20 to 30% of patients with early breast cancer will experience loco-regional recurrence with distant metastasis . The BLBC subtype presents a particular clinical challenge. In general, patients with BLBC tend to have a higher rate of distant relapse after diagnosis, a rapid progression from distant recurrence to death, and only an approximately 50% 10-year survival . Much of the remarkable improvement in breast cancer outcome achieved in recent years is attributed to the use of targeted therapies inhibiting the oestrogen receptor (ER; tamoxifen) or HER2 (trastuzumab) in ER+ and HER2+ enriched subtypes, respectively. However, the majority of BLBC cases are negative for ER and HER2 expression and women who present with recurrent BLBC have usually failed standard adjuvant therapy. Thus, BLBC remains a subtype with a poor prognosis for which no targeted agents are clinically approved. In order to make an impact in survival on this type of aggressive breast cancer, there is an urgent need for new targeted therapeutic agents and companion biomarkers that are predictive of response.
The first naturally occurring Hh inhibitor identified was termed cyclopamine. Isolated from the wild corn lily Veratrum californicum, this steroidal alkaloid was discovered through investigations of one-eyed, or cyclopic, lambs whose mothers grazed on corn lily (Table 1; Figure 3). Cyclopamine was the first to be shown to inhibit Hh signalling by binding SMO but did not represent a suitable therapeutic agent due to its poor bioavailability, short half-life, non-specific toxicity and chemical instability . Several Hh inhibitors have been subsequently identified via large-scale chemical library screening approaches. In general, these compounds can be classified as specific inhibitors of Hh ligand, SMO or GLI transcription factors .
CNS, central nervous system; GLI, Glioma-associated oncoprotein; HH, Hedgehog; SMO, Smoothened.
Small-molecule Hedgehog pathway inhibitors and effects on the Hedgehog signalling pathway. Currently, all of the small-molecule Hedgehog (Hh) pathway therapeutics in clinical trial target Smoothened (SMO). Several compounds targeting the Hh pathway either upstream or downstream of SMO are under development and could be an alternative strategy to overcome acquired resistance to Smo-targeting therapies. GLI, Glioma-associated oncoprotein;HHIP, Hh-interacting protein; PTCH, Patched.
All of the small-molecule Hh pathway inhibitors that are currently investigated in phase I to III clinical trials target SMO. They include GDC-0449 (Erivedge/vismodegib), LDE225, IPI-926, BMS-833923, itraconazole, PF-0444913, LEQ506 and TAK-441 (Figure 3; Table 1). All are very well tolerated with few dose-limiting side effects in adults. These inhibitors are in clinical trials either as monotherapy or in combination with other antineoplastic agents in a wide range of malignancies such as BCC, medulloblastoma, sarcoma, small cell lung carcinoma, and ovarian, prostate, pancreas, colon and haematological cancers . Importantly, the small-molecule GDC-0449 (Curis Inc./Genentech) was approved in January 2012 by the United States Food and Drug Administration for the treatment of adults with locally advanced and metastatic BCC . A multicenter phase II study involving 96 BCC patients demonstrated overall response rates of 43% and 30% in patients with locally advanced and metastatic disease, respectively . While the GDC-0449 antagonist has positive effects in BCC, clinical results in Hh ligand-dependent solid tumours have been less encouraging . An additional challenge to the clinical use of Hh pathway antagonists is acquired resistance. For example, treatment of a PTCH1-mutant medulloblastoma patient with the small molecule GDC-0449 resulted in a rapid relapse due to an acquired tumour-specific mutation in SMO and the loss of interaction between the SMO mutant and the drug . In order to overcome acquired resistance to SMO-targeting therapies, the second-generation HhAntag, Compound 5 and itraconazole (Sporanox®, Johnson&Johnson) agents have been developed and are in ongoing clinical trials (Figure 3) [5, 92, 93]. They prevent the Hh-induced accumulation of SMO in the primary cilium (Table 1).
The use of antagonists that target the Hh pathway downstream of SMO, such as GANT58 and GANT61, which blocks GLI transcriptional activity, represent an attractive therapeutic strategy in the context of resistance driven by SMO mutations. In vitro and in vivo studies of a number of malignancies treated with GANT61 have produced promising results . Additionally, four new GLI antagonists have been identified in a large-scale, high-throughput screening by Hyman and collaborators . Interestingly, recent preclinical evidence shows that arsenic trioxide, a drug approved for the treatment of acute promyelocytic leukemia, inhibits the growth of Ewing sarcoma and medulloblastoma cells by targeting GLI proteins [96, 97]. The outcome of clinical trials of these agents are much awaited for the evaluation of GLI inhibitors in the prevention and/or treatment of human malignancies. Inhibitors upstream of SMO include the small molecule robotnikinin and neutralising antibodies, directed against the Hh ligand (Figure 3; Table 1) .
A number of experimental studies suggest that Hh signalling represents a tractable and efficient pharmacological target in BLBC and may further improve the efficacy of chemotherapy and/or radiation treatment, as has been suggested in oesophageal and pancreatic carcinomas . There are already a number of clinical trials employing these strategies, notably in pancreatic and colorectal cancer . Currently, one clinical trial of an Hh inhibitor has been conducted specifically in breast cancer, with GDC-0449 used in combination with a gamma-secretase inhibitor to treat women with advanced breast cancer (NCT01071564), but this trial has been suspended owing to side effects associated with this particular combination therapy. A phase I dose study of oral LDE225 in combination with the phosphatidylinositol-3-kinase inhibitor BKM120 carried out by Novartis (NCT01576666) and a pilot trial of itraconazole pharmacokinetics (NCT00798135) are currently recruiting patients with metastatic breast cancer .
As has been the case with the development of many molecular targeted therapeutics for breast cancer, clinical success is dependent upon careful patient selection and appropriate combination therapy. This is best exemplified by trastuzumab, where development of a companion biomarker allowed clinical trials to find efficacy within the 10 to 15% of women with HER2-overexpressing disease . When considering Hh as a therapeutic target for breast cancer, it is first important to characterise the cellular and molecular nature of the complex paracrine Hh signalling present in breast cancer, especially since the therapeutic target may be SMO expressed by the normal stromal cells rather than the neoplastic cells themselves. Equally important is the development of sensitive biomarkers of Hh pathway activation to identify the subset of cancers likely to respond to Hh-targeted therapeutics. Well-validated predictive biomarkers allow enrichment of the patient population for responders, sparing patients who are unlikely to respond to futile and potentially toxic therapy. Using GLI1 as a biomarker of Hh pathway activity, our own data suggest that approximately two-thirds of BLBC cases demonstrate evidence of paracrine Hh signalling , although such cases with evidence of paracrine signalling were seen across all subtypes of disease. However, GLI1 expression and activity are regulated by other signalling pathways, including Ras and transforming growth factor-β in a SMO-independent fashion , making it an imprecise biomarker of Hh pathway activity.
In this review, we highlighted the current knowledge and recent findings regarding the involvement of the Hh developmental signalling pathway in breast development and carcinogenesis. The majority of evidence suggests that Hh signalling must be suppressed for appropriate mammary development and function. However, a number of clinical and experimental studies demonstrate that the Hh pathway is activated in a proportion of breast cancers and plays a critical role in aggressive breast cancers, including BLBC. Inhibiting this pathway in mouse models of triple-negative breast cancer dramatically decreases tumour growth and metastatic spread.
The microenvironment has long been known to play a key role in breast development and disease . The Hh pathway is emerging as an important paracrine mediator by which cancer cells can remodel their stromal microenvironment. This has important implications for a novel therapeutic approach directed at the non-neoplastic stromal cells in the tumour as a complement to conventional cytotoxics and rationally designed therapies targeting the neoplastic cells. Given the availability of well tolerated agents targeting this pathway, Hh signalling is a tractable and promising therapeutic target to explore in breast cancer. Developments in this area may offer hope to women with poor prognosis breast cancer.
Mun Hui, Aurélie Cazet contributed equally to this work.
We thank Drs Darren Saunders and Andrew Franklin for critical reading of the manuscript. This work was supported by the National Health and Medical Research Council (grant ID APP1050693 and a Fellowship to AS), the Cancer Institute New South Wales (Translational Program Grant 10/TPG/1-04 and Fellowship 10/CRF/1-07 to SAO'T) and the Sydney Breast Cancer Foundation (SAO'T).
AS received research funding and was financially supported to attend an interstate research symposium by Novartis Pharmaceuticals (Basel, Switzerland) in 2012. SAT is a member of Roche Pharmaceuticals (Castle Hill, Australia) molecular pathology advisory board and in 2012 was sponsored to attend a local research symposium by Roche Pharmaceuticals. Neither organization stands to directly gain from the publication of this review nor are they financing this manuscript. All other authors declare no competing interests. | 2019-04-21T04:57:12Z | https://breast-cancer-research.biomedcentral.com/articles/10.1186/bcr3401 |
Why Does a Fox & Jacobs House Look That Way?
Because Fox & Jacobs is smart, that’s why.
Fox & Jacobs sells houses the way Procter and Gamble sells detergent. And as a result, it sells more of them than anybody else.
On a typical Sunday afternoon, from The Colony in the north to The Woods in the south, from Rowlett to Fort Worth, some 1500 people will troop through Flairs, Accents, Todays. In fully furnished model houses, they will admire the Garden Kitchen, the 100-percent nylon short-shag carpet, the oak frame cabinets and polystyrene drawers and one-piece “molded marble” vanity tops.
By the end of the day, a hundred of them will have decided to buy Fox & Jacobs houses.
From its founding in 1947 through the end of last year, Fox & Jacobs sold 24,171 new houses. Twenty-two percent of those sales, 5,236 houses, were made last year – an average of 100 a week.
Last year, in the Dallas area, there were 15,000 new home starts. A third of them were Fox & Jacobs houses. But more than half of the houses started in Dallas last year were priced over $50,000. Fox & Jacobs didn’t build any houses to sell for more than $50,000 last year, so its share of the market it serves is close to 65 percent. There are bigger homebuilding companies, but none of them has a market so thoroughly sewn up as F&J does. U.S. Homes, for example, builds coast to coast, but not in Dallas, largely because F&J is such a formidable competitor.
If that ever happens, it will be because F&J knows how to dominate a market.
“If we built the Taj Mahal and put it on sale for $1500,” Bob Harper says, “some people wouldn’t want to buy it because it was a Fox & Jacobs.” Harper isn’t complaining; he’s commenting realistically about the image Fox & Jacobs has created for itself. General Motors doesn’t try to sell Chevrolets to corporate executives. That’s what it has Cadillacs for. Fox & Jacobs aims its Today and Accent lines at the Chevrolet market: 24 to 35 years old, with a combined family income of $16-20,000. Its secondary market, roughly equivalent to Buick’s, is 35 to 44, with a family income in the $20-25,000 range. For those buyers, F&J builds Flairs and souped-up Accents.
The design of the houses is the product of careful market research. Although much of the research takes place on Sunday afternoons at the model homes – Bob Harper says that after 30 minutes of eavesdropping on people going through a house, he knows whether he has a seller or not – F&J also relies on more sophisticated techniques, such as national opinion surveys conducted by Daniel Yankelovich, Inc., to pry into every aspect of American values that can be reduced to statistical data. Much research specifically tailored to Fox & Jacobs’ needs is administered by the Bloom Agency.
The uniqueness of Fox & Jacobs, according to Bob Bloom, is its commitment to “packaged goods disciplines.” Bloom clients like Pet Incorporated and Anderson Clayton Foods rely on these disciplines, as one might expect of manufacturers of evaporated milk and salad dressing. But for a homebuilder to use them is extraordinary.
Like Chiffon margarine or Pet milk, a Fox & Jacobs house is sold by its brand name. Since for most people Flair is a felt-tip pen, Accent a meat tenderizer, and Today an early morning talk show, the most important brand name is Fox & Jacobs itself. No homebuilder has a stronger name identification. Say “Centennial” to the man on the street and he’ll identify it as a liquor store. Say “Raldon” and he’ll ask you to spell it. But say “Fox & Jacobs” and 82 percent of the people you play this game with will say, “They build houses.” In fact, 52 percent of the people will say “Fox & Jacobs” if you ask them to name someone who builds houses in Dallas.
The corporate identity is visible on everything from billboards to prime-time TV commercials to schoolbook covers imprinted with the company logo, a stylized F and J linked in a shape that suggests a leaf. Other builders christen their subdivisions. But once Timbertree Acres or Thrushcross Grange is sold out, the name disappears and with it the identity of the builder. The F&J lines have a permanent identity: Real estate agents like to use the brand names in their newspaper classifieds whenever a Flair or Accent or Today goes up for resale.
Bloom is currently supervising a “benefits and promises” study to discover how much credibility F&J advertising has, as well as to single out which features of F&J houses are essential and why. Since F&J aims at “the most house for the money,” Bob Harper explains, it has to be conscious of what people really want as opposed to what they’d like to have but are willing to give up. Currently, for the market F&J serves, the good life consists of having two cars, making an annual trip to Aspen or Mazatlan, and keeping up with the Joneses if the Joneses suddenly turn up with a Betamax or a redwood hot tub. So to keep the house payments on a Flair at a level that will allow its customers that little bit of extra cash to put on the Winnebago or the Master Charge bill, F&J chooses not to provide them with built-in microwave ovens or wood shingle roofs.
To figure out what the current essentials are, F&J polls 200 couples in the 24-to-35, $15-to-$25,000 range and asks them why they want certain things. Everyone wants a two-car garage, for example; but do they want it for extra storage, workshop space, or the security of locking up two cars at night? The response, if there is a significant trend in any one direction, could significantly affect the size, shape, and amenities of future F&J garages. Would you rather have a wet bar in the dining room or a half bath for your guests? Built-in bookshelves or a bigger master bedroom? In a Fox & Jacobs house you can’t have it all, and determining that delicate balance of desirable features is not easy.
These “psychographics” enable F&J to pull in its share of the mainstream, middle income, mid-American homebuyer. “Our product,” says Bob Harper, “is the American dream in the suburbs: a little plot of ground, apple pie, kids in school, PTA.” But that dream changes color every few years. The most dramatic change has been in the size of the family (Fox & Jacobs calls it the “buying unit”). The average “buying unit” is now 2.5 people, meaning that more and more buyers in the Fox & Jacobs market have no children.
The F&J customer is not the first by whom the new is tried, though he may be the last to lay the old aside. Still, the company has to monitor changes in taste and style so its model homes can exert their allure. “What you want to do is project warmth, friendliness, and luxury – but not too luxurious – something your prospect can identify with,” Harper says. In the early Seventies, the decor of the model houses was influenced by the “go-go” look of the psychedelic Sixties, Harper says. Rooms were filled with bright oranges, yellows, and greens, “Spanish-style” furniture with baroque curlicues, and lots of chrome and glass. Then came the recession and energy crisis of the mid-Seventies, and people scrambled for security. “Earth tones” – homey beiges and browns – came in, as did front porches, columns, shutters, suggestions of grandmother’s house. Designers had to carve out space for dining rooms.
Now, Harper says, brighter colors are back, and the eclectic look is filtering in. People are buying a look that’s “contemporary but solid” – sloped ceilings with wood beams, paneling that mixes mirrors with rough-textured wood. In short, any look that House and Garden said was new last year, the Fox & Jacobs customer is probably beginning to feel comfortable with now. The conservatism of Fox & Jacobs customers probably also stems from the fact that most of them give “investment” as their major reason for buying a house. Personally, the buyer might want purple carpet and wallpaper with big pink roses, but he’ll choose beige and off-white because he has resale value to contend with.
That broadening of the market is apparently what lies ahead for Fox & Jacobs. Already the company has moved into Houston, where it is building for the same sort of market it serves in Dallas and Fort Worth. And in the imminent East Dallas project, usually called the “in-town” project, the company is seeking a new segment of the market in its hometown.
Fox & Jacobs’ success is usually attributed to the skill and charisma of its president, Dave Fox. “Dave Fox is brilliant,” says Bob Bloom. “He’s gutsy, with a rare combination of shrewdness and intuition. He understands marketing as few people do. There aren’t five home-builders in the United States who have a marketing plan. Dave is very disciplined. He’s an imaginative pragmatist. He’s maybe the most respected man in home-building. They call him ’Mr. Marketing.’ ” But Dave Fox will be the first to admit that the techniques that have made F&J a success were evolved through a process of trial and error. And, for a long time, mostly error.
When World War II ended, Ike Jacobs came home to Dallas with big plans: he was going to make a killing in homebuilding. Not that he knew anything about homebuilding, but with a degree in mechanical engineering from A&M and a more-than-average amount of drive, he was sure he could do it.
Ike was born in Navasota, Texas, in 1919, but he grew up on the streets of South Dallas. His parents, Julius and Sarah Jacobs, ran a small dry-goods store on Second Avenue, a tough neighborhood that was gradually being deserted by the Jewish families that had settled there at the turn of the century.
When the Jacobses opened a second store on Knox Street in 1928 and moved into a house on Abbott, there were some transitional difficulties. For one thing, Ike was a fighter. The principal of Armstrong School made a call on Mrs. Jacobs to remind her that Highland Park children were not used to roughnecks like Ike. She promised to keep him in line. When a class bully finally tested Ike’s patience to the breaking point, she allowed him one fight – off the school grounds. So after school, Ike and his adversary crossed St. John’s, and on the creekbank across from Armstrong they slugged it out with the whole school watching. Ike won, and he never had to fight again.
He remained a mixture of daredevil and stoic. At seven, he was struck by a line drive in a softball game but shrugged off the pain. Three weeks later, when the family doctor came to treat Mrs. Jacobs for the flu, he clapped the boy on the shoulder and was startled by a gasp of pain. Ike’s collarbone had been broken by the softball, but he had concealed the injury.
Reckless, aggressive, and competitive, he would ride his bike on a dare down the steep, chalky Turtle Creek embankment near the Highland Park tennis courts, was the first member of his troop to make Eagle Scout, and as guard on the Highland Park Scots football team played more minutes than any other player. At 133 pounds, he was the lightest member of his team; on defensive plays he would “submarine,” and he was given credit for more tackles than anyone else because he was always on the bottom in the pile-up.
When the Depression hit, the Jacobses closed their Second Avenue store, but they opened it again in 1936 to catch the trade from the crowds visiting the Centennial Exposition at Fair Park. They closed the Knox Street store to devote all their time to selling to tourists. It was a serious mistake, and the Jacobses went bankrupt. Ike graduated from Highland Park in 1937, and worked his way through A&M by waiting on tables. When he graduated in May 1941, he went into the army as a company commander of coast artillery.
Back from the war, he worked for a while as a junior superintendent for a construction firm until his older brother Joe, stationed in Germany with the air corps, decided against a military career and came back to help Ike get a start as a builder.
They began making the rounds of the major banks, all of whom refused to lend to would-be builders with no experience managing money. So they began seeking a backer among old Highland Park contacts; with about $10,000 in savings, they figured they’d need another $10,000 to start building some spec houses. Ike called on his old scoutmaster, George Bird. Bird sent him to talk to a friend, David G. Fox.
David G. Fox Sr. was 54. He had been transferred to Dallas by the American Baking Company in 1937 to be regional manager of the Taystee Bread division. He liked Dallas so much that when the company tried to send him back to Chicago after the war, he took early retirement rather than leave. The home building proposal attracted him – the postwar housing boom, fueled by Veterans Administration guarantees for mortgages, meant windfall profits for builders. He wanted an investment that wouldn’t jeopardize his savings, but he also wanted a potential job for his son, Dave Jr., who had started at A&M, spent the war flying B-29’s in the Pacific, and was finishing up at SMU. Fox agreed to back the Jacobses in their initial effort. He suggested that they build a house, sell it, and present the financial statement to Eugene McElvaney of First National Bank (McElvaney had been Fox’s banker when he was with Taystee Bread) as proof of what they could do.
Ike went to a pre-fab housing company and bought a small house, about 800-850 square feet, paying extra to change the elevation and some of the specifications. He had it hauled to a site north of the Carrollton business district and hired a crew to finish it. One of the plumbers who worked on the house bought it for $6500 – giving them a $1500 profit. They submitted the financial statement to McElvaney, who gave them an $80,000 line to credit.
The first Fox & Jacobs house still stands, at the corner of Donald and Random in Carrollton. It is bright yellow – Ike’s color choice. Always flamboyant, he had to argue down his conservative brother Joe, who wanted it white. The Jacobses built two or three more pre-fabs, then were persuaded by the carpenters who helped erect them that they could do a better job starting from scratch. The few houses they built in Carrollton are just a couple of miles west of where the Fox & Jacobs corporate offices now stand. There were no offices in those days; Ike and Joe operated out of a converted Taystee Bread truck.
Ike then heard about some lots that had been developed just north of Love Field, off Marsh Lane. He bought the land and began building two-bedroom, one-bath brick veneer houses. Joe Jacobs bought the first one for $11,300; the spare bedroom became the Fox & Jacobs office. The phone would ring late every Friday night as wives of construction crew members searched for husbands who had been paid but hadn’t made it home yet.
Mr. Fox maintained more than a financial interest in the project. He spent his weekends showing prospects through the little houses on Eaton and Hawick. Suddenly, at age 56, David Fox Sr. died of a massive heart attack. Dave Jr., who was on the road selling piece goods for a fabrics company, came back to take care of his father’s interest in the fledgling homebuilding company.
Mr. Fox’s management skills had kept Fox & Jacobs on an even keel for two years. Suddenly the firm was in the hands of two novices in the building market, venturing forth when that market was as unpredictable as the weather. They were a complementary pair: the handsome, affable Dave Fox and the aggressive, sometimes abrasive Ike Jacobs.
In the Housing Act of 1943, Congress had provided mortgage insurance for builders of apartment houses for war-industry workers. When the war ended, the program, Section 608 of the Housing Act, was extended to provide housing for veterans. The terms were almost too attractive to builders: The FHA guaranteed 90 percent of the “replacement cost” of the project and would underwrite anything it considered an “acceptable risk.” Builders raked in profits: FHA estimators sometimes approved loans in which the builder was borrowing as much as 30 percent more than the cost of the project. The FHA’s construction standards at the time were low, and its regulations enabled builders to cut corners. Lending amounts, for example, were estimated by room count rather than size.
Like all builders, Ike and Dave were attracted by Section 608. They found some land in northwest Fort Worth and built 342 units there between 1950 and 1952, more than two-thirds of them under Section 608. It was their first big financial success, but it was short-lived. Scandal hit the Section 608 program and Congress canceled it. At the same time, the Korean War created a demand for military base housing. Used to the lax specifications of Section 608, Ike and Dave submitted a low bid on the Red River Arsenal housing project and bought up the contract of some floundering builders who had made the low bid on the Quartermaster Depot in Fort Worth. Unfortunately, they failed to reckon with the Army’s propensity for red tape and found that specifications were so minutely regulated that costs easily got out of hand. They lost their shirts.
At the same time, nervous about the effects of the Korean War on the housing market, they decided to try making a killing in the commodities market, investing their profits from the Section 608 buildings. They were wiped out in a single day.
Just when they needed a break, one came. Bob McLemore, a land developer, offered Ike and Dave some lots off of Fisher Road, just north of Mockingbird Lane. McLemore had named the streets after race tracks: Pimlico, Santa Anita, Hialeah. In 1954, Fox & Jacobs built 40 houses there and sold them all without advertising. Dave Fox himself bought one; just married, he persuaded several of his friends who were also marrying to buy in the neighborhood. The houses had all the latest features: slab foundations, carports instead of garages, central heat – but not central air. Their style was the “California look” of the Fifties – low, slightly peaked roofs and high horizontal windows.
Dave and Ike were beginning to think about more than just building an occasional subdivision. Suppose the way to sell houses was the way General Motors sells cars: Find out who the buyers are and what they want, and then convince them that you’ve got the very thing they need at a price they can afford. Fox & Jacobs’ next subdivision, at Marsh and Walnut Hill, was named Timberbrook, and the streets had cozy names like Rockmoor and Woodleigh. But for the first time the houses had a brand name, too: The advertising agency Ike and Dave worked with dubbed them “New Horizon” homes.
“New Horizon” was more than just a new label on an old product, however. Fox & Jacobs became the first builder in Dallas, perhaps in the country, to build central air conditioning into all the houses in a subdivision. It was a logical step, given the climate and the technology. It also helped that Bob Frymire had been a classmate of Dave’s at A&M and wanted to establish his air conditioning business in Dallas. For the first time, too, Fox & Jacobs used a furnished model home, by working out a promotional deal with Anderson Furniture Company.
“New Horizon” sold well and attracted national attention, mainly because of the air conditioning. So in 1955, Ike, Dave, and Bob Frymire decided to check out the scene in Southern California, the breeding ground of the great American gimmick. They were particularly struck by the builders who sold houses by using fully furnished models – not just tables and chairs and beds and sofas, but ashtrays, stocked bookcases, table settings, flowers and plants, magazines on the coffee tables and toys in the children’s bedroom. They tracked down the designer of the most successful of these, Tony Pereira.
The last thing Pereira wanted to do was talk to three guys from Dallas he’d never heard of, but he finally agreed to meet them. They won him over with their enthusiasm, and he agreed to decorate the model houses in their next development. Pereira’s brother-in-law Don Edlund still decorates Fox & Jacobs display houses, shipping the furnishings, down to the crockery and silverware and books and toys, from California.
The development, featuring houses priced from $20,950 to $24,000, was a smash success.
General Motors became a model for Fox & Jacobs in more than marketing. Ike and Dave decided that manufacturing techniques, rather than construction techniques, were the key to success in mass home-building. They would try to set a building schedule with rigid deadlines for each house, and they would follow an assembly line procedure, adapted from the automobile industry.
Searching for a manufacturing superintendent, Dave and Ike ran a blind ad in the newspaper. The ad was answered by Jesse Harris, then superintendent of the Dallas production unit for Tide detergent. Harris was astonished when he found that the job he had applied for was with a company that built houses. He was more astonished when he found out that they wanted him to apply the manufacturing techniques of Procter and Gamble. Like Pereira and Bloom, Harris found his astonishment giving way to curiosity, then to enthusiasm.
One newcomer who jumped at the chance to join the firm was Jack Franzen, a salesman for Andersen Windowalls. Franzen had been in the building business all his life – even in the military when he worked with the Seabees. Franzen had moved to Dallas from his native Miami because he saw the potential for home-building here. So when Ike and Dave offered him a job as sales manager, he took it.
Franzen had immediate cause to regret his decision.
Julius Jacobs had given his son one piece of advice: “Don’t go across the river.” The city was growing north, he insisted, having failed in his own attempt to build a business in South Dallas.
But when Ike and Dave found some land off of Polk, south of Ledbetter, in Oak Cliff, they decided to go against Father Jacobs’s advice and open Flair South. The hype was intense. They opened the model homes on Easter Sunday, 1957, with red carpets and hostesses in dresses imprinted with the “Flair for Living” logo. Ten thousand people showed up for the opening.
When Jack Franzen started to work for Fox & Jacobs two months later, only one contract had been signed in Flair South. “I had a sick feeling,” Franzen says.
In those two months, the country had gone into a serious recession, Chance-Vought laid off workers, Collins Radio decided to move its corporate headquarters to Richardson, Oak Cliff voted dry, and interest rates jumped from 5 1/2 to 7 percent. And the tornado of ’57 made a direct hit on a Flair South model home.
Franzen had his work cut out for him. By the end of the year, Fox & Jacobs had sold about 50 houses – a fourth of their sales for the previous year.
Nevertheless, Ike and Dave moved ahead with plans to put Fox & Jacobs into year-round production. Up until then, like most builders, F&J would announce a new development in March or April, build the model homes, attract the customers, gear up for building their houses, then crank down again in the fall. In the three- to five-month period of dormancy, construction workers would seek jobs elsewhere. Fox & Jacobs would have to go through the slow and uncertain process of hiring and training entirely new crews each spring. With a year-round schedule, they could keep a steady supply of construction personnel, weeding out the unskilled and unreliable. They set a goal of one house a day, year ’round. And they met it swiftly: In 1959, Fox & Jacobs built 396 houses.
In 1958 they returned in triumph to North Dallas, with the Park Forest development at Marsh and Forest. By the time the development opened, on the first of April, 1958, 100 people held options on houses in Park Forest. F&J attracted customers by building a swimming pool open only to residents of the development. And they tried marketing a “component Flair” – a kind of do-it-yourself design in which the buyer could put together sections of the house – garage plans, bedroom plans, living-dining plans, for greater individuality of design. Unfortunately, the component Flair wasn’t cost-effective, and some of the salesmen, a bit baffled by the jigsaw puzzle approach, approved modifications that made the cost run away.
The top price of the Flairs in Park Forest was $35,000, and Fox & Jacobs began hearing requests for a lower-priced house. They worked up the design and created a new brand name: Accent. The first Accents, at Royal Lane and Channel, were rows of L-shaped houses with the ticky-tacky tract development look Fox & Jacobs self-consciously avoids today. But they were another best-seller: Half of the 500 houses built in the development sold before the model homes opened.
Unfortunately, the first Accents, which sold in the $14,500 to $18,000 range, were underpriced. Fox & Jacobs contracted to build at a fixed price, so any unforeseen increases in the cost of lumber or fixtures or appliances came out of the company’s pocket. The phenomenal demand for Accents, coupled with a sluggish cash flow and poor accounting practices, sent the company into a tailspin.
Dave Fox was beginning to worry about the bottom line, but Ike confidently expected a turnaround. Just keep building at greater and greater volume, he insisted, and we’ll put a lock on the market. So in 1960, F&J announced a classy development in the primest of locations: Royal Lane and Midway Road. The land was the most expensive F&J had ever bought. The development, called Les Jardins, was to be a custom home project in the then-premium price range of $35,000 to $50,000. But the designs Fox & Jacobs showed its prospects were only modifications of the component Flair plans it was building a few miles away in Park Forest and in the Glen Cove development at Midway and Forest. Les Jardins was a flop, eating up the profits F&J made in the early Sixties as it moved into the northern suburbs of Carrollton, Farmers’ Branch, and Richardson.
“Ike Jacobs was a dreamer.” Everyone says that, including Dave Fox, Joe Jacobs, Bob Bloom, Jack Franzen, and F&J’s design supervisor, Wayne Thompson. Thompson says that Jacobs seemed to believe that you could lose a little on every house you build but make up for it with volume. Building schemes of all sorts occurred to him. Once he asked Thompson to look into the possibility of building a high-rise condominium in downtown Dallas. As Jacobs envisioned it, individual units would be constructed on the ground, completely furnished, then hoisted into place by a crane. Something like that technique has since been used – Jacobs wanted to be the first. Another scheme, which went into operation for a while, was to grant franchises for Flairs and Accents to builders in five states. Not content with wanting to be the General Motors of homebuilding, Ike wanted to be the Howard Johnson’s.
“Ike dreamed of bigness,” Bob Bloom says. “Dave dreamed of success.” The dreams are compatible only if you can agree on how to achieve them. Dave and Ike couldn’t.
So in 1961 they agreed to disagree. Dave Fox asked out of the company. Ike agreed to a long-term pay-out.
Ike Jacobs was a driven man, a workaholic whose marriage was foundering. The energy that got him started as an entrepreneur redoubled, however, and he devoted more and more of it to the business as he suffered personal setbacks.
The company didn’t thrive. From a peak year of 566 houses in 1960, sales declined to 479 in 1961, 490 in 1962, 331 in 1963, and 198 in 1964. Even in the midst of these problems, Ike was thinking big, proposing a development in Washington D. C., introducing new brand names, “Forecast” and “Dimension,” that have since disappeared. In the Glen Cove development northwest of Forest and Midway, F&J offered custom designs by big-name designers like William Snaith, of Loewy-Snaith, who created the first new Studebaker after World War II. Like the Studebaker, the house’s design, seen at 3920 Clear Cove, was strikingly ahead of its time. Also like the Studebaker, it was a flop.
In the spring of 1965, Ike came down with colitis. Work came first, and he dragged himself to the office. He refused, too, to postpone a scheduled vacation in Mexico, not the best place for a man with intestinal problems. He came back still sicker, but he continued to push himself. Finally, on a trip to Washington, his drive gave out. He entered a hospital in Dallas for several weeks, was released, then was rushed to Baylor Hospital with peritonitis. He lingered in intensive care for a month. Finally, his heart failed.
Joe Jacobs was left in charge of the firm. Joe had long since ceased to be active in the company, but with a 10 percent interest in the business and control of another 40 percent as executor of Ike’s estate, he had to figure out what to do next. Dave Fox, who had never received a cent of his pay-out, offered to buy Joe out, but Joe held out for a better offer. Finally, Texas Industries, Inc. offered Joe twice what Dave Fox was able to pay.
It was, Joe Jacobs says, a “shotgun wedding” for Dave Fox. He was left with half interest in a company whose other half was owned by a corporation listed on the New York Stock Exchange. He was a private individual having to act as if he were a publicly-owned company.
Texas Industries helped clean up the balance sheet and instill some of the accounting and management discipline the company needed. But while Fox had the security he lacked when he was teamed with Ike, the company wasn’t making the kind of money he wanted it to. Finally, Fox issued an ultimatum to TXI: Either buy him out, or he’d buy them out. TXI responded with an offer he couldn’t accept. So in 1969, Dave Fox took complete control of Fox & Jacobs.
He was broke again, having used up all his capital to buy up TXI’s interest, so he decided to get the company in shape and either go public or find a merger. Fox & Jacobs made an all-out growth spurt building in Grand Prairie and Cedar Hill and Lewisville and Piano and Garland, pushing its bargain-priced “Today” line, which rapidly became the company’s best seller. Advertising stressed the affor-dability of a Fox & Jacobs house and the advantages of buying instead of renting. Sales went up, up, up: 484 in 1968, 780 in 1969, 934 in 1970 – and then doubled in one year, 1905 houses in 1971.
Fox didn’t want to go public. In the great merger times of the early Seventies, he hoped to find his home in a conglomerate. He talked to scores of companies, but nothing acceptable presented itself. Finally, in the fall of 1971, Fox decided to go public and began to woo Wall Street. Having picked a brokerage house, he was on the verge of flying to New York to close the deal when Paul Seegers of Centex Corporation called. How about having a talk with him and Frank Crossen, Seegers said. Fox agreed to have breakfast with the president and chairman of Centex before he left for New York. He came away from the meeting with a merger.
The rest is a success story – steady growth for Fox & Jacobs with only one off-year, the industry-wide building slump of 1974. Even in the midst of that slump, when there was a 25-percent drop in building nationwide, F&J sales declined by only 9 percent and shot up again in 1975 to a mark 24 percent higher than the pre-slump level.
Even during that slump, F&J was digging into new markets, including the one that has been their greatest success – The Colony – and the one that has attracted the most publicity and elicited the greatest skepticism – the “in-town” East Dallas project.
The Colony, the Fox & Jacobs project that grew into a town, sprang up on the blackland prairie on the eastern side of Lake Lewisville in the summer of 1974. Even today, The Colony is miles north of the developments springing up along Preston Road. Hard to believe that 7000 people would choose to live out there, in the middle of nowhere. But they did, many of them employees of Mostek and TI and the other electronics companies that dominate the northern rim of the Standard Metropolitan Statistical Area. Fox & Jacobs provided sewage systems, streets, utilities, and emergency services for the community. It is something of an irony that The Colony grew and prospered while its neighbor, a highly-touted and federally-funded project called Rower Mound New Town, sank into debt and oblivion.
The success of The Colony had another unconventional spin-off. While boning up on solid-waste disposal at a UT-Arlington seminar, an F&J executive working on The Colony project was impressed by one of the speakers, Geoffrey Stanford, a British physician and environmental scientist. Dave Fox called him in for an interview. F&J had just acquired some land in Duncanville with an escarpment that wasn’t suitable for building sites but looked like it had some potential. What could they do with it? Stanford suggested an environmental research station. The idea appealed to Fox, who hired Stanford to create the Greenhills nature preserve, 800 acres where Stanford and his wife now conduct ecological research. F&J obviously hopes it will have practical spin-offs in helping them plan land use in future projects.
Fox was chairman of the Dallas Chamber of Commerce for almost two years. His chairmanship coincided with his high visibility as the man who wants to build single-family housing almost downtown – a step that for 30 years or more no one has dared take. Fox & Jacobs began buying land near downtown in early 1974 – just as it was beginning its most distant suburb in The Colony.
“We had a gut feeling there was a market there,” Fox says. “Just like we had a feeling there was a market in Grand Prairie or Southwest Oak Cliff – nobody was building there when we went into those areas, either.” On the other hand, Grand Prairie and The Colony followed an established pattern of growth in concentric circles outward from the city. Fox says that some unusual factors also helped them decide to return to the inner city: The energy crisis and the success of the Swiss Avenue Historic District, he says, convinced them that people would want housing close to downtown.
At the same time, the Central Business District Association sponsored a survey by Alexander Cooper of New York which indicated that 24 percent of the workers in downtown Dallas were interested in some form of downtown housing. Even as the Cooper Report was being prepared, Fox was asking City Manager George Schra-der about possible city support for a downtown Fox & Jacobs housing project. Schrader was enthusiastic about the city’s largest builder making a move that would perhaps spark a revival in the downtown area, so he went to the city council with an Area Redevelopment Plan that would provide a “buy-back” guarantee from the city – a commitment to any qualified builder who would develop a housing project within a two-mile radius of downtown, that the city would pay him $2.25 a square foot if his project failed. In January 1977, Fox & Jacobs publicly announced its proposal to build 600 houses at a cost of $80 million in the area bounded by Good-Latimer, Ross, Haskell, and Floyd. So far, Fox & Jacobs is the only builder to obtain the buy-back guarantee from the city.
The coincidence of the Cooper Report and Schrader’s ARP proposal caught the imagination of at least the Dallas press, which has editorialized heavily in favor of the East Dallas project. There have been stumbling blocks: Dallas Legal Services flung up a challenge to the legality of the buy-back plan, claiming that it constitutes an urban renewal project and that all urban renewal projects in Texas have to be approved by public vote. Residents being displaced from the area sued the city for relocation funds. The challenges went nowhere in court.
Last January the city council agreed to increase the buy-back amount from $2.25 to $3.25 a square foot, reflecting what Fox said were increases in the cost of land in the area. Only Steve Bartlett, then a newcomer to the council, voted against the proposal; he objected that the plan was retroactive, affecting the land Fox had already obtained, and that the council was not being given enough time to study the effects such a retroactive agreement might have on future land costs in the project. As recently as March, Fox was encountering difficulties with absentee landowners in the area, who were happily sitting on their property waiting for F&J to pay what they were asking.
But last May, Fox announced he was ready to go with the first phase of the project, and in August he made preliminary reports to the plan commission and the city council announcing the “first phase” of the project: 15 acres and 140 houses, with an average selling price of $70,000.
Fox insists that they found the market the moment they made their first announcement in January 1977. Inquiries came flooding in, and the staff kept a record of the people who expressed an interest in the project. Then, last spring, when the time came to decide whether the project was “go” or not, they backtracked and did in-depth interviews with the people on the list. Those interviews formed the substance of Fox’s preliminary presentation to the plan commission and the council in August.
The next step for Fox & Jacobs is approval of specific proposals for street alignments, easements, and utilities. Fox’s proposal to close Hall Street through the development has already encountered opposition from council members John Leedom and Lucy Patterson. Assuming that Fox can cut through red tape, he plans to be “pushing dirt around” by January, to have model houses open by spring, and families moving in by summer.
If there is, nobody’s in a better position to know it than Dave Fox. | 2019-04-20T14:39:35Z | https://www.dmagazine.com/publications/d-magazine/1978/november/why-does-a-fox-jacobs-house-look-that-way/ |
Welcome to Kakitangan.com (the "Web Site") a web site where small businesses can use as an online HR system. The Web Site is owned and operated by Coastal Hectare Sdn Bhd (hereinafter, the "Company"). The Company provides its services to you subject to the following conditions. If you visit, subscribe to, or shop at this Web Site, you accept these conditions. Please read them carefully.
This Web Site is for the use of small businesses and employees of small businesses running an online HR system. You are not permitted to use this Web Site or its contents for any personal commercial gain. The Company reserves the right to prevent any party who engages in such non-permitted use(s) from accessing this Web Site.
Kakitangan.com or Kakitangan is a trademark of the Company. The Company's trademarks may not be used in connection with any product or service that is not the Company's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits the Company. All trademarks not owned by the Company that appear on this Web Site are the property of their respective owners.
We've trademarked Kakitangan.com. Please don't pretend to be us without authorization.
Please do not copy or steal our hardwork.
You authorize and grant Kakitangan.com and the Company the right of processing your data for your usage of the system, include but not limited to reporting and analytics, billing, processing HR procedures, referring new customers and others.
As we limit data access to the internal employees, during support of your usage in Kakitangan.com you may need to furnish some information to ease troubleshooting. The data we asked should be relevant to troubleshoot and fix your issue in using Kakitangan.com. We take mechanism to proper handling your data, such as we’ve trained our support personnel to NEVER ask for your sensitive data such as password.
You will designate and authorize either yourself and/or one or more individual users of the Service with authority to act on your behalf and to bind you and/or your business (each a “Payroll Administrator”), who may access the Service by entering a confidential email and password created by following the instructions provided via the Service and which will entitle them, depending on their designation and permissions given, to have authority to access, review, modify and/or provide approvals on your behalf. The Payroll Administrator will approve and submit the Payroll Information thereby authorizing Kakitangan.com to create and transmit forms and files necessary to process your payroll and statutory body transactions.
You will, and will cause your authorized users to, take reasonable steps to maintain the confidentiality of the authorization procedures and the email/password combination and related instructions provided by Kakitangan.com. If you believe or suspect that any such email/passwords or related instructions have been known or accessed by unauthorized persons, you will immediately notify Kakitangan.com in a manner affording Kakitangan.com a reasonable opportunity to act on the information, and you acknowledge that failure to immediately notify Kakitangan.com could result in unauthorized access to confidential information concerning you and your employees.
Kakitangan.com reserves the right to prevent access to the Service should Kakitangan.com have reason to believe the confidentiality of the security procedure or the confidentiality of the email/passwords have been compromised. You are responsible for any actions taken on the Service by your Payroll Administrator and/or any other authorized users, and for any transactions resulting from your failure to maintain the confidentiality of your account. You agree that the provision of a email/password by you, your Payroll Administrator and/or any other authorized users, will have the same effect as providing a written signature authorizing electronic payments, submissions and other actions on the Service.
Please protect your payroll account too.
Kakitangan.com will notify you via electronic communication or by other means when all data necessary to begin the Service has been received and the onboarding process has been completed. You shall then, prior to submitting your first payroll, review for completeness and accuracy the Payroll Information. For purposes of this Agreement, “Payroll Information” shall mean all information posted for your review on the Service such as, the information used to calculate and pay employee payroll, track your employee’s leave, payments of pcb/epf/socso in compliance with the laws and regulations of such statutory bodies. You must correct incorrect or missing Payroll Information, either by itself or by notifying Kakitangan.com in the manner specified in the electronic communication and within the time period specified therein. You are fully responsible for the accuracy of all information you provide, submit and/or approve, including, without limitation any penalties.
any subsequent request for corrections will be considered special handling and additional fees may be charged.
Final audit responsibility rests with you. Kakitangan.com will not have any responsibility for verifying the accuracy of any data you provide or directly input via the Service or any other method. Kakitangan.com may permit, but shall not be obligated to permit your Payroll Administrator or other a designated representative to communicate with Kakitangan.com by electronic mail or other means about the Service.
You acknowledge that any such electronic mail communication or other means of communication will be made available for your benefit and convenience, that any Payroll Information, Entries or other instructions communicated to Kakitangan.com will be deemed to have been fully authorized by you and you shall be fully responsible for the accuracy of such information including, without limitation, any tax or other penalties; and that, notwithstanding such deemed authorization, Kakitangan.com may in its sole discretion refuse to accept or act upon any such instructions.
Kakitangan.com, its employees and agents will hold in strict confidence all data furnished by you or produced by Kakitangan.com under this Agreement; provided, however, that such parties will not be held liable if such data is released through other sources, or if Kakitangan.com, its employees and agents release the data because of a reasonable belief that you have consented to such disclosure.
Please check, approve and confirm your payroll amount. You shall be fully responsible for the accuracy of the information and submission of data and payment to the statutory organizations.
In order to use the Service, you must submit accurate salary/wage and payroll information to Kakitangan.com during the onboarding process. Kakitangan.com will not be liable for any penalty, interest or other liability that results from inaccurate or incomplete information you supply. The payroll information must be reconciled with your employee’s previous payslips or previous payroll information for the current tax year.
Thereafter, you shall timely and accurately update all wage and payroll information as necessary to reflect changes with additional information requested from time to time by Kakitangan.com. It is your responsibility to submit complete and accurate information to Kakitangan.com and to remit the fees due in connection with the Service. Any penalty incurred due to late remission of payment or inaccurate information provided by you will be your sole responsibility.
You further agree to hold Kakitangan.com harmless from such liability. Kakitangan.com, at its option, may decide not to submit your payroll monthly or yearly forms, make payments to the various statutory bodies, or otherwise process your payroll if there are any unresolved problems with any information requested by Kakitangan.com or submitted by you.
cancelling any prior payroll service.
You're liable on the numbers you checked and confirmed, and your submission of data and payment to the statutory organizations. Kakitangan.com provides you a tool to help your process, but cannot be liable to any mistake made in the payroll.
In order to use and/or access certain Kakitangan.com Services, you may direct Kakitangan.com to retrieve and manage your own information maintained online by third-party institution such as payroll companies or health insurance companies -- with which you have customer relationships, maintain accounts or engage in financial transactions (“Account Information”). We will then connect directly with your online service providers to access this Account Information. At your direction, we may also open accounts on your behalf at third-party institutions and make changes on your behalf with third party sites and services.
By submitting information, data, passwords, usernames, PINs, other log-in information, materials and other content through the Kakitangan.com Service, you are licensing that content to us solely for the purpose of providing the Kakitangan.com Service. We may use and store the content, but only to provide the Kakitangan.com Service to you. By submitting this content to us, you represent that you are entitled to submit it to us for use for this purpose, without any obligation by us to pay any fees or other limitations.
Although Kakitangan.com monitors the information on the Site, some of the information is supplied by independent third parties. While Kakitangan.com makes every effort to insure the accuracy of all information on the Site, Kakitangan.com makes no warranty as to the accuracy of any such information.
This Privacy Notice explains how Kakitangan.com (owned by Coastal Hectare Sdn Bhd) handles the personal information you provide to us on websites controlled by Coastal Hectare Sdn Bhd.
This website takes every precaution to protect our users' personal information. When users submit sensitive information via the website, your information is protected both online and offline.
While we use SSL encryption to protect sensitive information online, we also do everything in our power to protect user information offline. All of our users' information, not just the sensitive information mentioned above, is restricted in our offices. Only employees who need the information to perform a specific function - such as customer support - are granted access to personal information.
All employees are kept up-to-date on our security and privacy practices. Every year, as well as any time new policies are added, our employees are notified and/or reminded about the importance we place on privacy, and what they can do to ensure our customers' information is protected. Finally, the servers that we use to store personally identifiable information on are kept in a secure environment.
Finally, the security access from your company – as employee you can only access your own data; as a manager you can access limited data of your employee and as HR personnel you are the data controller of your company: you can access the data you input on behalf of your employee into Kakitangan.com.
The database of every company is created separately, no users can access to the data of other companies.
If you have any questions about the security of our website, you can send an email to support@kakitangan.com.
In short, we believe it's more secure than offline document handling, in paper or digital.
Personal information includes information that could be used to identify you and which is submitted via the Kakitangan.com website. This may include your name, your phone number, your e-mail address, your company name and your date of joining. All Personal Information are processed on our behalf by our related/affiliate companies as well as external service providers, where necessary.
To continuously improve Kakitangan.com’s products and services offered to you.
Kakitangan.com may also collect information about your visit to its website without you actively submitting any information through various channels such as cookies. The collection of information through cookies may optimize your experience of the Kakitangan.com website and help Coastal Hectare Sdn Bhd collect statistics and analyse trends that will help it to continue improving the website in future.
We use the data to improve our system design and service offered to you. We do not sell your data.
To generally protect the rights and property of Kakitangan.com and to ensure the technical competence and functioning of our systems.
The data is hosted at world class engineering cloud. Only upon your instruction of getting service (e.g. insurance) from third party vendor, we will send needed data to them. This is similar to any insurance agent or broker.
If a user's personally identifiable information changes such as the email address, we provide a way to correct, update or remove personal data that is provided to us. This can be done at the Employee Profile section of the website or via email to support@kakitangan.com. A user's personal information can also be updated based upon data provided to Kakitangan.com from their employer.
You may update your data, as legally required.
You may choose whether or not to provide your Personal Information to us. If you choose not to do so, you may not be able to take advantage of certain services that depend on Personal Information, such as the leave application system, or the benefits (e.g. insurance) provided to you by your employer.
If insurance vendor doesn't get your data they cannot sell you the insurance service.
This website may contain links to other sites. Please be advised that Kakitangan.com is not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every website that collects personally identifiable information. This privacy statement applies solely to information collected by this website.
The service from other website has their policies and it is not ours.
If you’re still actively using Kakitangan.com, the data shall be kept at a minimum of 7 years according to the law.
If you’re not using Kakitangan.com anymore and requests us to remove the data totally, we will clean it and not keeping a copy of your data in Kakitangan.com.
We shall take reasonable steps to ensure that the personal data collected is accurate, complete, not misleading and kept up-to-date.
By accessing, using or continuing to access or use our websites, you are indicating your acceptance to be bound by the terms and conditions of this Policy and consent to us processing your personal data in accordance with the terms and conditions of this Policy. If you do not accept the terms and conditions stated herein or disagree with the way we collect and process your personal data, please do not use or access our websites. We reserve the right at our sole discretion at any time to immediately suspend and/or terminate the use of our websites by any person in the event such person refuses to grant or withdraws his consent for us to process his personal data.
Selamat datang ke Kakitangan.com (“Laman Web”) sebuah laman web yang membolehkan perniagaan kecil-kecilan menjalankan pengurusan sistem sumber manusia dalam talian. Laman Web ini dimiliki dan dikendalikan oleh Coastal Hectare Sdn Bhd (selepas ini, “Syarikat”). Perkhidmatan yang disediakan oleh Syarikat kepada anda adalah tertakluk kepada syarat-syarat berikut. Sekiranya anda melayar, melanggan atau membeli-belah di Laman Web ini, anda dikehendaki menerima syarat-syarat ini. Sila baca dengan teliti.
Produk-produk yang dinyatakan di dalam Laman Web ini adalah hanya untuk orang awam di Malaysia dan di bidang kuasa di mana produk-produk dan perkhidmatan-perkhidmatan ini boleh dijual secara sah. Tiada apa-apa dalam Laman Web ini boleh dianggap sebagai permintaan untuk membeli atau sebagai tawaran untuk menjual mana-mana produk-produk atau perkhidmatan-perkhidmatan kepada sesiapa di mana-mana bidang kuasa di mana tawaran, permintaan, pembelian atau penjualan tersebut adalah menyalahi undang-undang.
Laman Web ini adalah untuk kegunaan perniagaan kecil-kecilan dan kakitangan-kakitangan perniagaan kecil-kecilan tersebut untuk menjalankan pengurusan sistem sumber manusia dalam talian. Anda tidak dibenarkan untuk menggunakan Laman Web ini atau kandungannya untuk sebarang keuntungan komersial. Syarikat ini mempunyai hak untuk menghalang mana-mana pihak yang terlibat dalam penggunaan yang tidak dibenarkan daripada mengakses Laman Web ini.
Kakitangan.com atau Kakitangan adalah tanda dagangan Syarikat ini. Tanda dagangan Syarikat tidak boleh digunakan untuk berkaitan dengan mana-mana produk-produk atau perkhidmatan-perkhidmatan yang tidak berada di dalam lingkungan milik Syarikat, dalam apa-apa cara yang mungkin menyebabkan kekeliruan di kalangan pelanggan, atau dalam apa-apa cara yang memperkecilkan atau mencemarkan nama baik Syarikat. Semua tanda dagangan yang tidak dimiliki oleh Syarikat yang muncul di Laman Web ini adalah hak milik pemilik masing-masing.
Kesemua kandungan yang berada di laman web ini, seperti teks, gambar-gambar grafik, logo-logo, butang-butang ikon, imej-imej, klip-klip audio, muat turun digital, penyusunan data, dan perisian komputer, adalah hak milik Syarikat atau pembekal-pembekal kandungannya dan adalah dilindungi oleh undang-undang hak cipta Malaysia dan badan antarabangsa. Penyusunan semua kandungan pada laman web ini adalah hak milik eksklusif Syarikat dan dilindungi oleh undang-undang hak cipta Malaysia dan badan antarabangsa. Kesemua perisian komputer yang digunakan di laman web ini adalah hak milik Syarikat atau pembekal-pembekal perisiannya dan dilindungi oleh undang-undang hak cipta Malaysia dan badan antarabangsa.
Sekiranya anda menggunakan Laman Web ini, anda bertanggungjawab untuk mengekalkan kesulitan akaun anda dan kata laluan anda dan untuk menyekat akses ke komputer anda, dan anda bersetuju untuk menerima tanggungjawab untuk semua aktiviti yang berlaku di bawah akaun atau kata laluan anda. Di samping itu, dengan menggunakan Laman Web ini, anda menjamin bahawa anda berumur sekurang-kurangnya 18 tahun dan mempunyai hak undang-undang untuk menggunakan Laman Web ini. Syarikat tidak akan menjual perkhidmatan-perkhimatan kepada pengguna-pengguna yang berada di bawah umur yang ditetapkan, kerana ia hanya untuk pengguna-pengguna yang mengikuti keperluan umur. Sekiranya anda membeli perkhidmatan Syarikat bagi pihak seseorang yang bawah umur, anda dikehendaki bersetuju untuk menyelia semua penggunaan Laman Web ini oleh pengguna bawah umur tersebut di bawah nama atau akaun anda. Syarikat mempunyai hak untuk menolak perkhidmatan, menghentikan akaun akaun atau menghapuskan akaun atau mengubah kandungan mengikut budi bicara mutlaknya.
Anda memberi keizinan dan kebenaran kepada Kakitangan.com dan Syarikat hak untuk memproses data anda untuk penggunaan anda dalam sistem, termasuk tetapi tidak terhad kepada laporan dan analisis, bil, prosedur pemprosesan sumber manusia, merujuk pelanggan-pelanggan baru dan lain-lain.
Anda mungkin perlu mengemukakan beberapa maklumat yang boleh meringankan penyelesaian masalah kami oleh kerana kakitangan kami mempunyai akses yang terhad semasa menyokong penggunaan anda dalam Kakitangan.com. Data yang kami perlukan haruslah berkaitan dengan penyelesaian masalah dan untuk menyelesaikan masalah yang anda hadapi ketika menggunakan Kakitangan.com. Kami mengambil langkah-langkah yang baik dan betul untuk mengendalikan data anda, seperti melatih kakitangan-kakitangan kami untuk TIDAK meminta data sensitif seperti kata laluan anda.
Anda akan menetapkan serta memberi hak sama ada kepada diri sendiri dan/atau kepada seorang individu lain, sebagai pengguna servis dengan kebenaran untuk melakukan tindakan bagi pihak anda dan untuk berkait dengan anda dan/atau syarikat anda (setiap “Pentadbir Gaji”/”Payroll Administrator”), yang boleh akses servis ini dengan memasukkan email dan kata laluan sulit yang dicipta dengan mengikuti langkah-langkah yang disediakan oleh servis ini dan akan memberi hak kepada individu ini, bergantung kepada jawatan dan kebenaran yang diberi, untuk mempunyai hak untuk akses, mengulas, membaik pulih dan/atau memberi kelulusan bagi pihak anda. Pentadbir Gaji akan meluluskan dan menghantar maklumat gaji, dengan itu membenarkan Kakitangan.com untuk mencipta dan menghantar boring dan fail yang diperlukan untuk memproses gaji dan transaksi badan berkanun.
Anda akan, dan akan memastikan pengguna yang diberi kebenaran, untuk mengambil langkah berpatutan untuk menjaga maklumat sulit mengenai prosedur kebenaran serta kombinasi email/kata laluan dan arahan yang berkaitan yang disediakan oleh Kakitangan.com. Jika anda yakin atau mengesyaki email/kata laluan atau arahan berkenaan telah diketahui atau diakses oleh individu yang tidak mempunyai kebenaran, anda akan dengan serta-merta memberitahu Kakitangan.com dengan cara Kakitangan.com dapat bertindak ke atas maklumat itu, dan anda mengakui bahawa kegagalan untuk memberitahu Kakitangan.com dengan serta-merta boleh menyebabkan individu yang tidak mempunyai kebenaran untuk mengakses maklumat sulit mengenai anda dan pekerja anda.
Kakitangan.com berhak untuk menghalang akses ke dalam servis jika Kakitangan.com percaya bahawa privasi prosedur keselamatan atau privasi email/kata laluan telah dikompromi. Anda bertanggungjawab untuk semua tindakan yang dilakukan di dalam servis oleh Pentadbir Gaji dan/atau mana-mana pengguna yang diberi kebenaran, dan untuk apa-apa transaksi yang disebabkan oleh kegagalan untuk mengekalkan privasi akaun anda. Anda setuju bahawa peruntukan email/kata laluan oleh anda, Pentadbir Gaji dan/atau pengguna lain yang diberi kebenaran, akan memberi kesan yang sama seperti memberi tandatangan bertulis untuk bayaran elektronik, penyerahan, dan tindakan lain di dalam servis.
Kakitangan.com akan memberitahu anda melalui komunikasi elektronik atau dalam erti kata lain apabila semua data yang diperlukan untuk memulakan servis telah diterima dan proses memuat naik data telah selesai. Anda hendaklah kemudiannya, sebelum menghantar gaji pertama anda, memastikan data sudah lengkap dan ketepatan maklumat gaji. Untuk tujuan perjanjian ini, “Maklumat Gaji” patut bermaksud semua maklumat yang dimuat naik untuk ulasan anda di dalam servis seperti, maklumat yang digunakan untuk mengira dan membayar gaji pekerja, mengawal cuti pekerja, pembayaran pcb/epf/socso seperti yang dikehendaki oleh undang-undang dan peraturan semua badan berkanun ini. Anda mesti membetulkan maklumat gaji yang salah atau yang hilang, sama ada dengan sendiri atau dengan memberitahu Kakitangan.com dengan cara yang dinyatakan dalam komunikasi elektronik dan dalam jangka masa yang dinyatakan. Anda bertanggungjawab sepenuhnya ke atas ketepatan semua maklumat yang anda berikan, hantar dan/atau luluskan, termasuk, tanpa had apa-apa penalti.
sebarang permintaan berikutnya mengenai pembetulan akan dianggap pengendalian khas dan yuran tambahan mungkin dikenakan.
Audit terakhir terletak pada anda. Kakitangan.com tidak bertanggungjawab untuk mengesahkan ketepatan data anda sediakan atau yang anda muat naik terus melalui servis atau kaedah lain. Kakitangan.com boleh membenarkan, tetapi tidak patut diwajibkan untuk membenarkan Pentadbir Gaji atau wakil lain yang ditetapkan untuk berhubung dengan Kakitangan.com melalui mel elektronic atau kaedah lain mengenai servis.
Anda bersetuju bahawa sebarang komunikasi mel elektronik atau kaedah komunikasi lain akan disediakan untuk manfaat dan kemudahan anda, bahawa sebarang Maklumat Gaji, kemasukan atau arahan lain yang disampaikan kepada Kakitangan.com akan dianggap telah diberi kebenaran sepenuhnya oleh anda dan anda patut bertanggungjawab sepenuhnya ke atas ketepatan maklumat itu, termasuk, tanpa had, sebarang cukai atau penalti lain; dan itu, walaupun dengan kebenaran ini, Kakitangan.com boleh memutuskan untuk menerima, menolak, atau bertindak ke atas sebarang arahan.
Kakitangan.com, pekerjanya dan agen akan merahsiakan dengan baik semua data yang diberikan oleh anda atau dikeluarkan oleh Kakitangan.com di bawah perjanjian ini; dengan syarat, mana-mana pihak tidak akan bertanggungjawab jika maklumat disebarkan melalui sumber lain, atau jika Kakitangan.com, pekerjanya dan agen menyebarkan maklumat disebabkan kepercayaan yang munasabah bahawa anda telah membenarkan pendedahan berkenaan.
Untuk menggunakan dan / atau mengakses perkhidmatan Kakitangan.com yang tertentu, anda boleh mengarahkan Kakitangan.com untuk mendapatkan dan menguruskan maklumat anda yang dikekalkan oleh institusi pihak ketiga seperti syarikat gaji atau syarikat-syarikat insurans kesihatan – di mana anda mempunyai hubungan pelanggan, mengekalkan akaun atau terlibat dalam urus niaga kewangan (“Maklumat Akaun”). Kami akan berhubung dengan pembekal-pembekal perkhidmatan dalam talian tersebut untuk mengakses Maklumat Akaun ini. Mengikut arahan anda, kami mungkin juga akan membuka akaun bagi pihak anda di institusi pihak ketiga dan membuat perubahan kepada maklumat anda bagi pihak anda dengan laman-laman dan perkhidmatan-perkhidmatan pihak ketiga.
Apabila mengimport maklumat anda daripada institusi pihak ketiga, kami tidak akan membuat sebarang usaha untuk mengkaji semula Maklumat Akaun untuk sebarang tujuan, termasuk tetapi tidak terhad kepada ketepatan, kesahan atau bukan pelanggaran. Kami tidak akan bertanggungjawab untuk produk-produk dan perkhidmatan-perkhidmatan yang ditawarkan oleh laman-laman web pihak ketiga.
Dengan menyerahkan maklumat, data, kata laluan, nama pengguna, PIN, maklumat log masuk, bahan-bahan dan kandungan-kandungan yang lain melalui Perkhidmatan Kakitangan.com, anda bersetuju untuk mengemukakan kandungan tersebut kepada kami semata-mata untuk tujuan Perkhidmatan Kakitangan.com. Kami boleh menggunakan dan menyimpan kandungan tersebut, tetapi hanya untuk menyediakan Perkhidmatan Kakitangan.com kepada anda. Dengan menyerahkan kandungan ini kepada kami, anda menyatakan bahawa anda berhak untuk mengemukakan kandungan ini kepada kami untuk digunakan bagi tujuan tersebut, tanpa sebarang obligasi oleh kami untuk membuat sebarang bayaran atau untuk batasan-batasan yang lain.
Walaupun Kakitangan.com memantau maklumat di Laman Web ini, sesetengah maklumat yang berada di Laman Web ini adalah maklumat yang dibekalkan oleh pihak ketiga. Walaupun Kakitangan.com berusaha untuk memastikan ketepatan semua maklumat di Laman Web ini, Kakitangan.com tidak membuat sebarang jaminan terhadap ketepatan maklumat-maklumat tersebut.
Laman web ini disediakan oleh syarikat ini berdasarkan pada asas “sebagaimana adanya” dan “yang tersedia ada”. Syarikat ini tidak membuat sebarang perwakilan atau sebarang bentuk jaminan, tersurat atau tersirat, untuk operasi laman web ini atau maklumat-maklumat, kandungan-kandungan, bahan-bahan, atau produk-produk yang termasuk di laman web ini. Dengan menggunakan laman web ini, anda dengan jelas bersetuju bahawa anda melakukannya atas risiko anda sendiri. Sebarang pautan ke laman-laman web yang lain dan kandungan-kandungan pautan adalah disediakan untuk pertimbangan anda dan ianya bukan untuk tujuan atau sokongan daripada syarikat ini. Mengikut perundangan yang berpatutan, syarikat menafikan semua jaminan, tersurat atau tersirat, termasuk, tetapi tidak terhad kepada, jaminan tersirat kebolehdagangan dan kesesuaian untuk tujuan tertentu.
Syarikat tidak akan menjamin bahawa laman web ini, komputer pelayan yang digunakan, atau e- mel yang dihantar dari syarikat ini adalah bebas dari virus atau komponen berbahaya yang lain. Syarikat tidak akan bertanggungjawab ke atas sebarang kerosakan dalam apa jua bentuk yang timbul daripada penggunaan laman web ini, termasuk, tetapi tidak terhad kepada secara langsung, secara tidak langsung, secara bersampingan, secara punitif, dan ganti rugi berbangkit, walaupun syarikat menyedari kewujudan kemungkinan ganti rugi tersebut.
Dengan melawati Laman Web ini, anda bersetuju dengan mematuhi segala peruntukan undang-undang Malaysia, tanpa mengambil kira prinsip konflik undang-undang, yang semata-mata mengawal terma Undang-undang dan Pelesenan dan pertikaian yang mungkin timbul antara anda dan Syarikat.
Notis Privasi ini menerangkan bagaimana Kakitangan.com (dimiliki oleh Coastal Hectare Sdn Bhd) mengendalikan maklumat peribadi yang anda kemukakan kepada kami di laman-laman web yang dikawal oleh Coastal Hectare Sdn Bhd.
Laman web ini mengambil langkah berjaga-jaga untuk melindungi maklumat peribadi pengguna kami. Apabila pengguna mengemukakan maklumat sensitif melalui laman web ini, maklumat anda akan dilindungi di dalam talian dan juga di luar talian.
Disamping menggunakan penyulitan Lapisan Soket Selamat (SSL) untuk melindungi maklumat sensitif dalam talian, kami juga mengambil semua langkah munasabah mengikut keupayaan kami untuk melindungi maklumat pengguna di luar talian. Kesemua maklumat pengguna kami, bukan hanya maklumat sensitif yang dinyatakan di atas, adalah terhad dengan mempunyai akses hanya di pejabat-pejabat kami. Misalnya, hanya di antara kakitangan-kakitangan kami yang memerlukan maklumat pelanggan untuk menjalankan aktiviti-aktiviti perniagaan kami yang tertentu akan dibenarkan akses.
Kesemua kakitangan kami akan sentiasa dimaklumkan dan diingatkan untuk mengendalikan amalan keselamatan dan privasi kami yang terkini. Setiap tahun, serta dimana-mana masa polisi baru dilaksanakan, kami akan sentiasa memperingatkan kakitangan-kakitangan kami supaya meletakkan kepentingan yang besar dalam memastikan keselamatan maklumat peribadi pelanggan serta langkah-langkah keselamatan untuk memastikan maklumat peribadi pelanggan kami sentiasa dilindungi. Akhir sekali, komputer pelayan yang kami gunakan untuk menyimpan maklumat peribadi pelanggan adalah disimpan di dalam persekitaran yang selamat.
Akhir sekali, untuk akses keselamatan dari syarikat anda – sebagai seorang kakitangan, anda hanya boleh mengakses data anda sendiri; sebagai seorang pengurus, anda hanya boleh mengakses data terhad kakitangan-kakitangan anda dan sebagai seorang kakitangan HR, anda merupakan pusat kawalan data syarikat anda: anda boleh mengakses data yang anda isikan bagi pihak kakitangan-kakitangan anda ke Kakitangan.com.
Pangkalan data setiap syarikat dicipta secara berasingan, pengguna-pengguna tidak dibenarkan untuk mengakses data syarikat lain.
Sekiranya anda mempunyai sebarang pertanyaan mengenai dengan keselamatan laman web kami, anda boleh menghantar e-mel kepada support@kakitangan.com.
Apakah jenis Maklumat Peribadi yang dikumpulkan dan bagaimana ia digunakan?
Maklumat peribadi termasuk maklumat yang boleh digunakan untuk mengenal pasti identiti anda dan maklumat yang anda kemukakan kepada kami melalui laman web Kakitangan.com. Ini termasuk butir-butir pengenalan diri anda seperti nama, nombor telefon, alamat e-mel, nama syarikat dan tarikh pendaftaran. Segala Maklumat Peribadi akan diproses oleh pihak kami dan mungkin wujud keadaan di mana data peribadi pelanggan akan diproses oleh anak-anak syarikat atau syarikat-syarikat bersekutu kami, termasuk pihak-pihak ketiga seperti pembekal perkhidmatan luaran.
Untuk secara berterusan meningkatkan taraf produk-produk dan perkhidmatan-perkhidmatan Kakitangan.com yang ditawarkan kepada anda.
Kakitangan.com juga mungkin mengumpul maklumat mengenai lawatan anda ke laman web Kakitangan.com tanpa anda mengemukakan sebarang maklumat melalui pelbagai saluran secara aktif seperti penggunaan ‘cookies’. Pengumpulan maklumat melalui penggunaan ‘cookies’ boleh mengoptimumkan pengalaman anda terhadap pelayaran laman web Kakitangan.com dan membantu Coastal Hectare Sdn Bhd mengumpul statistik dan menganalisis trend yang boleh membantu untuk terus meningkatkan taraf laman web Kakitangan.com pada masa akan datang.
Mana-mana senario lain yang berkaitan.
Untuk secara umumnya melindungi hak dan harta Kakitangan.com dan untuk memastikan kecekapan teknikal dan fungsi sistem kami.
Sekiranya maklumat pengguna peribadi mengalami perubahan seperti alamat e-mel, kami mempunyai cara untuk membetulkan, mengemaskini atau membuang data peribadi yang dikemukakan kepada kami. Ini boleh dilakukan pada seksyen Kakitangan Profil di laman web Kakitangan.com atau melalui e-mel kepada support@kakitangan.com. Maklumat peribadi pengguna juga boleh dikemaskini berdasarkan data yang disediakan kepada Kakitangan.com daripada majikan pengguna tersebut.
Anda boleh memilih sama ada untuk mengemukakan Maklumat Peribadi anda kepada kami atau tidak. Sekiranya anda tidak ingin berbuat sedemikian, anda mungkin tidak berpeluang untuk memperolehi perkhidmatan kelebihan tertentu yang bergantung kepada Maklumat Peribadi anda, seperti sistem permohonan cuti, atau faedah-faedah lain (sebagai contoh, insurans) yang dikemukakan kepada anda oleh majikan anda.
Laman web ini mungkin mengandungi pautan ke laman-laman web yang lain. Sila ambil perhatian bahawa Kakitangan.com tidak bertanggungjawab terhadap amalan privasi laman-laman web yang lain. Kami menggalakkan pengguna-pengguna kami supaya berwaspada apabila mereka meninggalkan laman web kami dan membaca syarat-syarat privasi bagi setiap laman-laman web lain yang mengumpul maklumat peribadi anda. Notis privasi ini hanya tertakluk secara khusus kepada maklumat yang dikumpul oleh laman web ini.
Sekiranya anda masih aktif menggunakan Kakitangan.com, data anda akan disimpan dalam jangka waktu sekurang-kurangnya 7 tahun mengikut peruntukan undang-undang.
Sekiranya anda tidak lagi menggunakan Kakitangan.com dan meminta kami untuk mengeluarkan kesemua data-data anda, kami akan menyingkirkan data-data tersebut dan tidak lagi menyimpan salinan data-data anda dalam Kakitangan.com.
Kami akan mengambil langkah-langkah yang munasabah untuk memastikan bahawa data peribadi yang dikumpul adalah tepat, lengkap, tidak mengelirukan dan adalah data yang terkini.
Kami akan sentiasa menggunakan usaha yang munasabah untuk mengekalkan privasi anda. Walaubagimanapun, mungkin wujud keadaan di mana data peribadi anda akan dizahirkan kepada mana-mana pihak berkuasa berkanun mengikut peruntukan undang-undang di mana kami mempercayai sepenuh hati bahawa tindakan itu adalah diperlukan untuk mematuhi prosiding kehakiman semasa, perintah mahkamah atau proses undang-undang yang disampaikan kepada kami di laman web kami.
Dengan mengakses dan menggunakan laman web kami, ia merupakan pengakuan dan persetujuan bahawa anda terikat dengan terma-terma dan syarat-syarat Polisi ini dan membenarkan kami memproses data peribadi anda selaras dengan terma-terma dan syarat-syarat Polisi ini. Sekiranya anda tidak menerima terma-terma dan syarat-syarat yang dinyatakan di sini atau tidak bersetuju dengan cara kami mengumpul dan memproses data peribadi anda, sila berhenti menggunakan atau mengakses laman web kami. Kami mempunyai hak atas budi bicara mutlak kami dari semasa ke semasa untuk segera menarik balik dan / atau menamatkan penggunaan laman web kami dengan sesiapa yang enggan memberikan kebenaran atau menarik balik persetujuannya untuk memproses data peribadi tersebut. | 2019-04-23T16:06:28Z | https://app.kakitangan.com/landing/terms |
Five couples traveling together through Alberta, Yukon, Alaska and British Columbia June-August, 2016. We call ourselves the Nolewamaay Adventure Tour. It may sound official but the name is actually made up of the first 2 letters of each couple's last name. Creative members of the group came up with the logo for shirts, hats and sweatshirts.
We have just 7 days before we start our Grand Adventure!! I can hardly wait. All five couples will be here by June 9 and then we will head out June 11 for Alaska! This trip has been 2 years in the planning and now we're ready to go.
We've been at Crescent Bar for 2 weeks and have filled our days exploring the surrounding area. Lake Chelan was refreshing to look at and fun to drive along and on the way home, donuts at Cider Works were definitely worth the stop! Even shopping at WalMart and Costco in Wenatchee was interesting because of all the orchards we passed. Rainier and Bing cherries are almost ready and with temps in the high 90s this weekend it should help the ripening process! The drive to Grand Coulee Dam was beautiful with the open plains, mountains and lakes. The Dam itself was impressive and Lake Roosevelt stretched out as far as the eye could see. Our view here at the park is great because we're on the Columbia River and we enjoy the water view from our front window.
We're glad you're sharing this experience with us and hope you'll follow us all summer!
Today we officially started our trip, caravanning from Crescent Bar, WA to Hayden, ID. Canada is 99 miles north so this is a great place to stop, rest and get an early start tomorrow!! We even made a WalMart run. We will head into British Columbia for a 2 night stay at Radium Hot Springs. Be sure to come back and read about all the fun things we’ve done while there!!
Heading north from Idaho, we made an uneventful crossing into Canada at Kingsgate. We found ourselves in the quaint village of Radium Hot Springs in the middle of the Columbia valley. The city is known for its natural mineral hot springs and pool. It is also the gathering place for the local big horn sheep that come to town for the annual rutting, when they wander down main street and throughout the town.
Radium Hot Springs is also the southern gateway to Kootenay National Park along highway 93 toward Banff. The drive through the park to Marble Canyon was spectacular, with each turn opening up to an even more beautiful mountain vista. Along the way many deer, mountain goats and even a bear were spotted next to the roadway.
Returning to our campground, we took advantage of the natural hot springs nearby and enjoyed a relaxing afternoon in the warm pool. The day was capped off with a hot meal at the pub in town while listening to a local country and western band.
Next stop - 4 days in Banff!
After crossing the continental divide we catch our first glimpse of the snow covered peaks surrounding the Bow Valley. As we round the bend, each turn produces another “wow”.
Banff is nestled next to the Bow River and is surrounded by mountains, with Tunnel Mountain sitting in the heart of it all. (There is no tunnel but the name stuck when the railroad thought about putting in a tunnel.) The town is a busy place with lots of tourists and locals mingling at outdoor markets, shops and restaurants. The sights around town are picture perfect and the elk walking among the rigs at our campground makes the whole experience something I would do again!!
Lake Louise met and exceeded our expectations! The water was green/turquoise, the hotel majestic on its shoreline and the view from the gondola breathtaking!!! Driving along the Bow Valley Parkway, we saw elk and a black bear. Whenever we see cars stopped by the side of the road we know to stop and look!! What a delight to watch the bear casually meander across the hillside, stopping to eat or bounce on a dead log!
Johnston Canyon along Bow Valley Parkway is one of the best hikes in this part of the Rockies and some of us got up early in order to beat the crowd. The altitude got to us but the scenery was well worth the effort. The water is turquoise from the glaciers and everywhere we look, we see its beauty.
There is so much beauty here in the Canadian Rockies, I just can’t put it all into words. It’s beautiful, majestic, awe-inspiring and well worth coming to see for yourselves.
Traveling up the Icefields Parkway (Rt. 93) towards Jasper was another spectacular day of sightseeing. Alpine lakes and rivers continued to display the beautiful turquoise color of glacial melting and the snow-covered peaks stood out in sharp contrast to the green meadows and forests. Baby mountain goats crossed the road in front of one coach, but fortunately we were all going slow up a steep incline and the babies made it safely to the other side of the road!!! We saw another black bear and were able to stop and take more pictures. He was VERY close so we stayed in our motorhomes although he acted like our presence was no big deal.
There were waterfalls and vistas along the Icefields Parkway that we could not capture while traveling by them in the motor home. So we ventured by car along the scenic byway back down to Athabasca Falls, where we listened to the roar of the water as it cascaded down to a pristine lake. Again, the water was beautiful and powerful and the scenery so beautiful.
Maligne Canyon was our next stop with more waterfalls, velvet moss growing on the rocks and pockets carved smooth into the rock face. On the same day, the Jasper Skytram took us up to 7,100+ ft. elevation where we could see the entire town of Jasper and all the mountain ranges making up this part of the Canadian Rockies. They just go on as far as the eye can see.
The last excursion was to Maligne Lake, one of the most photographed lakes in North America. More wildlife greeted us on our travels. We saw deer and black bears. The moose, wolves and caribou are still on our list to see, but no luck yet. The lake was beautiful but with rain threatening we didn’t get to see its full beauty. We’ll just have to come back.
Our next stop was going to be Prince George, BC but because of floods and a washed out bridge we will turn east tomorrow and head for Grande Cache and Grande Prairie, AB.
Under cloudy skies we headed east out of Jasper on Rt. 16, the Yellowhead Highway. We also left Jasper National Park and started traveling on regular highways with businesses and different signage along the way. Before long we came to a sign that said “Scenic Route to Alaska” and that made us realize that this adventure is really happening. We followed the sign onto Route 40 and instead of traveling in the Rockies, we were in the Eastern foothills of the Rockies. The area is beautiful in a different way, the scenery consisting of rolling hills instead of towering snow-covered peaks. There were signs of logging and mining along the way but still plenty of forest for the wildlife. We were able to spot deer but we’re still on the lookout for moose, caribou and wolves.
We stopped in Grande Cache for the night and enjoyed the Visitor’s Center. They had a great outdoor exhibit which explained what a grande cache is – a storage cabin on stilts to keep furs and trapping supplies dry and away from wildlife. They also gave us lots of reading material when we told them we were on our way to Alaska.
As our journey continued the next day, we had lots of sunshine, stops for construction, and fox, elk, bear and badger sightings. Grande Prairie was our next stop for shopping at Costco and Walmart and then the final push of the day to Dawson Creek. We crossed back into British Columbia just before Dawson Creek and returned to Pacific Daylight Time after being on Mountain Daylight Time for the past 11 days! The long daylight hours take some getting used to but we’re managing.
Last week Dawson Creek was flooded under several meters of water but fortunately we have had clear skies with a few afternoon showers. We can’t even find real damage in town so we are very fortunate. We have spent our time here relaxing and learning about the Alaska Highway. The pictures and movies show the extreme conditions the men had to work under, temperatures from -70oF to 90oF, mud, mosquitoes and long hours of work. No thank you!!! We’re just glad to be able to experience this part of the world because of all they did.
Thanks for joining us on this trip!!
The first leg of our trip north on the Alaska Highway went from Dawson Creek to Fort Nelson, BC. The roads were wide and in fairly good condition and there wasn’t much construction. The countryside was a carpet of green as far as the eye could see and still lots of water everywhere!
At one point there were eight motor homes all lined up – our five plus three others. We kept enough distance between us so that cars and trucks could pass safely. Walkie-talkies helped communicate about traffic and also wildlife sightings along the way.
Unfortunately, we had the distinction of being the first coach to experience windshield damage. A rock thrown from a passing truck left a golf ball size imprint on the passenger side. We made a quick stop at the local glass shop in Fort Nelson for repairs and we were back on the road. Hopefully that will be the worst thing to happen!!!
The second leg of our trip was from Fort Nelson to Liard Hot Springs, BC. We traveled back through the Rockies with long uphill climbs and winding roads. The vistas around every corner were spectacular and the water turquoise blue. More wildlife; two young moose grazing on the side of the highway, black bear cubs frolicking in the grass and a herd of bison holding up traffic as they casually crossed the road. Even without internet or phone service for two nights at Liard Hot Springs, we enjoyed soaking in the hot springs and watching the resident bison walk through the campground like he owned the place.
The third leg of our trip was from Liard Hot Springs, BC to Watson Lake, YT. Travelling under cloudy skies and over some rough road, we still managed to see several bears and bison next to the highway. The trip also took us into and out of Yukon Territory six times along the way.
Watson Lake is famous for its “Signpost Forest” that was started during construction of the Alaska Highway. Our group sign was added to the other 100,000+ signs already in the forest and many pictures were taken in celebration of the momentous event. We will stay in the Yukon until July 9 when we finally cross into Alaska!
Coming into Whitehorse, we crossed the Continental Divide again. We also started following and crossing the mighty Yukon River! What history connected to this body of water and the impact it has on this part of Canada and also Alaska.
The McBride museum and SS Klondike (steam paddle boat) gave us glimpses into the Gold Rush era and how it affected life here. What a hard life for so little return for most of the prospectors. Entertainers, merchants and bartenders made out better than anyone during the Gold Rush.
The physical beauty of water, mountains, forests and wildlife continues to be the main attraction and most memorable for me.
At Whitehorse, we left the Alaska Highway and traveled north to Dawson City along the Yukon and Klondike Rivers. Lots of beautiful scenery, scarce wildlife, and some really bad patches of road caused by frost heaves! All five motor homes survived but we had to be very careful opening cupboards and closets because of things shifting from the bouncing.
Dawson City’s population is 2,000+ and we were busy seeing all there is to see. There are lots of historical buildings from the Gold Rush era and the town has mandated that all construction continue that theme. You get a real sense of community here and a sense of welcome.
The Visitors Centre was our first stop and their walking tours around town were very informative. Both Jack London and Robert Service lived here, so their cabins were a must-see. Parcs Canada put on an excellent presentation at Robert Service’s cabin, telling his life story and reading some of his poetry/verse.
Our evening entertainment was dinner at the Jack London restaurant followed by a stop at “Diamond Tooth Gertie’s”. Gertie’s is a casino with a 1890’s era style show with singers and cancan girls. It was a great time with lots of laughs.
Midnight Dome is a spot above Dawson City, giving you a bird’s eye view of the rivers, town and surrounding landscape. We were there at 11 p.m. and the sun had not set! What a fascinating sensation. Saw two foxes and a small black bear on our drive to and from the dome so that was exciting.
Tomorrow we take the motor homes on the ferry across the Yukon River and continue our trip into Alaska – finally!!!! Be sure to come back and read all about our trip on the “top of the world” highway.
Today we experienced a smooth, easy ferry ride, glorious vistas, a border crossing, and some really terrible roads.
All five motor homes crossed the mighty Yukon River at Dawson City via the free ferry. The line was non-existent so we all crossed in a short time. The first motor home went over by itself and then two motor homes and two cars went on each of the next rides. The ferry had to work hard to cut across the current with such heavy loads but they made it look easy. After hooking up the cars we were off! We climbed up the hills on the other side of Dawson City and wended our way on the “top of the world” highway, reaching 4500+ ft. in elevation just before the Alaskan border. The highway follows the crest of the mountains and although it was very desolate, the vistas around each corner were wonderful to see. If you have driven the Blue Ridge Parkway then you understand about being on the ridge, able to look down both sides.
The road on the Canadian side had some rough spots, lots of steep inclines, hairpin turns and places where we had to go very slow to miss potholes and dips. We survived that part of the highway and crossed the border into Alaska without a problem. For thirteen miles on the US side we had beautiful smooth roads and loved the drive. But then the pavement abruptly ended and we drove another 70+ miles on narrow, rutted roads doing about 15 mph. (If you have driven on a logging road you know what we drove on.) We didn’t meet much traffic coming the other way and we were all glad for that! We followed Fortymile River most of the way, sometimes looking down on it from a thousand feet! Our coaches were filthy and the cars were even worse but the dirt is proof that we made it!!!
Chicken, Alaska was a wide spot in the road with a population of fifteen, consisting of two RV parks, three restaurants, three gift stores, one saloon and a post office. But it gave us the opportunity to rest after that rough and tumble trip from Dawson City. The guys all had drinks at the saloon, filling all the stools and the girls shopped. There were quite a few miners in the hills around Chicken and one RV park even let you go work their claim. The guys next to us from Minnesota tried it for three days and had two vials full of gold dust. Not a bad return but they said it was really hard work!
The highlight of our trip was the moose!! We went exploring one evening after dinner and discovered a moose foraging in a pond. It knew we were watching but continued to graze on grasses at the bottom of the pond. What an experience. Unfortunately it had moved on by the time we got back to camp and gathered up everyone who wanted to see it. Maybe next time they will get to see the wildlife.
The road from Chicken to Tok was a little better than the previous drive but it still had really big frost heaves and lots of pot holes. There was a bumper sticker that said “I love potholes” and it gave us a laugh. You sure see a lot of them! Alaska had a forest fire in 2004 that burned 1.3 million acres of land and we saw a remnant of that devastation on our way south to Tok. I can’t imagine the smoke from such a huge fire.
It was raining in Tok when we arrived so after parking our rigs, we all just hibernated and called it a night. We will have another chance to explore Tok on our way south in August.
Driving to Fairbanks was a lot more interesting. We stopped at Delta Junction and had a picture taken at the marker for the end of the Alaska Highway. (When we turned north to go to Dawson City and across the top of the world highway, we missed part of the Alaska Highway but on our way home, we will drive the section we missed.) Just north of Delta Junction I started celebrating because in the distance to the west was Denali!!! It was partly covered with clouds but the very top was peeking through the clouds and you could get a sense of just how vast it really is!!! How exciting.
Entering into Fairbanks reminded everyone of how it is to drive in a big city with lots of traffic, stop lights and freeways! We got settled and we’re enjoying five days on the Chena River. Come back and read all about the fun things we did in Fairbanks.
Fairbanks is as far north as we plan to go but you wouldn’t know it by the weather we experienced. It was in the 80’s and 90’s while we were here, but it didn’t slow us down – much. We sailed the Chena River on the sternwheeler, Discovery. They stopped along the way where we saw a dogsled demonstration (the puppies were so cute), visited a replica of an Athabascan village and watched a seaplane take off and land on the river in front of our boat.
The Visitor Center was a wonderful wealth of knowledge about the area and had wonderful displays of the history of Fairbanks. The museum at the University of Alaska, Fairbanks was very well done, with different displays and topics intermingled.
Another day consisted of visiting Dredge #8 (we saw Dredge #4 in Dawson City) where we learned more about the gold rush and how the dredge was operated. Then we panned for gold! What an exciting moment when you see the first little flakes in the pan.
To round out the day, we visited Pioneer Village which had several old buildings and museums to help us experience more history of the area. All in all, Fairbanks is a great place to visit. Of course the University of Alaska does major research on the aurora borealis and that would be a great thing to come see, but unfortunately, the lights are only visible in the winter when it’s awfully cold!!
We’re off to Denali National Park for the next six days. Probably won’t have cell/internet service for awhile, but as soon as we do, I’ll be back writing more about this grand adventure!!
Traveling south from Fairbanks the weather turned gray and overcast and continued with rain, rain and more rain for our time at Denali National Park. Even so, we had four wonderful days exploring all the Park had to offer. We dry camped inside the national park at Savage River Campground without cell or internet service (really roughing it!!) and out among the trees and wildlife. Unfortunately, because of the rain, we really didn’t have an opportunity to see the mountain.
The highlight of the four days was our bus trip to the end of the park road, called the Kantishna Experience. Through the rain and fog, we were still able to see moose, bears, caribou, ptarmigan, grouse and ground squirrels. We even saw a glacier with grass growing on it. No sighting of mighty Denali but it was a good day and the driver was knowledgeable and we did make it all the way to the end of the road! The brown grizzly bear walking down the road right next to our bus was absolutely fantastic and the best part of the drive.
We also saw a dog sled demonstration, got to pet the dogs, and learned all about their use in the park. The park rangers use dog sleds to patrol the park, take supplies to outlying posts and to check for poachers. Since motorized equipment, such as snowmobiles are not allowed within the park boundaries, the dogs play a vital role in protecting the area during the winter months.
We still hope to see Denali but we’re having a great trip and looking forward to more adventures. Hope you’ll continue to follow us on this amazing trip.
As we left Denali we drove south toward Anchorage. We followed the Alaska mountain range and saw some spectacular views, but unfortunately, Denali stayed hidden in the clouds. Sunshine and some blue skies eventually appeared as we got closer to Anchorage and that was a welcome treat.
Anchorage is the largest city in Alaska so we were able to stock up on supplies at Costco, Walmart and other convenient stores. We went to the Saturday Market (on Sunday!!) in the rain and bought a few souvenirs. I caught a cold so I stayed indoors but others went out and toured the city. Some went to the National Parks building which showed short movies about Anchorage and was a great place to go and get out of the rain. Others went to Kincaid Park and were able to see baby eagles learning to fly!!
All in all, it was a good visit and interesting to explore. We’ve done the interior of Canada and Alaska and now we start our coastal experience. Next stop Homer, AK.
As we drove further south on this wonderful adventure, we followed the north shore of Turnagain Arm off the Cook Inlet. Beluga whales frequent this body of water, but unfortunately, the tide was out and so were the whales. However, we did see mountain goats and eagles along the way and the mountains continued to impress and inspire us.
Our campground on the cliffs above Homer gave us a spectacular view of the Kachemak Bay, also off the Cook Inlet. The mountains to the east were snow-capped and filled with glaciers. We took a drive to the east end out of Homer to get a good look at these massive sheets of snow and ice. The size of the glaciers just amazed me.
The five guys and Irma chartered a boat for the day out of Homer to fish for Halibut. The seas were rough so they stayed in the bay but still had a great time and a successful limit catch. There were lots of otters and whales in the bay and we had fun watching one of the otters perform for us right in the marina.
Tomorrow we go to Kenai!
Even though our drive to the city of Kenai was backtracking up the west coast of the Kenai Peninsula, the weather had improved so we were able to view more of the mountains and seascape that we missed on our way south to Homer. Our campground in Kenai was located on the cliffs overlooking the Kenai River where it fed into the Cook Inlet and the Pacific Ocean. The “dipnetting” fishing season had just ended the day before we arrived and campers were still cleaning salmon and their gear from a successful catch. Salmon could be seen jumping out of the water as they made their way upstream to spawn. Again we watched for beluga whales but with all the fishing activity, they were not to be seen.
Homer is the farthest away from home, mileage-wise and Kenai is as far west as Hawaii, so we have gone to great distances on this trip. We have traveled over 3,200 miles so far and still have another month to go!
The highlight of the Kenai visit was meeting up with friends Larry and Gail from our RV club. They live here in Sodatna, Alaska in the summer and were able to spend time with us before returning south to Seattle. They will be heading east before we return to the lower 48 so it may be a while before we see them again.
The morning we left Kenai, there was a bald eagle near our campground. He was so majestic and regal just sitting in a tree, surveying his domain. Mt. Redoubt was in the background in all its splendor so it made for a perfect morning sendoff. Next stop Seward!
Seward was a fun stop in our traveling adventure. The sun was shining and there was word that the Northern Lights had been visible the night before we arrived. Unfortunately the clouds moved in that very afternoon and so there was no light display in the sky for the three nights we were there. But at least it is starting to get darker in the evening and there may still be a possibility to see the Aurora Borealis in all its splendid glory.
The highlight of the Seward stop was a seven hour boat tour to the Kenai Fjords National Park to view the tidewater glaciers of the Aialik Bay. Chilled air moving off the glaciers and the sharp popping noises as the ice cracked and eventually broke loose, thrilled our senses and amazed us with its size and power.
Along the way to the glaciers we were entertained with sightings of eagles, seals, goats, orcas, puffins and even a humpback whale. Although the skies were grey with rain and the seas rough, it was still a great day sightseeing in a very unique National Park.
along the trail indicating how far the glacier has receded over the last hundred years. It was truly remarkable.
Once we left Seward, we traveled back up the Kenai Peninsula, along Turnagain Arm, through Anchorage and on to Palmer for the night. From Palmer, we headed to Valdez, another city on the ocean. We traveled through Thompson pass, surrounded by glaciers and then a long, slow downhill descent to sea level.
We stayed at a park facing the harbor and surrounded by mountains. We saw them every once in awhile when the clouds parted. Even the Alaska Pipeline storage facility was shrouded in clouds most of our stay there.
We saw tens of thousands of salmon spawning at the fish hatchery east of Valdez. We were told it was a good place to see bears so we made several trips, high tide, low tide, then on our last evening there we saw a black bear eating salmon and fishing for more.
It was a good stop, even though it rained all three days. Now we travel four days in order to get to Skagway. I apologize for not writing sooner, but we’ve been busy and without service at some stops.
We left Valdez in a horrific downpour but as we climbed up to Thompson Pass, we dried out and even had sun the rest of the day. Our objective for today is Tok, Alaska. The road north to Glenallen and then northeast to Tok had some beautiful scenery but we were too busy watching for and driving through frost heaves. Canada does a wonderful job of marking the bad spots along the road. Alaska could learn from them because we hit some real doozies!! By the time we got to Tok, we felt pretty beat up.
We are beginning to see evidence of autumn. The blooms on the Fireweed are dropping, with only the tips still in bloom. Alaskans know summer is over when there are no more flowers on the Fireweed stock. We’re also seeing yellow, orange and red among the vivid greens and leaves are starting to fall.
We have come full circle through Alaska now. When we visited Tok a month ago we headed north to Fairbanks. Now we entered from the south, completing one big loop. What an adventure.
From Tok, Alaska we traveled into the Yukon Territory, Canada with a lot of construction along the way. The road was very rough, many road work stops and frost heaves that caused us to drive very slow at times. When we completed the drive, our rigs were completely covered in dirt, dust and mud. Fortunately some of the RV parks have special locations for washing your car and RV. We had not bothered doing that too much on this trip, but after that stretch of road, they really needed it.
Our stop took us to Destruction Bay on Kluane Lake in the Yukon Territory. We pulled into Cottonwood RV Park and settled in for the night. We had a lake front site so everyone joined us for happy hour. It was a little too cool to sit out for long, but it was a nice way to relax after that terrible road. One couple decided to run their generator since the park only provided 15 amp service but the manager came and told them to turn it off. It was before quiet hours and we were told we could run our generators, but he was not happy. When we tried to get clarification about the rules he told us we could leave. We obeyed his wishes, turned in for the night and left very early the next morning. I would not recommend that park to anyone.
The next day was an easier traveling day and we made it into Carcross with no problems. We’re noticing more and more fall colors on the trees and bushes and we’re wondering if we’ll get home before the snow flies!!!! The RV park at Carcross let us wash our rigs and cars so that is how we spent some of the afternoon. We walked around town and had a good time exploring the shops and visitor center.
Today, we traveled a short distance from Carcross, Yukon Territory through British Columbia to Skagway, Alaska on the coast of the Chilkoot Inlet. The border crossing at this point included a very steep 11% downgrade into the city. Our group had some reservations about this route but all our concerns were unnecessary since the road was stepped into smaller sections and we traversed the course without any problems.
The coastline in this region of Alaska is very mountainous, with many fjords and great harbors. Skagway caters to all the cruise ships that come in to their harbor, so there are shops galore!!! We did some exploring and shopping but figured we would wait and do more later. Sunday the town was dead and half the shops were closed because there were no ships in port. Everyone told us to wait – there would be five ships in port by Tuesday!!!
Monday we took the catamaran sightseeing boat to Juneau for the day (Juneau can only be accessed by boat or airplane). We had a smooth sail and were able to see eagles, harbor seals and many waterfalls from the glacier melt. In Juneau, we walked around downtown, had lunch at The Hanger on the Wharf restaurant (best fish & chips), stopped by the Red Dog Saloon and shopped!!! From downtown we went out to the Mendenhall Glacier, just a 20 minute drive out from town. How would you like to say you have a glacier in your backyard? It was beautiful and massive. There were bears nearby but too many people prevented us from seeing them.
From the glacier we boarded our boat for the return trip to Skagway, but first we headed south because the captain had heard there were whales sighted in the area. When we got to the location, we watched humpback whales performing a ritual called “bubble-netting”. There 12-15 male whales gathered together to herd a school of herring by swimming around the outside of the school while blowing bubbles. This confuses and frightens the fish into forming a very tight ball. When ready, the dominant whale will signal the others to swim at the same time through the ball of herring to the surface. They swim with their mouths open ingesting the herring as they pass through the ball. We got to see them do it three times. The captain put a hydrophone in the water so we were able to hear them and the seagulls on top would fly off right before the whales came up to feed (they didn’t want to be part of the meal). It was absolutely the most fantastic thing we’ve seen.
Tuesday, the town was packed with tourists from five cruise ships so we took the White Pass & Yukon Route train to the top of the pass. It was quite a climb but the scenery was beautiful and the narration was excellent. At the top everyone switched seats so that those who saw the east side going up got to see the west side going down. The scenery was spectacular but again we’re noticing signs of autumn and it made us think of heading south before too long.
Upon leaving Skagway, we back-tracked up the 11% grade mountain into Yukon, Canada as far as Carcross, where we caught Route 8 heading northeast to the Alaska Highway. The first night we stayed in the city of Teslin with a nice view of Teslin Lake all around us. Still hoping to catch a glimpse of the Northern Lights, some of us stayed up quite late, but unfortunately no lights were to be seen.
The next day we traveled to the junction of the Alaska Highway and Cassiar Highway (Route 37) and spent the night. We had encountered more construction and delays and were glad for the rest at the end of the drive.
The third day we turned south on Rt. 37 for our last “touristy” stop – Stewart, BC and Hyder, AK. There was more construction and dusty roads on the way so we washed the car – again – so we could see out the windows. Stewart and Hyder are right next to each other and crossing into Alaska there were no customs agents. Going back into Canada we had to show our passports and answer questions. We just went to see the bears. After doing this for three days they got to know us and kept asking if we saw bears. It was a fun experience.
Hyder, Alaska is where the National Park has a walkway over Fish Creek so you can watch the bears feed on the salmon swimming up river to spawn. We went the first day but didn’t see anything. We were disappointed but decided to get up early and be there at 6 a.m. when the walkway opened. The rangers said they always spotted bears early in the morning. So we went – nothing. Went back at noon and saw nothing. Went back at dusk and still saw nothing!! It was very discouraging. Two couples in our group did see bears on the road leaving the walkway area so we were hopeful.
The next day we took it easy and drove up to Salmon Glacier. This glacier really showed the markings of a river of ice and gave us another opportunity to experience the massive amount of ice in a glacier. The fog kept drifting by so one moment you were looking at the glacier and the next, it was totally gone! It was a very eerie feeling.
On our last night we decided to give the walkway one more look at dusk. Nothing there, but other RVers we had talked to the night before were there, so we shared stories and waited for the bears. We finally gave up and on our way back to the RV, we saw a baby bear disappear down the hill. We decided to turn around and sure enough we got a good look at a black bear and her two cubs. They were so cute but I was glad we had the car for protection.
After that successful sighting we decided to try the dump. We were told some bears hang out there so off we went. Sure enough, there were four bears scavenging in the dump. The large female had two cubs and she chased off a smaller male bear. Seven bears in one evening. That was very special.
Tomorrow we say good-bye to Alaska and head east for Prince George where we turn south for home.
We said good-bye to Alaska for the last time and started the final leg of our journey to Prince George, BC. We finished the Cassiar Highway and connected with Rt. 16 – the Trans-Canada Highway. The road was in good shape and very busy, with lots of farms, small towns and a feeling of “normal”. We had traveled all through the Yukon and Alaska and it was a feeling of “otherness”. Now we were back to what we were familiar with.
Thanks for going with us on this journey. It was the trip of a lifetime! | 2019-04-20T04:28:52Z | https://www.northtoalaska.com/my-road-trip/view-my-map/?RouteId=%7B22101AC1-B9AA-4703-977B-DB46873ACDF2%7D |
Bangkok offers lodging for all budgets. Bangkok hotels, guesthouses, world class hotels? Try some of the best hotels in the world. Bangkok is your city. We have personally stayed at most of the listings on this page from budget, to mid range to luxury. Keep the suggestions coming!! (Email Dave) and he will try to stay in as many of these hotels as possible. We do not provide reservation links to third parties on this page for any of the hotels/guesthouses listed below – rather we provide the direct hotels’ phone, website and email if available.
NOTE: You can do a search online for “Bangkok Hotels Hostels” or some similar phrase and many of the same guesthouses/hotels who are Internet savvy or who have partnered with larger hotel reservation websites will show up on every search. As a result, those hotels are often full or more expensive then places you can find just by showing up. Because of this, a number of the hotels we list below will not show up in a general Internet search for Bangkok hotels.
We have personally stayed in nearly all the hotels or hostels listed below. Look for the following icons next to hotels we feel strongly about, either in a positive or a negative way.
These hotels are unique, are a good value for the price, have excellent customer service or have additional desirable characteristics that set them apart from the competition.
These are hotels that based on our stays lack customer service, are overpriced and or have other noticeable faults.
We first heard about TenFace Hotel from Neil Mandt (who we interviewed); Neil directed and starred in a movie called “Last Stop for Paul”, part of which was filmed in Thailand and he stayed here during some of the filming. This is one of the trendier boutique luxury hotels in Bangkok and is an extremely good value for the price. We recently stayed here for several nights and found quite a few features that set this hotel apart from others in its price range. We measure a hotel stay in the “details” and it is those details that can quickly add up to an overall enjoyable experience. Check-in was about the fastest we’ve ever experienced! The elevators are also super quick.
Tenface has only 79 suites. Even their smallest rooms (the one room suites) are quite sizeable by Bangkok standards. Tenface also offer several two bedroom suite options (which include a kitchen). The hotel is named for the ten-faced giant from the Thai national epic, Ramakien. The entire hotel plays upon this theme including their “Tosakan’s Heart Box” which is given upon check-in. This box contains a complimentary BTS Skytrain Day pass, a local SIM card for your cell phone, the use of a Nano Ipod for the duration of your stay as well as a “must see places” guidebook including local recommendations as well as cards of select attractions written in English as well as Thai to give taxi drivers (an important feature!). Each suite has its own router for fast complimentary in-room WiFi. The rooms are stylishly decorated and the beds as comfortable as you will find (Tenface provides one of four different pillow types upon request!).
Hold your mouse over each link below to find out about each particular Bangkok district. Click each link below for hotels & guesthouses in that particular district. Thailand’s country code is +66.
Chao Praya River is the lifeblood of Bangkok. It is a huge brown river and winds its way among all the temples and buildings – canals run into this main river. Sometimes the Chao Phraya provides at least a breeze to help break up the sometimes heavy humidity. Longtail boats and river taxis ferry passengers up and down and across this river. Major temples are located near its banks including Wat Arun, Wat Po and the Grand Palace.
Aurum, The River Palace is located within minutes walking of Wat Po and the Grand Palace on a small Soi right next to the Chao Phraya River. It is located in the original heart of Bangkok’s commercial and cultural district.
Oriental Hotel What can be said about the Oriental Hotel other than it is among an elite class of hotels in the world and is certainly considered one of the top hotels in Bangkok. Old World elegance is a phrase that easily describes this hotel. This exquisite historical hotel celebrated their 140th year anniversary in 2016; they are located right next to the French Embassy and also the Chao Phraya River (in fact they have their own pier on the river appropriately named, The Oriental Pier). For a hotel of this caliber the room prices are actually quite reasonable. Transplant this hotel to another city such as New York, Los Angeles, Hong Kong or any of a number of other wealthy cities in the world and the prices per night would be absolutely exorbitant. Here, rooms start at about $350 per night US $ although during the ‘off season’ prices may dip lower for the deluxe rooms. The service is absolutely impeccable – the employees are friendly extremely attentive, and they anticipate your needs quite well.
The rooms are well designed and there are great views of the river and the surrounding areas depending on which side of the hotel your room is on. Each section of the floor has a butler available on your call. A surround sound Bose driven speaker system is available and controls are next to both sides of the bed, in the bathroom, and next to the toilet. Fresh OJ and a morning paper are delivered every day. A small pullout “office” is available with a high speed Internet connection, phone and fax machine.
Woodlands Inn is a budget hotel – visit: www.woodlandsinn.org It is a little dingy and they did not accept credit cards (even though their website indicates they do – so bring cash. This hotel has undergone an upgrade so hopefully the quality of rooms have improved since we stayed here. It is overall clean and provides a safe nights sleep. Located about 500 meters from the Chao Praya River and approximately 2 kilometers from the nearest Metro stop Hualumphong.
Airports These are hotels that are typically within about a 20 minutes drive or less to either Suvarnabhumi Airport or Don Mueang Airport. Suvarnabhumi Airport is Bangkok’s primary International and Domestic Airport. Don Mueang was Bangkok’s main International airport before Suvarnabhumi Airport was built. Don Mueang still services a number of airlines for both domestic and International routes – including Air Asia and Nok Air.
Boxtel, Suvarnabhumi is located on the basement level of the airport about 200 meters past the Airport Rail Link terminal station. Even if these tiny sleep pod like boxes were not located here, this part of the airport is among the most popular places to sleep between flighs – with travelers often cramped into seats or lying on the floor. However, Boxtel gives you enough room to stretch out with privacy.
Sleep based on the time you have – either connecting for flights or upon arrival or departure. Super conveniently located. Rooms are booked in 4 hour increments – note that there are no showers on site and bathrooms are shared. Main pluses of a stay here are privacy and convenience. Typically pricier then most budget single rooms found if you go into Bangkok.
Ivory Suvarnabhumi Airport Hotel Ivory Suvarnabhumi Airport Hotel is conveniently located about a 10 to 15 minute drive from the Suvarnabhumi Airport via taxi at 2/1 – 2/2 Ladkrabang 22 Ladkrabang (about a 20-25 minute drive to On Nut Skytrain stop with no traffic). This hotel is a very good value for the price with a great location especially if you need to catch an early morning flight from the nearby airport. The hotel can also arrange transportation to and from the airport if needed.
The staff are friendly (front staff speaks English) with a guy to take your bags up to your room when you arrive. The rooms are clean and comfortable with very firm beds. Wifi worked well during our stay. A small restaurant part of this hotel is located on the ground floor in the building directly across from the lobby. Newspapers in English and Thai are available in the outside waiting area (next to the indoor lobby). The showers are very confusing to use – one must turn on the facet located at the bottom of the shower, then press the large silver press pad on the actual shower installment and then supposedly the shower will turn on. It doesn’t always work this way based on numerous times and showers used when staying here.
Montri Hotel & Spa is located almost directly across from Don Mueang Airport and if you are flying in or out of this airport, this hotel is very conveniently located and rooms are available at a decent price. This resort is very much decorated and built in a Thai style. It is not a fancy resort – rather is very modest and makes a comfortable stay. A small low key massage room is one site – and in our experience provides a very good massage.
The rooms are clean and comfortable with good air conditioning. The grounds of the property are calming, as quiet as you can find in this urban oasis – there is even a little water wheel for calming flowing water sounds and birds in cages and an open courtyard for additional relaxation.
Breakfast can be ordered in the morning – several light items are available including “joke” a type of porridge.
The property can be very difficult to find – it is located on a small street (when trying to find have their phone number at hand so you can give it to your taxi driver or key in their address into Google Maps – this works fine and is the method we used to find their property).
While located merely a little over a kilometer from Don Mueang as the crow flys getting to the airport can take a bit longer depending on traffic or if you walk. If you walk it is about 20 + minutes weaving through small streets and a busy part of town. If you drive it can take about 10 mins with no traffic as the driver has to go down a bit further from the airport and circle back. The hotel will reserve a taxi for you for about 50baht – or you can walk several blocks to flag one down on the nearby street (may be less taxis here in the early am and during rush hour you might have to wait some time before you can find an empty one). It cost us just over 50 baht to the airport using one of the taxi meters.
During our stay the wifi worked very well inside and outside the room. Location: No.11 Soi Chang Arkart Uthid 3 Yak 4, Donmuang, Bangkok, 10210 Thung Si Kan.
Khao San Road/Banglampou is the heart of Bangkok for International backpackers. There are numerous small rather inexpensive guest houses and hostels on or near Khao San Road. We have seen several in the 200 to 300 baht per night range – room with bathroom and fan (no AC). The advantages or disadvantages of staying on Khao San Road is that you are close to a strong International social environment (often noisy until the early hours of the morning), massage parlors, cheap tour operators and restaurants that cater to tourists. Also consider staying at nearby Rambutri Road area – mere minutes walking from Khao San Road. Rambutri provides all the same services as you will find on or near Khao San but its more quiet and relaxed. Rambutri is located just west of the end of Khao San Road towards the Chao Phraya River.
And if you want an even more quiet and local experience – definitely look at staying in one of the guesthouses in the Samsen area – no high rises here – rather dominated by residential old school Bangkok neighborhoods and plenty of guesthouses. And remarkably it is only about a 10-12 minute walk from Khao San Road.
Say NO to guesthouses that do NOT serve Thai people. Some guesthouses in and around Khao San Road, including the Rambutri district either advertise blatantly that they do not service Thai people or if you are with a Thai person they will refuse that person entry to their guesthouse. Always ask your guesthouse if they service Thai people. Two guesthouses to stay away from are Bella Bella and the Sawasdee Inn – both located on Rambutri Road.
Baan Chantra is located at 120/1 Samsen Road about a 10 minute walk from Khao San Road. This is a privately owned upscale small guesthouse located in a renovated historical home that dates back to 1936.
Canale Hostel is located in the Khao San Road / Samsen District but feels anything like being on Khao San Road despite only being a less-then 10 minute walk away. Appropriately named this unique hostel sits on the edge of a small canal that connects directly to the Chao Praya River. It is quiet here which one cannot usually find on or near Khao San Road. An area of town that is not yet developed to high rise condos and contains a number of local neighborhoods among them sprinkled a wide variety of budget and backpacker hostels and small guesthouses.
Canale Hostel is located in an old wooden home that was originally built in 1945 and has since been renovated to accommodate both a dorm room and private rooms – while still keeping the traditional materials (wood paneling and floor boards). Those staying here access the property through a narrow soi that is definitely not your normal entrance to a guest house in busy Bangkok – passing by several small homes. In the evening or morning – best chill spots are outside on the wooden deck in one of their comfy solo lounges overlooking the canal.
The dorm rooms tend to be very cost effective for budget travelers who are looking for stay that is unique and a bit off the beaten path. Their single rooms tend to be somewhat pricey but if you are traveling with 2 to 4 people and you split the cost – its not as bad as a single person paying for one of these private rooms.
D&D Inn , is one of the nicer hotels located smack in the middle of Khao San Road – rates are very reasonable for the type of lodging you receive. Rates run from about 400 to 750 baht per night depending of course on Single or Double room or AC or fan room only. A very nice hotel – they have a pool and sun bathing deck located on top, nice interior and courtyard – some rooms are a bit noisy so ask for their quiet ones. There is a full service spa and salon (Hello Spa) on the 7th floor. Their motto is “quality on a budget”! Look for discount coupons to this spa/salon located on the first floor.
Ibis Styles formerly Viengtai Hotel is located at 42 Tanee Road, Banglampu in Bangkok is well worth the price. Part of the Accor hotel brand, it is one of a number of hotels located within the old city of Bangkok. Features a 24-hour restaurant, comfortable rooms and a large swimming pool. The buffet all you can eat breakfast is included with the cost. This breakfast is actually very good as they have a very large selection of entries, fruit, salads and drinks. This hotel draws an eclectic mix of upscale back packers as well as families and typical tourists. There are plenty of restaurants nearby.
Phranakorn Nornlen – is located about 1 kilometer from the Chao Phraya River and about the same distance from Khao San Road – rooms run from about 1500 baht per night. You can walk to either the river or Khao San area but expect at least a 20-30 min walk to either place. This is a unique one of a kind boutique hotel run by a famous Thai actress who is in her early 30’s. She is often at this hotel during the evenings. One of the friendliest staff you will find. Rooms are all different in their own way. Their peaceful courtyard truly provides a serene escape from the hustle and bustle of most of Bangkok. Breakfast included with each stay – Thai or American food. Wireless Internet is available for use with hotel stay – and several computers are available. Nice paintings and other artwork decorate this hotel. Some new rooms opened mid 2007.
If you stay at Phranakorn Nornlen, consider using Trufflers “true flavour for travelers” run by Donald Woo Ming Lung – ask at the front desk. This is the only boutique travel host to specialize in ‘non touristy’ & ‘off the beaten path’ journey’s in Thailand – they work with guests of the Phranakorn Nornlen hotel to offer these one of a kind trips and tours.
Suksawad Hotel . This hotel is about 1/2 kilometer from Khao San Road. It is located at 8/3 Samsen Road and is also accessible during the day from Soi 6.
At night access is off of the main Samsen road as the entrance on the small Soi (Street) 6 closes. (Samsen Road runs right by Khao San Road). This is a cheap, clean, safe and very basic place to stay. Note some of the rooms are very well endowed with mirrors most likely catering to sensual activities. There are also several other nice guesthouses on this street (Soi 6).
Thai Cozy House is another great deal. Located only a few minutes from Bangkok’s famed Khao San Road, prices for a single room (including breakfast) start at 550 baht/night.
Silom is the heart of the financial district in Bangkok – and as a result sees less backpackers, is generally cleaner and quieter than some areas of Bangkok. Note that much of the street food vendors close up shop when evening comes and your choice of food is often stand alone restaurants or taking transportation somewhere else. The Skytrain serves much of this area.
Heritage Sathorn – is located on a small soi (street) at 36 Soi Sathorn 13, Sathorn Tai Road about a 15 minute walk from the closest Skytrain stop of Surasak. The hotel has a large Tuk Tuk on site and advertises 24/7 free service. However in our experience, multiple times on different days we asked to be driven to the Surasak Skytrain stop (as they advertise) only to be told that they have no driver. The hotel has 9 stories, the rooms are large and nicely decorated and include a refrigerator as well as a balcony. There are several street food type vendors within minutes walking of the hotel but most close somewhat early in the evening. This is certainly not a touristy part of Bangkok to stay in. The staff is very friendly, helpful and bilingual between Thai and English.
Hotel Ibis Bangkok Siam is located at 927 Rama 1 Road. Busy part of town with easy access to a number of Bangkok’s most popular shopping centers including MBK, Siam Paragon and Central World. Also several nearby temples and other cultural attractions within a short walk or drive from the hotel. Very easy access and nearby walk to the National Stadium skytrain stop. Features 189 contemporary Superior, Suite and Privilege rooms. Pet friendly. Modern and hip feel.
Lebua State Tower is a modern 64 story hotel – located fairly close to the Chong Nonsi or surasak Skytrain stops along the Silom Line. It was featured in the movies, Bangkok Dangerous starring Nicholas Cage and Hangover II. As a result a visit here is also popular with tourists. Prior to the Hangover movie one could visit this location with relative ease. Since the release of that movie the property has seen a significant increase in visitors. Today they maintain a number of staff that carefully directs visitors to the appropriate locations within the hotel.
La Residence Hotel is located in the business section of Bangkok – within about 10 minutes walking distance to the Pat Pong night markets & risque entertainment, Jim Thompson’s House, and several shopping malls (173/8-9 Suriwongse Road -corner of Soi Anumanrajdhon 1). The hotel is located off of a busy street on a corner but the rooms are quite quiet. The cost for a double room runs about $40 US – this does include breakfast. Some rooms do not include breakfast. Be sure to review the enticing photos of their hotel and rooms on their website. If you walk by here at night it will almost look like this hotel is closed as their restaurant faces the busy street while the hotel entrance is off of the side street. Click on the thumbnails to see the front of La Residence Hotel & the inside of a room.
Lub D (meaning “a good place to sleep” in Thai) is a fairly new hostel located at 4 Decho Road in the Silom area. Decho is a small quiet road between Silom and Surawong Roads. Upscale meets budget in Bangkok and Lub D is the exciting result! The staff is very friendly, there is a “spaciousness” to this hostel that you don’t always find in hostels, the beds are way comfortable, there is the “cool factor”, but perhaps the most important reason of all for making a reservation is the community – which is an integral part of a stay here. In the evenings it can be especially happenin’ downstairs next to the Yellow Donut Cafe & Bar. Nothing beats hanging out here at 10pm on a warm Bangkok night sipping a Bacardi Breezer and chilling with friends.
Several dormitories are available including a ladies only dorm. The dorms are geared to the International traveler who wants lots of activities, not just a place to sleep (note that they also have private rooms). As a result of the power of word of mouth, this it is a great place to meet travelers from all over the world. WiFi is available free throughout the building with several laptops available on the first floor.
The closest Skytrain stop is Chong Nonsi (about a 8 minute walk) and the nightlife of the Patpong district is about a 10 minute walk away. A number of massage businesses are located nearby. If you are going to take a taxi, flag down a “rolling taxi” rather than those who wait around outside the hotel. They may alter their meters and or devise other ways to rip you off. Lub D can also arrange tours and transportation needs through their travel counter located on the first floor. For more information visit: www.lubd.com For reference, they are located about a 5 minute walk from the Sofitel Silom Hotel. They currently operate one other Bangkok hostel, the Lub D Siam.
LUXX – maintains two properties in Bangkok, LUXX along Silom (13 rooms) and the Luxx XL on Langsuan Road (just north of Lumpini Park) with it’s 18 rooms. We stayed at LUXX.
LUXX is located between a 7-10 minute walk from the closest Skytrain stop, Chong Nonsi. During busy hours, one can often wait several minutes crossing over the light at Silom on your way to or from this hotel. Good value for the price. A darker feel to the interior – both the hallways and the rooms. Our room was much larger then expected with the bedroom seperated from the main living space via a sliding glass door. Sizable bed – firm, provided a very good nights sleep.
Tenface Hotel – see our “recommended hotel” review at top of this page.
Sukhumvit is the heart of the hotel district in Bangkok. Many travelers stay here – many cheap and more luxurious hotels are merely walking distance from one of the Sukhumvit Skytrain stops. Lots of nightlife, massage parlors, restaurants, and street food. Sukhumvit itself is a super busy road with hotels situated next to it or on side streets (Soi’s). In general the the hotels become cheaper and you get more for your money the further away from Sukhumvit road.
Arte Hotel is located at 29 Soi Sukhumvit 19 a short walk from the Sukhumvit metro and Asoke Skytrain stops. Located down a small soi/street – at the end of this street turn left to enter the lobby with its feel of faux luxury and large bling-based chandeliers lined ceiling of the lobby to check in. During a recent visit check in time was a bit slow despite plenty of staff behind the counter.
Very friendly staff. The rooms are sizable, clean and come with a variety of toiletries. One of the major downsides of staying here is the walls between the rooms are apparently very thin and it is easy to hear your neighbors moving about or if they are talking loudly. Based on the room experience alone, this hotel is a bit over priced. Two things in its favor however, are its location (although note you can find similar quality or better rooms for cheaper in this part of town) and the rooftop pool.
The rooftop, while not the highest of the buildings in the area affords one excellent views of the core part of Bangkok in all directions. The pool features cool water – with some of the seats actually sitting directly in the water. Two bars are located here – a larger indoor one and a smaller more basic one where along with ordering a variety of pricey drinks, visitors can also sign off for a towel. An excellent spot to hang out and enjoy the sunshine and meet other foreign visitors. Located on floor number 9.
Dvaree Diva Bally Sukhumvit operates two hotels, one off of Silom and the one we stayed at – located all the way at the end of 172 Soi Sukhumvit 20. This hotel is about a 10 minute walk from the Asoke Skytrain stop. Lots of restaurants are located on this Soi as well as neighboring Soi 22 (both Soi’s connect in the back away from Sukhumvit). Dvaree Diva operates a free Tuk Tuk to give you rides back and forth (although this is does not operate before 9am and late in the night). This is a modern hotel with clean comfortable studio or single rooms. The front desk attendants speak reasonable English.
First House Hotel (NOT to be confused with another hotel located just down the street called The First House) is located about 1/2 kilometer from Sukhumvit Road. (14/20-29 Petchburi 19 Road, Soi Juldis, Phyathai District, Rajthevee). This hotel has sentimental value for Dave as he stayed here during his first trip to Bangkok in 96′. The Saranyuth Coffee Shop, located on the ground floor, serves meals that are quite tasty. Breakfast is included with each nights stay. Expect a buffet style breakfast with Thai food including some rice and vegetables, eggs, sausages (more like small hot dogs) and fresh fruit when in season (I’ve had delicious fresh watermelon, pineapple and guava at this restaurant).
Be sure to take one of their “Town Guide” cards before you leave the hotel and put it in your pocket or wallet. These are small business sized cards that have the words “please take me to the above address” and a map prominently displayed on the front of the card. These are very helpful if you are not good with directions, especially in a foreign city! Newspapers in various languages are available in the lobby each morning.
Galleria 10 Bangkok is located at 21 Sukhumvit Soi 10 and its easily within a very short walking distance of the main Sukhumvit Road and within a several minute walk of both Asoke and Nana Skytrain stops. The hotel is close to the center of all the action along this part of Sukhumvit yet is set a few minutes off the busiest part of Sukhumvit. The hotel has 188 rooms, a pool on the 8th floor and a rooftop restaurant. Be careful walking on the steps when you enter the main lobby – they aren’t lit up that well and there is water beneath part of them.
Grand Business Inn is located on Sukhumvit Soi 11 about a 1 minute walk in from the main Sukhumvit Road. This is a very convenient location to all the craziness of this particular area as well as to the Skytrain. A coffee shop/restaurant (serves both Thai and Western dishes), is located on the ground floor and is open 24 hours a day. Business Hotel also has a travel agency on site to help with booking needs.
Hip Hotel is located 4 Metro stops from Sukhumvit Road (about 10-15 minutes on the metro). Hip Hotel is located along the small soi (street) that runs past the large Emerald Hotel. This hotel as advertised is “hip” with its judicious use of pink, purple and other shades of yellow. The rooms are stylish, very clean with big beds and large bathrooms including the tubs. Classic 80’s music is available on DVD along with a nice flatscreen TV with many channels. This area is one of Thailand’s lively nightlife districts and a number of massage with happy ending businesses are located nearby as well as “gentleman’s clubs”. Room massage is available by calling reception 24 hours a day and when we stayed here we saw several girls lined up in the lobby waiting for customers. With that said, the area is not seedy and neither is the hotel (very modern). Breakfast is served (included with a stay) on the first floor and is buffet in style serving both western and Thai cuisine.
Honey Hotel is located at 31 Soi Sukhumvit 19. Their motto is “a place small enough to call home”. This is a very well established affordable hotel located within several minutes walking of the Asoke Skytrain stop. The Asoke Skytrain stop also connects to the Metro. This part of Sukhumvit has many hotels, most that you find online start around 1500 baht – this one starts around 800 baht. It is a multi-storied hotel with a swimming pool and restaurant next door. They have a limited number of under the building parking spots with the most affordable rooms on the first floor right next to the parking area. No Internet on site, but nearby cafes are available. The Robinson Department store is just down the street on your way to the Asoke Skytrain stop. The rooms are clean and comfortable with good air conditioning. The staff is friendly and helpful and there is always someone at the desk who speaks a bit of English. They also have a nice small pool between the actual hotel and the small road.
Little Pig Hostel is located about a 5-7 minute walk from the Ekkamai BTS Station and a few minutes longer then that from the Eastern Bus Station. Entrance when we arrived was locked and we had to wait for someone to come and let us in. Additional fees apply if check in is after 10pm. Annoying. No elevator found – if you have a lot of luggage you may want to reconsider staying here as a result. A small luggage storage room is located on the first floor next to the reception table.
Rooms appear to be small – we stayed in a 3 bed room for 2 persons and still this room felt very small. Air conditioning took a while to cool down even in a room this small. Only two tiny bottles of shampoo soap available in 3-person room. Room and the interior of this hostel were quite clean. wifi Internet on the 3rd floor was very intermittent.
Mangosteen Guesthouse is owned and operated by a middle age/older couple – this tiny guesthouse is located about a 10 minute walk from the nearest Skytrain stop of Thong Lor. Located on a relatively quiet part of Sukhumvit Soi 38 – this makes a nice budget stay for those looking for some quiet but still within a short walk to the hustle and bustle of Suhkumvit. No prominent sign so use our photos here as a guide – and note that their location is correctly listed on Google Maps.
Features several floors of rooms including two accessed from outside the main entrance (in the front courtyard area). Rooms are extremely small – during a recent stay one had to access a shared bathroom located outside of the tiny private rooms. Soap and shampoo provided, housed in plastic containers hanging on the wall in the bathrooms.
Movenpick Bangkok is located at 47 Sukhumvit 15, Sukhumvit Road. Luxury hotel featuring stylish rooms and suites. Excellent location within minute of shopping malls, nightlife and the endless stimulation that this part of Bangkok delivers. But this is a quiet respite when you need a break from the noise and lights of nearby Bangkok.
The hotel offers nearly 300 rooms – all equipped with WiFi. Because the hotel is located a slight distance off of Sukhumvit, Free Tuk Tuk transportation is to and from the hotel to the Asoke Skytrain stop. Walking this short distance takes several minutes.
Beautiful roof top rainforest bar near the 20 meter long roof top pool. Also a fitness center on site. Excellent views of the city skyline from here especially at night. Delicious drinks – one can sit at the bar or hang out on one of nearby lounge chairs. Check out the modern and elegant Lelawadee restaurant on the ground floor.
On 8 The primary advantage of this hotel is is proximity to the Nana Skytrain stop and the action of this part of Sukhumvit road and its nightlife. Their are two entrances; one through their restaurant directly on Sukhumvit and the other around the corner off a side street on Soi 8 (162 Sukhumvit Road). From the entrance on Sukhumvit, you are merely 10 seconds (yes we timed it) to the escalator leading up to the Nana Skytrain stop.
Red Planet Asoke is located at 7 Sukumvit Soi 14 – about a 100 meter walk in from the main Sukhumvit Road. This is also about a 5 minute walk from the Asoke BTS Skytrain stop and is affordably priced for the quality and location – making this a good choice if you want to stay in this part of town.
The hotel features a number of floors – small rooms which were very clean during recent stay here. Check-in is downstairs in a lobby with a color theme somewhat resembling the colors of Air Asia. A kiosk next to the check-in counter allows you to take a photo of yourself and then send it via email. A Tune clothing line is available and some of these are on display downstairs.
Royal Asia Lodge is conveniently located at 91 Sukhumvit Road, off of Soi 8 which is very close to the Nana Sky Train stop. Rooms with a King Size bed are available for about $25 a night. For hotels in this price range the Royal Asia Lodge is hard to beat. It is a family owned and operated; its location is on a street that sees very little traffic. As you enter this street (Soi 8) from Sukhumvit Road, a small red button is available on the right hand side of the street – located on the back side of the first building (the side of the building that is parallel to the main Sukhumvit Road. Pressing this will bring free of charge, a Royal Asia Lodge Tuk-tuk driver who will drive you to the entrance to the hotel. You don’t really want to walk this street to Royal Asia as its a considerable walk – the Tuk Tuk ride will only take a few minutes. You do not have to tip the driver for the ride unless you want to.
A nice, albeit small, pool is available on the rooftop (9 stories up) – you can swim, relax and watch the fish swimming in the long fish tank situated directly above the pool. There is also a nice Jacuzzi right next to the pool on the roof as well as great views of the city. Poolside service with the touch of a button is available for drinks or snacks. Single rooms are small, clean and comfortable.
Refrigerators, TV’s and controls for lighting and AC are found in each room. Piped classical music is played in the elevator – and the elevator controls on each floor (outside the elevator) show you exactly what floor the elevator is on. High speed internet access is located downstairs – although its a bit pricey. A tailor downstairs offers reduced rates on clothing for patrons of the Royal Asia Lodge.
S Suites Sukhumvit – is in an ideal location, mere steps and seconds away from a stairway leading up to the Asoke Skytrain and the connection for the metro. You cannot beat this location! The staff is friendly and the rooms are very clean. Sometimes hotels have bland food – not so with this one. Authentic and tasty thai food is served for breakfast as well as western cuisine.
Sacha’s Hotel Uno is a chic upscale boutique hotel located off of Sukhumvit Soi 19 – mere minutes from the Asoke Skytrain stop. This is a good choice for Business travelers. Large beds, tastefully decorated rooms, wireless Internet in all of the rooms. Also of note is the very nice cafe downstairs. The salads are excellent. The breakfast is average and slightly overpriced.
Serene Asoke Suites is a basic hotel with a great location. As you stumble back from the Asoke Metro station (the entrance is mere meters from the hotel lobby), stop at a bar for a stiff drink on the closest street, Soi Cowboy, relax with a massage 2 doors down from the hotel, hit the 7-11 next door for some basics and then voila and then a few meters next door, you are in the hotel lobby.
Very friendly staff – like other hotels they will let you store your luggage here if you arrive before check in time for for a certain period after you check out. This hotel features one of the world’s slowest elevators – agonizingly slow – it can’t handle much weight or luggage either, rides are limited to two people.
Rooms are sizable, clean with air conditioning that works well. Entry is via a keycard which you must keep in the slot to maintain electrical rights over your room. Wifi works very well and is very fast. Because of its location to the sultry and sin status of the nearby Soi Cowboy, signs at the hotel forbid bringing ‘joiners’ up to your room – a euphemism for prostitutes.
Somerset Ekamai Bangkok . This place is awesome! These serviced apartments (formerly a condominium space) are located about a 10 minute walk from the Ekamai Skytrain stop at 22/1 Ekamai Soi 2, Soi Sukhumvit 63. Because the location is well removed from the busy Sukhumvit – this is an ideal space for someone who likes quiet but within a short distance of the hustle and bustle of nearby Bangkok. Friendly and efficient staff.
Yadoya@thonglor is conveniently located within only a several minute walk from the Thong Lor Skytrain stop (exit number 3). Somewhat of a pricy part of town to stay in, this apartment/guesthouse is somewhat of an anomaly with their rather affordable pricing. Older style building next to a number of newer and taller buildings. Great location – with easy access to restaurants (a number of Japanese restaurants) and very nearby massage places.
Somewhat dated rooms – nothing fancy – very basic accommodation for budget travelers who desire a private stay. But the rooms are clean. No elevator so one will have to carry their luggage up possibly numerous floors. Front desk may or may not speak much English – staffed 24/7 even very late at night or early morning should you need to check out to make an airport run. Hot water works well – the room we stayed in had the sink outside of the bathroom. Comes with a decent sized refrigerator and provided bottles of water daily (even hung on your door in a bag each day should you put out your “dot not disturb sign”. Air conditioning works well.
A pass card is provided to all guests (to open the front door which is always electronically locked next to the reception). Thirty rooms total.
National Stadium There are prime shopping areas near the National Stadium and Siam Skytrain stops. Shopping includes the upscale Siam Paragon (finished in 2006) and the huge MBK Mall. This is a crowded area of town to stay in.
Baiyoke Tower II is the tallest building (hotel) in the Kingdom of Thailand, although the new Ritz Carlton building will eclipse the Baiyoke Tower II’s height. This building is clearly identified by its circular shape. Sometimes organizations will hang their sign from the side of this building. It takes three different elevators to reach the top of this building. If you reach the 78th floor and you eat at the International Buffet restaurant you will find place mats that provide you with statistics such as: the pilings under the building run into the ground to the height of 22 stories, there are 1,740 windows in the building, it is 309 meters tall, there are 2,60 steps from the bottom to the top, which will take most people over an hour to climb, and the observation deck rotates a full 360 degrees.
The International Buffet located on the 76th and 78th floors is worth the price for the surrounding experience & atmosphere of being in the highest restaurant and tallest building in all of Thailand. These floors are literally surrounded by glass windows so you have excellent views of Bangkok from high above. The buffets are all you can eat Sushi, German, & Thai food and sometimes other cuisines. A variety of salads, meats, deserts and fruits are also available. Note that this food is not excellent but average. You are paying more for the views and atmosphere and experience of eating at the top of Thailand’s tallest building rather than excellent food. However, also note that during holiday season – especially in December this price may double (unless you are Thai – then the price remains lower).
Krit Thai Residence is located opposite National Stadium on the same street that the Reno Hotel is located on (see below). This is a budget multi-story hotel which contains 80 rooms. If you are sensitive to smell, they seem to have a problem with their water system – as some of the rooms smell quite musty, especially the bathrooms as the smell seems to originate from the water pipes.
Reno Hotel is located not far from MBK shopping center at No 40 Soi Kasemson 1 Rama Road. This hotel is opposite National Stadium. This upscale budget hotel is located near the Skytrain and major shopping centers. Nice clean rooms and friendly staff. Restaurant is located adjacent to the hotel and breakfast is included with each stay. They also have a nice swimming pool! Despite being located minutes from major shopping centers their location is somewhat isolated and you don’t have the feeling of being surrounded by the “urban jungle”. It is also fairly quiet at night. For more information visit www.renohotel.co.th.
There are several other guesthouses on this small street, but The Reno Hotel is the nicest one of them.
Victory Monument Stay around Victory Monument.
Hotel de Bangkok is located at 133/48, Ratchaprarob Soi 12, Makkasan, Ratchathewi. This hotel is conveniently located near the airport rail connecting link to Suvarnapumi Airport (at the Ratchaprarop stop). It is about a 15 minute walk to either Victory Monument or the Phayathai Skytrain stops. The hotel itself is located on a small soi off of the busy Ratchaprarop Road. Within minutes you can be enjoying street food or a slightly further walk brings you to a several small massage businesses. The hotel is four story – a large pull in at the entrance for taxis with a porter out front ready to help with your luggage when you check in. The main floor also contains a side room and tables for dining.
The hotel is clean and modern looking – only the inside of the elevator looks like it belongs in a hotel of a lower standard. The rooms are decent sized with firm beds and outside balconies. Also a nice bathroom.
Breakfast is simple – fruit, soup, and eggs, sausage etc. The wifi works well throughout the hotel (from our testing) and is fast.
Other These are hotels that do not fall in any of the above Bangkok district categories.
Cozy Bangkok Palace is located in a very small area of what feels like “old Bangkok” – it is in a residential area with few shops. The address is: 41/146-148 Soi. Sunthonpimol, Rama 4 Rd., Rongmuang, Prathumwan. It is surrounded by tall buildings and large raised roads including the huge Rama IV, but for some reason this tiny area has escaped being totally developed. Because of its location surrounded by small streets it can be somewhat confusing for taxi drivers to find. They do have a map on their website; print this out and take it with you. It is about a 5 minute walk to the closest bus station and a 10-12 minute walk to the Hua Lamphong Metro stop (which is the last stop at this end of the Metro). The hotel is also located within about the same distance walking of the big train station and Chinatown.
Wow, you sure have plenty of places listed! My BF and I are planning our trip to Bangkok (and Phuket) and I stumbled across your link to your Bangkok guide on Twitter. We are thinking of staying down by the river – and then catch the skytrain stop to Sukhumvit area. Thanks for posting this.
Was doing a search for a Bangkok guesthouse and your page showed up – was looking at the Canale Hostel, seems a bit expensive for a private room but maybe I’ll do the dorm room. Nice page dude. | 2019-04-19T23:40:05Z | http://www.davestravelcorner.com/guides/bangkok/bangkok-hotels-hostels-lodging/ |
How was the Human Soul Created?
Of What Does the Soul Consist?
"He spared not their souls from death" (Psalm 78:50).
EVERYBODY knows that the body dies, that it needs resupply continually and that hence it cannot be immortal. But the Scriptures speak of souls. May it be that the soul is indestructible?—that God having made a soul cannot destroy it?
Reason tells us that, unless there is absolute proof to the contrary, the life of every creature is subject to the will of the Creator. Now notice that the Scriptures nowhere speak of the immortality of the soul, as some people seem to suppose—neither in the translations nor in the original text. Take a Concordance and try to find the expression "immortal soul," and thus you can quickly convince yourself that no such expression is found in the Scriptures. On the contrary, the Scriptures declare that "God is able to destroy both soul and body"; and again, "the soul that sinneth, it shall die."
What, then, is the soul? The general idea of the soul is that it is an indefinable something in us, but what it is or where it is located few attempt to explain. This unknown something is claimed to be the real, intelligent being, while the body is merely its house or tool. A Methodist bishop once defined a soul, thus: "It is without interior or exterior, without body, shape, or parts, and you could put a million of them into a nutshell";—a very good definition of nothing, we should say!
The body is not the soul, as some affirm; this is proved by Jesus' statement that "God is able to destroy both soul and body." In view of this, if our minds be freed from prejudice, we ought to be able to learn something further on this subject by examining the inspired record of man's creation.
Turning to Gen. 2:7, we read: "And the LORD God formed man of the dust of the ground, and breathed [Heb. blew] into his nostrils the breath [Heb. wind, power] of life [Heb. lives, plural — i.e., such as was common to all living animals]; and man became a living soul [i.e., a sentient being]."
From this account it appears that the body was formed first, but it was not a man, soul or being, until animated. It had eyes, but saw nothing; ears, but heard nothing; a mouth, but spoke nothing; a tongue, but no taste; nostrils, but no sense of smell; a heart, but it pulsated not; blood, but it was cold, lifeless; lungs, but they moved not. It was not a man, but a corpse, an inanimate body.
The second step in the process of man's creation was to give vitality to the properly "formed" and in every way prepared body; and this is described by the words "blew into his nostrils the breath of life." When a healthy person has been drowned, and animation is wholly suspended, resuscitation has been effected by working the arms and thus the lungs as a bellows, and so gradually establishing the breath in the nostrils. In Adam's case it of course required no labored effort on the part of the Creator to cause the perfect organism which He had made to breathe the life-giving oxygen of the atmosphere.
As the vitalizing breath entered, the lungs expanded, the blood corpuscles were oxygenized and passed to the heart, which organ in turn propelled them to every part of the body, awakening all the prepared, but hitherto dormant, nerves to sensation and energy. In an instant the energy reached the brain, and thought, perception, reasoning, looking, touching, smelling, feeling and tasting commenced. That which was a lifeless human organism had become a man, a sentient being; the "living soul" condition mentioned in the text had been reached. In other words, the term "living soul" means neither more nor less than the term "sentient being"; i.e., a being capable of sensation, perception, thought.
Moreover, even though Adam was perfect in his organism, it was necessary for him to sustain life, soul or sentient being, by partaking of the fruits of the trees of life. And when he sinned, God drove him from the garden, "lest he put forth his hand, and take also of the tree [plural, trees or grove] of life, and eat, and live forever [i.e., by eating continuously]" (Gen. 3:22). How the fogs and mysteries scatter before the light of truth which shines from God's Word!
Thus, also, we see why it is that the Scriptures speak of "souls" in connection with the lower animals. They, as well as man, are sentient beings or creatures of intelligence, only of lower orders. They, as well as man, can see, hear, feel, taste and smell; and each can reason up to the standard of his own organism, though none can reason as abstrusely nor on as high a plane as man. This difference is not because man has a different kind of life from that possessed by the lower animals; for all have similar vital forces, from the same fountain or source of life, the same Creator; all sustain life in the same manner, by the digestion of similar foods, producing blood, and muscles, and bones, etc., each according to his kind or nature; and each propagates his species similarly, bestowing the life, originally from God, upon his posterity. They differ in shape and in mental capacity.
Nor can it be said that while man is a soul (or intelligent being) beasts are without this soul-quality or intelligence, thought, feeling. On the contrary, both man and beast have soul-quality or intelligent, conscious being. Not only is this the statement of Scripture, but it is readily discernible as a fact, as soon as the real meaning of the word soul is comprehended, as shown foregoing.
To illustrate: Suppose the creation of a perfect dog; and suppose that creation had been particularly described, as was Adam's, what difference of detail could be imagined? The body of a dog created would not be a dog until the breath of life would be caused to energize that body;—then it would be a living creature with sensibilities and powers all its own—a living soul of the lower order, called dog, as Adam, when he received life, became a living creature with sensibilities and powers all his own—a living soul of the highest order of flesh beings, called man.
If the great difference between man and beast is not in the life which animates both, and not from lack of soul-power, which both possess, can it be that the difference is in their bodies? Yes; assuredly, the natural difference is physical, in addition to which is the fact that God has made provision for man's future, as expressed in His promises, while no such provision for a future life is made for beasts—nor are they organically capable of appreciating metaphysics. Other things being equal, the size and weight of the brain indicates capacity and intelligence. In this respect man has been more highly endowed than the brute, by the Creator. The brute has less brains than man, and what it has belongs almost exclusively to the selfish propensities. Its highest conception of right and wrong is the will of its master, man; it cannot appreciate the sublime in morals or in nature; the Creator did not give it such brain-capacity.
But although, because of his fall into sin and death, man's condition is far from what it was in its original perfection when pronounced "very good" by the highest Judge—so that some, by the cultivation of the lower organs of thought and a failure to use the higher, intellectual faculties, have dwarfed the organs of the brain representing these higher faculties, yet the organs are still there, and are capable of development, which is not the case with the most nearly perfect specimens of the brute creation.
So then it is in that the Creator has endowed man with a higher and finer organism, that He has made him to differ from the brute. They have similar flesh and bones, breathe the same air, drink the same water, and eat similar food, and all are souls or creatures possessing intelligence; but man, in his better body, possesses capacity for higher intelligence and is treated by the Creator as on an entirely different plane. It is in proportion as sin degrades man from his original likeness of his Creator that he is said to be "brutish"—more nearly resembling the brutes, destitute of the higher and finer sensibilities.
To this the Scripture testimony agrees. We read (Gen. 1:29, 30), "To you it shall be for meat. And to every beast of the earth, and to every fowl of the air, and to everything that creepeth upon the earth, wherein there is life [Heb. 'nephesh chaiyah'—a living soul]."—Again (Gen. 1:20), "Let the waters bring forth the moving creature that hath life [Heb. — a living soul]."—See marginal readings.
The same lesson, that the life principle is no different in mankind from what it is in all other creatures whose breath is taken through the nostrils, as distinguishing them from fish, is taught in the account of the destruction wrought by the Deluge (Gen. 6:17; 7:15, 22). This is in full accord with King Solomon's statement that man and beast have all "one breath" [Heb. ruach, spirit of life]—one kind of life; and that "as the one dieth, so dieth the other" (Eccl. 3:19). When he asks (Eccl. 3:21), "Who knoweth the spirit of man that [it] goeth upward, and the spirit of the beast that [it] goeth downward to the earth?" he is controverting the heathen theory, which even at that time had begun to speculate that man had some inherent quality which would prevent his death, even when he seemed to die. The wise man challenges any proof, any knowledge, to such effect. This challenge to others to produce proofs, or admit that they have no such knowledge, follows his statement of the truth on the subject in verses 19 and 20.
The distinction between man and beast is not in the kind of breath or life, but in that man has a higher organism than other animals; possessing moral and intellectual powers and qualities in the image or likeness of those possessed by the Creator, who has a still higher organism, of spirit, not of flesh. And, as already shown, man's hope for a future life lies not in his inherent powers, but in his Creator's gracious provision which centered in the redemption of every soul of man from death, by the great Redeemer, and the consequent provision that whosoever will may have everlasting life by resurrection, subject to the terms of the New Covenant.
Our Redeemer "poured out His soul [being] unto death," "He made His soul [being] an offering for sin" (Isa. 53:10, 12); and it was the soul of Adam (and his posterity) that He thus bought with His precious blood—by making His soul (being) an offering for sin. Consequently souls were redeemed, and souls are to be awakened, resurrected (Psa. 49:15).
ARE THE SAME BODIES RESTORED?
Many suppose that the bodies buried are to be restored atom for atom, but, on the contrary, the Apostle declares, "Thou sowest [in death] not that body which shall be." In the resurrection God gives to each person (to each soul or sentient being) such a body as His infinite Wisdom has been pleased to provide; to the Church, selected during the Gospel Age, spirit bodies; to the restitution class, human bodies, but not the same ones lost in death (1 Cor. 15:37, 38).
As in Adam's creation, the bringing together of an organism and the breath of life produced a sentient being or soul, so the dissolution of these, from any cause, puts an end to sentient being—stopping thoughts and feelings of every kind. The soul (i.e., sentient being) ceases; the body returns to dust as it was; while the spirit or breath of life returns to God, who imparted it to Adam, and to his race through him (Eccl. 12:7). It returns to God in the sense that it is no longer amenable to human control, as in pro-creation, and can never be recovered except by Divine power. Recognizing this fact, the Lord's instructed ones commit their hope of future life by resurrection to God and to Christ, His now exalted Representative (Luke 23:46; Acts 7:59). So, then, had God made no provision for man's future life by a Ransom and a promised resurrection, death would have been the end of all hope for humanity (1 Cor. 15:14-18).
But God has thus made provision for our living again; and ever since He made known His gracious Plan, those who speak and write intelligently upon the subject (for instance, the inspired Scripture writers), as if by common consent, speak of the unconscious interim between death and the resurrection morning, in which sentient being is suspended, as a "sleep." Indeed, the illustration is an excellent one; for the dead will be totally unconscious of the lapse of time, and the moment of awakening will seem to them like the next moment after the moment of their dissolution.
For instance, we read that, speaking of Lazarus' death, our Lord said, "Our friend Lazarus sleepeth; I go that I may awake him out of sleep." Afterward, because the disciples were slow to comprehend, He said, "Lazarus is dead" (John 11:11, 14). Were the theory of consciousness in death correct, is it not remarkable that Lazarus gave no account of his experience during those four days? None will claim that he was in a "hell" of torment, for our Lord calls him His "friend"; and if he had been in heavenly bliss our Lord would not have called him from it, for that would have been an unfriendly act. But as our Lord expressed it, Lazarus slept, and He awakened him to life, to consciousness, to his sentient being, or soul returned or revived; and all this was evidently a favor greatly appreciated by Lazarus and his friends.
THE DEAD DESCRIBED AS "ASLEEP"
"The greater part remain unto this present, but some are fallen asleep" (1 Cor. 15:6).
"If there be no resurrection, … then they also which are fallen asleep in Christ are perished" (1 Cor. 15:13, 18).
"Christ is risen from the dead and become the first-fruits of them that slept" (1 Cor. 15:20).
"Behold, I show you a mystery; We shall not all sleep" (1 Cor. 15:51).
"I would not have you to be ignorant, brethren, concerning them that are asleep" (1 Thes. 4:13).
"Them that sleep in Jesus, will God bring [from the dead] with [by] him" (1 Thes. 4:14).
When the Kingdom, the resurrection time, comes, "we who are alive and remain unto the coming [presence] of the Lord shall not prevent [precede] them which are asleep" (1 Thes. 4:15).
They "fell asleep" in peace to await the Lord's Day (the Day of Christ, the Millennial Day), fully persuaded that He [Christ] is able to keep that which they committed unto Him against that Day (2 Tim. 1:12). This same thought runs through the Old Testament as well—from the time that God first preached to Abraham the Gospel of a resurrection; the expression, "He slept with his fathers," is very common in the Old Testament. But Job puts the matter in very forceful language saying, "Oh, that thou wouldest hide me in the grave, that thou wouldest keep me secret until thy wrath be [over] past!"
The present dying time is the time of God's wrath—the curse of death being upon all, because of the original transgression. However, we are promised that in due time the curse will be lifted and a blessing will come through the Redeemer to all the families of the earth; and so Job continues, "All the days of my appointed time will I wait, till my change come; [then] thou shalt call (John 5:25) and I will answer thee; thou wilt have a desire unto the work of thine hands" (Job 14:13-15). And we of the New Testament times read our Lord's response, All that are in the graves shall hear the voice of the Son of God [calling them to awake and come to a full knowledge of God and to a full opportunity of everlasting life] (John 5:28, 29).
Let us illustrate the human and animal body, soul and spirit by something less complex and better understood generally; for instance, an unlighted candle would correspond to an inanimate human body or corpse; the lighting of the candle would correspond to the spark of life originally imparted by the Creator; the flame or light corresponds to sentient being or intelligence or soul quality; the oxygenized atmosphere which unites with the carbon of the candle in supporting the flame corresponds to the breath of life or spirit of life which unites with the physical organism in producing soul or intelligent existence. If an accident should occur which would destroy the candle, the flame, of course, would cease; so if a human or animal body be destroyed, as by consumption or accident, the soul, the life, the intelligence, ceases.
Or if the supply of air were cut off from the candle-flame, as by an extinguisher or snuffer, or by submerging the candle in water, the light would be extinguished even though the candle remained unimpaired. So the soul, life, existence, of man or animal would cease if the breath of life were cut off by drowning or asphyxiation, while the body might be comparatively sound. As the lighted candle might be used under favorable conditions to light other candles, but the flame once extinguished the candle could neither relight itself nor other candles, so the human or animal body while alive, as a living soul or being, can under Divine arrangement start or propagate other souls or beings—offspring; but as soon as the spark of life is gone, soul or being has ceased, and all power to think, feel or propagate has ceased.
In harmony with this we read of Jacob's children: "All the souls that came out of the loins of Jacob were seventy souls" (Ex. 1:5). Jacob received his spark of life as well as his physical organism, and hence the united product of these, his soul or intelligent being, from Isaac, and thence from Adam, to whom alone God ever directly imparted life. And Jacob passed on the life and organism and soul to his posterity; and so it is with all humanity.
A candle might be relighted by any one having the ability; but by Divine arrangement the human body, bereft of the spark of life, "wasteth away," "returneth to the dust from which it was taken," and the spark of life cannot be re-enkindled except by Divine power, a miracle. The promise of resurrection is therefore a promise of a relighting, a re-enkindling of animal existence or soul; and since there can be no being or soul without a body and restored life-power or spirit, it follows that a promised resurrection or restoration of soul or being implies new bodies, new organisms. Thus the Scriptures assure us that human bodies which return to dust will not be restored, but that in the resurrection God will give such new bodies as it may please Him to give (1 Cor. 15:37-40).
The Apostle here declares that in the resurrection there will be a special class accounted worthy of a new nature, spiritual instead of human or fleshly; and, as we should expect, he shows that this great change of nature will be effected by giving these a different kind of body. The candle may here again serve to illustrate: Suppose the fleshly or human nature to be illustrated by a tallow candle, the new body might be illustrated by a wax candle, the new body might be illustrated by a fluorescent light.
With any power and wisdom less than that of our Creator guaranteeing the resurrection, we might justly fear some break or slip by which the identity would be lost, especially with those granted the great change of nature to spirit being. But we can securely trust this and all things to Him with whom we have to do in this matter. He who knows our very thoughts can reproduce them in the new brains so that not one valuable lesson or precious experience will be lost. He is too wise to err and too good to be unkind; and all that He has promised He will fulfil in a manner exceedingly and abundantly better than we can ask or think.
The terms body, soul and spirit may be used of the Church collectively. For instance, the Apostle says: "I pray God [that] your whole spirit and soul and body be preserved blameless unto the coming of our Lord Jesus Christ" (1 Thes. 5:23). This prayer must be understood to apply to the Church as a whole—the elect Church, whose names are written in Heaven. The true spirit has been preserved in the Little Flock. Its body has been discernible also, notwithstanding the multitudes of tares that would hide as well as choke it. And its soul, its activity, its intelligence, its sentient being, has been in evidence everywhere, lifting up the standard of the people—the Cross, the Ransom. In no other way could we apply St. Paul's words: for, however much people may differ respecting the preservation of the individual spirits and souls of the people addressed: all will agree that their bodies have not been preserved, but have returned to dust, like those of others. Besides, the words body, soul and spirit are in the singular, not in the plural.
Some questions with inspired answers will further elucidate matters; hence we submit them.
Question: Are the promises to the saints of the Gospel Age heavenly or earthly promises?
Answer: "As we have borne the image of the earthly, we shall also bear the image of the heavenly." We are "partakers of the heavenly calling" (1 Cor. 15:49; 2 Tim. 4:18; Heb. 3:1; 6:4; Phil. 3:14; Eph. 2:6, 7; 2 Thes. 1:11, 12; 2 Tim. 1:9, 10).
Question: Were the elect Church, the "overcomers," the "saints," to continue to be human beings, "of the earth earthy"?
Answer: "Whereby are given unto us exceeding great and precious promises, that by these ye might be [come] partakers of the divine nature"—"new creatures" (2 Pet. 1:4; 2 Cor. 5:17; Rom. 8:17, 18).
Question: When is their full change (begun by a change of heart, at the begetting of the Spirit) completed?—When were they to be made like Christ their Lord?
Answer: We [saints] shall all be changed." … "The dead [saints] shall be raised incorruptible, and we shall be changed, in a moment, in the twinkling of an eye … this mortal shall put on immortality." "Sown a natural [animal] body, it is raised a spiritual body." "So also is the [special] resurrection of the [special, elect] dead" (1 Cor. 15:50-53, 42-44; Phil. 3:11).
Question: Are full recompenses, either rewards or punishments, to be expected before the resurrection?
Answer: "Thou shalt be recompensed at the resurrection of the just" (Luke 14:14; Rev. 11:18; Matt. 16:27).
Question: What is the hope held out for all except the Elect of the Gospel Age?
Answer: "The whole [human] creation groaneth and travaileth in pain together until now. For the earnest expectation of the creature waiteth for the manifestation of the sons of God [the saints]." Then shall follow "times of restitution of all things which God hath spoken by the mouth of all His holy prophets since the world began," in which "all the families of the earth shall be blessed" through "Abraham's Seed" (Rom. 8:22, 19; Acts 3:19-21; Gal. 3:16, 29).
Question: Are the dead conscious or unconscious?
Answer: "The dead know not anything" (Eccl. 9:5; Psa. 146:4; Isa. 38:18, 19).
Question: Have the departed saints been praising the Lord all along during the past ages?
Answer: "The dead praise not the Lord" (Psa. 115:17; 6:5; Eccl. 9:6).
REWARDS — AT DEATH OR RESURRECTION?
Question: Did the prophets receive their reward at death? or was it reserved in God's Plan to be given them at the beginning of the Millennium, the Age or Day of Judgment?
Answer: "The time of the dead, that they should be judged, and that thou shouldst give reward unto thy servants the prophets," is at the sounding of the last trumpet, the seventh trumpet, at the end of the Gospel Age (Rev. 11:15, 18; Psa. 17:15).
Question: Were the Apostles promised translation to heaven at death?—or must they await Jesus' Second Coming?
Answer: "As I said to the Jews, Whither I go ye cannot come; so now I say to you [Apostles]," "I will come again and receive you unto myself" (John 13:33; 14:3).
Question: Was it proper for the saints of the Gospel Age, except such as would be living at the time of the Lord's return, to expect to be crowned at death?
Answer: "When the chief Shepherd shall appear, ye shall receive a crown of glory that fadeth not away" (1 Pet. 5:4; 2 Tim. 4:8; 1 Pet. 1:4, 5).
Question: Did the Apostles expect glory at death or at the Second Coming of Christ?
Answer: "When Christ who is our life shall appear, then shall ye also appear with Him in glory" (Col. 3:4; 1 John 3:2).
Question: Were the saints to "shine" in death?
Answer: "Many of them that sleep in the dust of the earth shall awake, … and they that be wise shall shine as the brightness of the firmament [as the sun]" (Dan. 12:2. 3; Matt. 13:40-43).
Question: Were the Ancient Worthies rewarded at death?
Answer: "These all died in faith, not having received the promises; … that they without us should not be made perfect" (Heb. 11:13, 39, 40).
Question: David was one of the holy prophets: Was he rewarded by being taken to heaven?
Answer: "David is not ascended into the heavens" (Acts 2:34).
Question: How many had gone to heaven up to the time of our Lord's ascension?
Answer: "No man hath ascended up to heaven, but He that came down from heaven, even the Son of man" (John 3:13).
Question: Can He who created man destroy him? Can the soul be destroyed by its Creator?
Answer: "Fear Him who is able to destroy both soul and body in Gehenna [the 'Second Death']." "He spared not their souls from death." "The soul that sinneth, it shall die" (Matt. 10:28; Psa. 22:29; 78:50; Ezek. 18:4, 20; Joshua 10:35; Isa. 38:17; Psa. 56:13; 30:3; 119:175; Matt. 26:38; Isa. 53:10, 12).
Question: How great importance did the Apostle Paul attach to the doctrine of the resurrection?
Answer: If there be no resurrection of the dead, then is not Christ risen. … Then they also which are fallen asleep in Christ are perished" (1 Cor. 15:13-18).
Question: Are the unjust now being tormented in some unknown hell? or do they always meet the full penalty of their unrighteousness in the present life?
Answer: "The Lord knoweth how to … reserve the unjust unto the day of judgment [the Millennial Day] to be punished" (2 Pet. 2:9; Job 21:30).
Question: What will be the end of those who when tried are found incorrigible—wilfully wicked?
Answer: They shall "go away into a cutting off from life," "be punished with everlasting destruction [a destruction which will never be terminated by a resurrection]"; for still "The wages of sin is death," "the Second Death"; and still the gift of God, eternal life, is to be had only in Christ. "He that hath the Son hath life"; he that hath not the Son shall not receive that gift (Matt. 25:46; Rev. 20:14, 15; 2 Thes. 1:9; Rom. 6:23; 1 John 5:12).
Question: If hell (sheol) is a place of living torture, lighted with flames and hideous with the curses of its occupants suffering torture, either mental or physical, why do the Scriptures declare it to be a place or state of silence, darkness, forgetfulness and absolute unconsciousness? (Job 10:21, 22; Psa. 88:3- 12; 6:5; 146:4; Eccl. 9:10; Isa. 38:18).
Question: If God is able to destroy both soul and body in the Second Death, and if He declares that He will destroy the wilfully and intelligently wicked, will not this prove that there will be no such thing as everlasting sin and everlasting agony? And does not this clear God's character from charges of injustice?
Question: Are not these propositions intimately associated with all the doubts which have troubled you since you became a Christian, and perhaps before? And would not their Scriptural solution greatly assist in rooting, grounding and establishing your faith in the Bible as the inspired Word of God? This has been the blessed result with many who in their confusion were doubtful, skeptical and unsettled Christians, as well as with many infidels. It is the key which opens to the honest seeker the treasures of Divine wisdom and grace.
The Wages of Sin—Is It Eternal Life in Torment or Death?—Which?
I. It is not Eternal life in torment.
A. The Scriptures nowhere teach eternal life in torment as Sin's Wage.
B. It is contrary to Scriptural passages.
C. It is contrary to Scriptural doctrines.
D. It is contrary to itself, being impossible of infliction.
E. It is contrary to God's character of perfect Wisdom, Power, Justice and Love.
F. It is contrary to Christ's ransom—corresponding price—which was yielded up by death not by eternal torment.
G. It is contrary to a sound mind, making its advocates unreasonable, and its dupes in many cases insane.
H. It is contrary to experience, which shows that not it, but another penalty is inflicted.
I. It is contrary to Godliness, injuring real faith, hope and love, and spreading terror, unbelief, despair and hardness of heart.
J. It is contrary to Reason, in that every instinct of sound reason revolts at such a penalty.
K. It is contrary to the doctrine that sin will cease.
L. It is contrary to the doctrine that evil will cease.
M. It is contrary to the doctrine that Eternal life is a reward.
N. It is a heathen doctrine.
O. It is a teaching of Satan and his fallen angels.
P. It has been an animating motive of persecution by men who lacked the Lord's spirit, and were filled with the Adversary's spirit.
Q. It is an instrument of priestcraft.
R. It is the papal counterfeit of the real penalty of sin.
S. It is based upon a false view of the nature and qualities of the human soul.
T. It is based on a false view of Hell.
U. It is based on a false view of Eternal life.
V. It is based on a false view of the Hereafter.
W. It is based on false methods of interpretation.
X. It is supported by false translations.
Y. It is the heart of the first lie ever told.
Z. Belief in its Scripturalness has made infidels of some of the best and brightest people.
a. Direct passages: Gen. 2:17; Jer. 31:30; Rom. 1:32; 5:12, 15, 17; 6:16, 21, 23; 7:5; 1 Cor. 15:21, 22, 56; James 1:15; 1 John 5:16.
b. Parallel passages: Gen. 3:19; Rom. 1:18; 5:16, 18, 19.
a. Not life: Deut. 30:15, 19; Rom. 5:21; 6:23; 8:13; Gal. 6:8.
1. Non-existence: Job 6:15, 18; 7:9; Psa. 37:10, 35, 36; 49:12; 104:35.
2. Destruction: Job 31:3; Psa. 9:5; 37:38; 145:20; Isa. 1:28; 1 Cor. 3:17; Phil. 3:19; 2 Thess. 1:9; 1 Tim. 6:9; 2 Pet. 2:1, 12; 3:16.
3. A consuming: Psa. 104:35; Isa. 1:28; Heb. 12:29.
4. A devouring: Isa. 1:20; Heb. 10:26-28.
5. A perishing: (a) proof, Job 4:9; 6:15, 18; Psa. 73:27; Prov. 11:10 (b) the meaning of perishing: Psa. 37:20; Matt. 8:25, 32; Luke 11:50, 51; 13:33; John 3:16.
6. A cutting off: Psa. 37:9, 22, 34, 38.
C. Its Effect: destruction to both soul and body.
a. The wicked soul dies: Job 36:14 (margin); Psa. 56:13; 116:8; 78:50; Isa. 53:10, 12; Ezek. 18:4, 20; Matt. 26:37; James 5:20.
b. The dead soul is not alive: Psa. 22:29; 30:3; 33:18, 19; Isa. 55:3; Ezek. 13:19; 18:27.
c. The dead soul ceases: Psa. 49:8.
d. The wicked soul is destroyed: Psa. 35:17; 40:14; Prov. 6:32; Ezek. 22:27; Matt. 10:28; Acts 3:23; James 4:12.
e. The wicked soul is consumed: Isa. 10:18.
f. The wicked soul is devoured: Ezek. 22:25.
g. The wicked soul perishes: Matt. 16:25, 26 (the Greek word for soul is here translated life).
h. The wicked soul is cut off: Lev. 22:3; Num. 15:30.
a. The Scriptures are vocal with it.
b. It is in harmony with all Scripture passages.
c. It is in harmony with all Scripture doctrines.
d. It is self-harmonious, being capable of infliction.
e. It is harmonious with God's Character.
f. It is harmonious with Christ's Ransom, His death.
g. It is harmonious with a sound mind.
h. It is harmonious with experience and observation.
i. It is harmonious with piety.
j. It is harmonious with reason.
k. It is harmonious with the doctrine that sin will cease.
l. It is harmonious with the doctrine that evil will cease.
m. It is harmonious with the doctrine that Life is a gift-reward.
n. It was a doctrine of God's people before the Dark Ages.
o. It is the teaching of God and His servants.
p. It instils religious tolerance and liberty.
q. It is a proof of equality at the bar of Justice.
r. It is the Christ's teaching on the penalty of sin.
s. It is based on the real nature of the Soul.
t. It is harmonious with the Bible Hell.
u. It is based on the true view of Eternal life.
v. It is based on the true view of the Hereafter.
w. It is based on true methods of interpretation.
x. It is supported by correct translations.
y. It is the first doctrine taught our race by God.
z. Belief in its Scripturalness has converted Infidels. | 2019-04-23T00:29:04Z | https://www.biblestandard.com/what-is-the-soul.html |
11. (1) This Act may be called the Gift-tax Act, 1958.
(3) It shall be deemed to have come into force on the 1st day of April, 1958.
13(xii) gift means the transfer by one person to another of any existing movable or immovable property made voluntarily and without consideration in money or moneys worth, and 14[includes the transfer or conversion of any property referred to in section 4, deemed to be a gift under that section].
3. 36[(1)] Subject to the other provisions contained in this Act, there shall be charged for every 37[assessment] year commencing on and from the 1st day of April, 1958, 38[but before the 1st day of April, 1987,] a tax (hereinafter referred to as gift-tax) in respect of the gifts, if any, made by a person during the previous year (other than gifts made before the 1st day of April, 1957), at the rate or rates specified in 39[Schedule I].
Gifts to include certain transfers.
Exemption in respect of certain gifts.
50[(iia) being an individual who is not resident in India, to any person resident in India, of foreign currency or other foreign exchange as defined respectively, in clause (c) and clause (d) of section 2 of the Foreign Exchange Regulation Act, 1947 (7 of 1947)51, remitted from a country outside India in accordance with the provisions of the said Act and any rules made thereunder, during the period commencing on the 26th day of October, 1965, and ending on the 28th day of February, 1966, or such later date as the Central Government may, by notification in the Official Gazette, specify in this behalf.
52[(iib) being a person resident outside India, out of the moneys standing to his credit in a Non-resident (External) Account in any bank in India in accordance with the provisions of the Foreign Exchange Regulation Act, 1973 (46 of 1973), and any rules made thereunder.
54[(iic) being a citizen of India, or a person of Indian origin, who is not resident in India, to any relative of such person in India, of convertible foreign exchange remitted from a country outside India in accordance with the provisions of the Foreign Exchange Regulation Act, 1973 (46 of 1973), and any rules made thereunder.
57[(iie) being an individual who is a non-resident Indian, once out of the moneys standing to his credit in an account opened and operated in accordance with the Non-resident (Non-repatriable) Rupee Deposit Scheme, 1992.
Provided that] where an individual, who is a non-resident Indian in any previous year in which the bonds are acquired, becomes a resident in India in any subsequent year, the provisions of this clause shall apply in respect of the gifts of property referred to in this clause in such subsequent year or any year thereafter.
78[(xv) to any person in charge of any such Bhoodan or Sampattidan movement as the Central Government may, by notification in the Official Gazette, specify.
(2) Without prejudice to the provisions contained in sub-section (1), gift-tax shall not be charged under this Act in respect of gifts made by any person during the previous year, subject to a maximum of rupees 82[thirty] thousand in value.
(d) gifts made in contemplation of death has the same meaning as in section 191 of the Indian Succession Act, 1925 (39 of 1925).
85[Value of gifts, how determined.
866. (1) Subject to the provisions of sub-section (2), the value of any property, other than cash, transferred by way of gift shall, for the purpose of this Act, be its value as on the date on which the gift was made and shall be determined in the manner laid down in Schedule II.
Aggregation of gifts made during a certain period.
89[Gift-tax authorities and their jurisdiction.
7. The income-tax authorities specified in section 116 of the Income-tax Act shall be the gift-tax authorities for the purposes of this Act and every such authority shall exercise the powers and perform the functions of a gift-tax authority under this Act in respect of any person within his jurisdiction, and for this purpose his jurisdiction under this Act shall be the same as he has under the Income-tax Act by virtue of orders or directions issued under section 120 of that Act (including orders or directions assigning concurrent jurisdiction) or under any other provision of that Act.
Powers of Commissioner respecting specified areas, cases, persons, etc.
Concurrent jurisdiction of Inspecting Assistant Commissioner and Gift-tax Officer.
(b) so as to interfere with the discretion of the Deputy Commissioner (Appeals) or Commissioner (Appeals) in the exercise of his appellate functions.
98[Jurisdiction of Assessing Officers and power to transfer cases.
10. (1) The provisions of sections 124 and 127 of the Income-tax Act shall, so far as may be, apply for the purposes of this Act as they apply for the purposes of the Income-tax Act, subject to the modifications specified in sub-section (2).
Gift-tax Officer competent to perform any function or functions.
Gift-tax authorities to follow orders, etc., of the Board.
6[Power of 7[Chief Commissioner or Commissioner] and of 8[8a[Joint] Commissioner] to make enquiries under this Act.
13. 11[(1) Every person who during a previous year has made any taxable gifts, or is assessable in respect of the taxable gifts made by any other person under this Act, which, in either case, exceeded the maximum amount not chargeable to gift-tax, shall, on or before the 30th day of June of the corresponding assessment year, furnish a return of such gifts in the prescribed form and verified in the prescribed manner and setting forth such other particulars as may be prescribed.
13[Return after due date and amendment of return.
14[Return by whom to be signed.
14B. (1) Where any tax is payable on the basis of any return furnished under section 13 or under section 14 or in response to a notice under clause (i) of sub-section (4) of section 15 or under section 16, after taking into account the amount of tax, if any, already paid under any provision of this Act, the assessee shall be liable to pay such tax, together with interest payable under any provision of this Act for any delay in furnishing the return, before furnishing the return and the return shall be accompanied by proof of payment of such tax and interest.
Explanation.Where the amount paid by the assessee under this sub-section falls short of the aggregate of the tax and interest as aforesaid, the amount so paid shall first be adjusted towards the interest payable as aforesaid and the balance, if any, shall be adjusted towards the tax payable.
(2) After the regular assessment under section 15 has been made, any amount paid under sub-section (1) shall be deemed to have been paid towards such regular assessment.
Provided that an intimation for any tax or interest due under this clause shall not be sent after the expiry of four years from the end of the financial year in which any such order was passed.
(ii) where any refund is due under sub-section (1), reduce the amount of such refund by an amount equivalent to the additional gift-tax calculated under sub-clause (i).
(ii) in a case where the additional gift-tax is reduced, the excess amount paid, if any, shall be refunded.
(3) On the date specified in the notice issued under sub-section (2) or, as soon afterwards as may be, after hearing such evidence as the assessee may produce and such other evidence as the Assessing Officer may require on specified points, and after taking into account all relevant material which he has gathered, the Assessing Officer shall, by order in writing, assess the value of taxable gifts made by the assessee and determine the sum payable by him on the basis of such assessment.
(ii) to produce or cause to be produced such accounts, records or other documents as the Assessing Officer may require.
Provided further that it shall not be necessary to give such opportunity in a case where a notice under sub-section (4) has been issued prior to the making of the assessment under this sub-section.
and where any such reference is made, the provisions of sub-sections (2), (3), (4), (5) and (6) of section 16A, clauses (ha) and (i) of sub-section (1) and sub-sections (3A) and (4) of section 23, sub-section (5) of section 24, section 34AA, section 35 and section 37 of the Wealth-tax Act, 1957 (27 of 1957), shall, with the necessary modifications, apply in relation to such reference as they apply in relation to a reference made by the Assessing Officer under sub-section (1) of section 16A of that Act.
(b) if no refund is due on regular assessment or the amount refunded under sub-section (1) exceeds the amount refundable on regular assessment, the whole or the excess amount so refunded shall be deemed to be tax payable by the assessee and the provisions of this Act shall apply accordingly.
Explanation.Production before the Assessing Officer of account books or other evidence from which material evidence could with due diligence have been discovered by the Assessing Officer will not necessarily amount to disclosure within the meaning of the foregoing proviso.
(iii) if seven years, but not more than ten years, have elapsed from the end of the relevant assessment year, unless the value of taxable gifts chargeable to tax which have escaped assessment amounts to or is likely to amount to rupees fifty thousand or more for that year.
(b) where return of taxable gifts has been furnished by the assessee but no assessment has been made and it is noticed by the Assessing Officer that the assessee has understated the amount or value of the taxable gifts or has claimed excessive exemption or deduction in the return.
Provided that, after the expiry of four years from the end of the relevant assessment year, no such notice shall be issued unless the Chief Commissioner or Commissioner is satisfied, on the reasons recorded by the Assessing Officer aforesaid, that it is a fit case for the issue of such notice.
(2) Nothing contained in this section limiting the time within which any proceedings for assessment or reassessment may be commenced shall apply to an assessment or reassessment to be made on the assessee or any person in consequence of or to give effect to any finding or direction contained in an order under section 22, section 23, section 24, section 26 or section 28 41[or by a court in any proceedings under any other law].
42[Time limit for completion of assessment and reassessment.
(ii) where the notice under clause (b) of sub-section (1) of section 16 relates to the assessment for the assessment year commencing on the 1st day of April, 1985, or the 1st day of April, 1986, such assessment or reassessment may be completed on or before the 31st day of March, 1990, or the expiry of two years from the end of the financial year in which such notice was served, whichever is later.
(4) The provisions of sub-sections (1) and (2) shall not apply to the assessment or reassessment made on the assessee in consequence of, or to give effect to, any finding or direction contained in an order under section 22, section 23, section 24, section 26 or section 28 or in an order of any court in a proceeding otherwise than by way of appeal or reference under this Act and such assessment or reassessment may, subject to the provisions of sub-section (3), be completed at any time.
50[Interest for defaults in furnishing return of gifts.
on the amount of tax payable on the taxable gifts as determined 51[under sub-section (1) of section 15 or] on regular assessment.
Explanation 2.Where in relation to an assessment year the assessment is made for the first time under section 16, the assessment so made shall be regarded as a regular assessment for the purposes of this section.
(2) The interest payable under sub-section (1) shall be reduced by the interest, if any, paid under section 14B towards the interest chargeable under this section.
on the amount by which the tax on the taxable gifts determined on the basis of such reassessment exceeds the tax on the taxable gifts as determined 54[under sub-section (1) of section 15 or] on the basis of the earlier assessment aforesaid.
56[Penalty for failure to furnish returns, to comply with notices and concealment of gifts, etc.
(2) No order imposing a penalty under sub-section (1) shall be made unless the assessee has been heard or has been given a reasonable opportunity of being heard.
(iii) in any other case, after the expiry of the financial year in which the proceedings, in the course of which action for the imposition of penalty has been initiated, are completed, or six months from the end of the month in which action for imposition of penalty is initiated, whichever period expires later.
73[Penalty for failure to answer questions, sign statements, furnish information, allow inspections, etc.
Provided that no penalty shall be imposable under clause (c) if the person proves that there was reasonable cause for the said failure.
Provided that no penalty shall be imposable under this sub-section if the person proves that there was reasonable cause for the said failure.
(b) in any other case, by the 73a[Joint] Director or the 73a[Joint] Commissioner.
(4) No order under this section shall be passed by any gift-tax authority referred to in sub-section (3) unless the person on whom penalty is proposed to be imposed has been heard or has been given a reasonable opportunity of being heard in the matter by such authority.
(ii) for a sum equal to one-ninth of the amount so paid, so however, that such sum shall in no case exceed one-tenth of the tax due on the gift.
79[Credit for stamp duty paid on instrument of gift.
Tax of deceased person payable by legal representative.
19. (1) Where a person dies, his executor, administrator or other legal representative shall be liable to pay out of the estate of the deceased person, to the extent to which the estate is capable of meeting the charge, the gift-tax determined as payable by such person, or any sum which would have been payable by him under this Act if he had not died.
(2) Where a person dies without having furnished a return under section 13, or after having furnished a return which the 81[Assessing Officer] has reason to believe to be incorrect or incomplete, the 81[Assessing Officer] may make an assessment of the value of the taxable gifts made by such person and determine the gift-tax payable by him, and for this purpose may, by the issue of the appropriate notice which would have had to be served upon the deceased person if he had survived, require from the executor, administrator, or other legal representative of the deceased person any accounts, documents, or other evidence which might, under the provisions of section 15, have been required from the deceased person.
(3) The provisions of sections 13, 14 and 16 shall apply to an executor, administrator or other legal representative as they apply to any person referred to in 82[those sections].
83[Assessment of persons leaving India.
19A. (1) Notwithstanding anything contained in section 3, when it appears to the 84[Assessing Officer] that any individual may leave India during the current assessment year, or shortly after its expiry and that he has no present intention of returning to India, the gifts made by such individual during the period from the expiry of the previous year for that assessment year up to the probable date of his departure from India, shall be chargeable to gift-tax in that assessment year.
(2) The taxable gifts made in each completed previous year or part of any previous year included in such period shall be chargeable to gift-tax at the rate or rates specified in the Schedule 85[or, as the case may be, at the rate specified in sub-section (2) of section 3], and separate assessment shall be made in respect of each such completed previous year or part of any previous year.
(3) The 84[Assessing Officer] may estimate the value of the gifts made by such individual during such period or any part thereof, where it cannot be readily determined in the manner provided in this Act.
(4) For the purpose of making an assessment under sub-section (1), the 85a[Assessing Officer] may serve a notice upon such individual requiring him to furnish, within such time, not being less than seven days, as may be specified in the notice, a return in the same form and verified in the same manner as 86[a return under sub-section (1) of section 13], giving particulars of the gifts made by him during each completed previous year comprised in the period referred to in sub-section (1) and during any part of the previous year comprised in that period; and the provisions of this Act shall, so far as may be, and subject to the provisions of this section, apply 87[as if the notice were a notice issued under clause (i) of sub-section (4) of section 15].
(5) The gift-tax chargeable under this section shall be in addition to the tax, if any, chargeable under any other provision of this Act.
Assessment after partition of a Hindu undivided family.
20. (1) Where, at the time of making an assessment, it is brought to the notice of the 88[Assessing Officer] that a partition has taken place among the members of a Hindu undivided family, and the 88[Assessing Officer], after enquiry, is satisfied that the joint family property has been partitioned among the various members or groups of members in definite portions, he shall record an order to that effect and he shall make assessments 90[on the value of the taxable gifts] made by the family as such as if no partition had taken place and each member or group of members shall be liable jointly and severally for the tax assessed on the value of the taxable gifts made by the joint family as such.
(2) Where the 91[Assessing Officer] is not so satisfied, he may, by order, declare that such family shall be deemed for the purposes of this Act to continue to be a Hindu undivided family.
Liability in case of discontinued firm or association of persons.
21. (1) Where a firm or association of persons liable to pay gift-tax has been discontinued or dissolved, the 91a[Assessing Officer] shall determine the gift-tax payable by the firm or association of persons as such as if no such discontinuance or dissolution had taken place.
(2) If the 91a[Assessing Officer], the 92[Deputy Commissioner (Appeals)], 93[the Commissioner (Appeals)] or the Appellate Tribunal in the course of any proceeding under this Act in respect of any such firm or other association of persons as is referred to in sub-section (1) is satisfied that the firm or association is guilty of any of the acts specified in clause (a) or clause (b) or clause (c) of sub-section (1) of section 17, he or it may impose or direct the imposition of a penalty in accordance with the provisions of that section.
(3) Every person who was at the time of such discontinuance or dissolution a partner of the firm or a member of the association, as the case may be, shall be jointly and severally liable for the amount of tax or penalty payable, and all the provisions of Chapter VII, so far as may be, shall apply to any such assessment or imposition of penalty.
94[Assessment of donee when the donor cannot be found.
21A. (1) Where an 95[Assessing Officer] after using all due and reasonable diligence cannot find the donor who had made any taxable gifts, for the purpose of service of notice under sub-section (2) of section 13 or under section 16, the 95[Assessing Officer] may make an assessment of the value of all such taxable gifts made by him and determine the gift-tax payable by him and for this purpose may, by the issue of the appropriate notice which would have had to be served upon the donor, require from the donee or donees any accounts, documents or other evidence which might, under the provisions of section 15, have been required from the donor.
Provided further that the amount of the gift-tax which may be recovered from each donee shall not exceed the value of the gift made to him as on the date of the gift.
95aAppeal to the 96[Deputy Commissioner (Appeals)] from orders of 97[Assessing Officer].
Provided that no appeal shall lie under clause (f) unless the tax has been paid before the appeal is filed.
(2) An appeal shall be presented within thirty days of the receipt of the notice of demand relating to the assessment or penalty objected to, or the date on which any order objected to, is communicated to him, but the 14[Deputy Commissioner (Appeals)] 15[or, as the case may be, the Commissioner (Appeals)] may admit an appeal after the expiration of the period aforesaid if he is satisfied that the appellant had sufficient cause for not presenting the appeal within that period.
(3) The 16[Deputy Commissioner (Appeals)] 17[or, as the case may be, the Commissioner (Appeals)] shall fix a day and place for the hearing of the appeal and may from time to time adjourn the hearing.
(b) before disposing of an appeal, make such further inquiry as he thinks fit or cause further enquiry to be made by the 20[Assessing Officer].
Provided that no order enhancing the amount of gift-tax determined or penalty imposed shall be made unless the person affected thereby has been given a reasonable opportunity of showing cause against such enhancement.
Application by the assessee in certain cases.
26aAppeal to the Appellate Tribunal.
(2) The Commissioner may, if he is not satisfied as to the correctness of any order passed by a 33[Deputy Commissioner (Appeals)] 34[or a Commissioner (Appeals)] under section 22, direct the 35[Assessing Officer] to appeal to the Appellate Tribunal against such order, and such appeal may be made at any time before the expiry of sixty days of the date on which the order is communicated to the Commissioner.
42(4) An appeal to the Appellate Tribunal shall be in the prescribed form and shall be verified in the prescribed manner and shall, except in the case of an appeal referred to in sub-section (2), be accompanied by a fee of 43[two hundred] rupees.
(9) A copy of every order passed by the Appellate Tribunal under this section shall be forwarded to the assessee and the Commissioner.
(10) Save as provided in section 26, any order passed by the Appellate Tribunal on appeal shall be final.
(11) The provisions of 45[sub-sections (1), (4) and (5) of section 255] of the Income-tax Act shall apply to the Appellate Tribunal in the discharge of its functions under this Act as they apply to it in the discharge of its functions under the Income-tax Act.
45aPowers of Commissioner to revise orders of subordinate authorities.
(d) where the order is sought to be revised by the Commissioner of his own motion, if such order is made more than one year previously.
(b) an order by the Commissioner declining to interfere shall be deemed not to be an order prejudicial to the assessee.
(2) Without prejudice to the provisions contained in sub-section (1), the Commissioner may call for and examine the record of any proceeding under this Act, and if he considers that any order passed therein by an 51[Assessing Officer] is erroneous in so far as it is prejudicial to the interests of revenue, he may, after giving the assessee an opportunity of being heard, and after making or causing to be made such enquiry as he deems necessary, pass such order thereon as the circumstances of the case justify, including an order enhancing or modifying the assessment or cancelling it and directing a fresh assessment.
Appeal to the Appellate Tribunal from orders of enhancement by 58[Chief Commissioner or Commissioner].
(2) 62An appeal to the Appellate Tribunal under sub-section (1) shall be in the prescribed form and shall be verified in the prescribed manner and shall be accompanied by a fee of 63[two hundred] rupees.
(3) The provisions of 64[sub-sections (3), (5), (9) and (10)] of section 23 shall apply in relation to any appeal under this section as they apply in relation to any appeal under that section.
26. 65[(1) 66The assessee or the 67[Chief Commissioner or Commissioner] may, within sixty days of the date upon which he is served with notice of an order under section 23 or section 25 68[or clause (e) of sub-section (1) of section 34] by application in the prescribed form accompanied, where the application is made by the assessee, by a fee of 69[two hundred] rupees, require the Appellate Tribunal to refer to the High Court any question of law arising out of such order and, subject to the other provisions contained in this section, the Appellate Tribunal shall, within one hundred and twenty days of the receipt of such application, draw up a statement of the case and refer it to the High Court.
Provided that, if in any case where the Appellate Tribunal has been required by an assessee to state a case, the Appellate Tribunal refuses to do so on the ground that no question of law arises, the assessee may, within thirty days from the date on which he receives notice of refusal to state the case, withdraw his application, and if he does so, the fee paid by him under sub-section (1) shall be refunded to him.
(4) The statement to the High Court 71[or the Supreme Court] shall set forth the facts, the determination of the Appellate Tribunal, and the question of law which arises out of the case.
(5) If the High Court 71[or the Supreme Court] is not satisfied that the case as stated is sufficient to enable it to determine the question of law raised thereby, it may require the Appellate Tribunal to make such modification therein as it may direct.
(6) The High Court 71[or the Supreme Court], upon hearing any such case, shall decide the question of law raised therein, and in doing so, may, if it thinks fit, alter the form of the question of law and shall deliver judgment thereon containing the grounds on which such decision is founded and shall send a copy of the judgment under the seal of the court and the signature of the Registrar to the Appellate Tribunal and the Appellate Tribunal shall pass such orders as are necessary to dispose of the case conformably to such judgment.
Provided that where there is no such majority, the Judges shall state the point of law upon which they differ and the case shall then be heard upon that point only by one or more of the Judges of the High Court, and such point shall be decided according to the opinion of the majority of the Judges who have heard the case, including those who first heard it.
28. (1) An appeal shall lie to the Supreme Court from any judgment of the High Court delivered on a case stated under section 26 in any case which the High Court certifies as a fit case for appeal to the Supreme Court.
(2) Where the judgment of the High Court is varied or reversed on appeal under this section, effect shall be given to the order of the Supreme Court in the manner provided in sub-section (6) of section 26.
(3) The High Court may, on application made to it for the execution of any order of the Supreme Court in respect of any costs awarded by it, transmit the order for execution to any court subordinate to the High Court.
73[Tax to be paid notwithstanding reference, etc.
Gift-tax to be charged on property gifted.
30. Gift-tax payable in respect of any gift comprising immovable property shall be a first charge on that property but any such charge shall not affect the title of a bona fide purchaser for valuable consideration without notice of the charge.
86[Recovery of tax and penalties.
Provided that, where the 88[Assessing Officer] has any reason to believe that it will be detrimental to revenue if the full period of 89[thirty days] aforesaid is allowed, he may, with the previous approval of the 90[90a[Joint] Commissioner], direct that the sum specified in the notice of demand shall be paid within such period being a period less than the period of 90b[thirty days] aforesaid, as may be specified by him in the notice of demand.
(3) Without prejudice to the provisions contained in sub-section (2), on an application made by the assessee before the expiry of the due date under sub-section (1), the 95[Assessing Officer] may extend the time for payment or allow payment by instalments subject to such conditions as he may think fit to impose in the circumstances of the case.
Explanation I. Any reference to sub-section (2) or sub-section (6) of section 220 of the Income-tax Act in the said provisions of that Act or the rules made thereunder shall be construed as references to sub-sections (2) and (6) respectively of section 32 of this Act.
7(3) Where a refund is due to the assessee in pursuance of an order referred to in sub-section (1) and the 8[Assessing Officer] does not grant the refund within a period of six months from the date of such order, the Central Government shall pay to the assessee simple interest at 9[fifteen] per cent per annum on the amount of refund due from the date immediately following the expiry of the period of six months aforesaid to the date on which the refund is granted.
(4) Where a refund is withheld under the provisions of sub-section (2), the Central Government shall pay interest at the aforesaid rate on the amount of refund ultimately determined to be due as a result of the appeal or further proceedings for a period commencing after the expiry of six months from the date of the order referred to in that sub-section to the date the refund is granted.
12[(4A) The provisions of sub-sections (3), (3A) and (4) shall not apply in respect of any assessment for the assessment year commencing on the 1st day of April, 1989, or any subsequent assessment year.
(4B) (a) 13[Where refund of any amount becomes due to the assessee under this Act,] he shall, subject to the provisions of this sub-section, be entitled to receive, in addition to the said amount, simple interest thereon calculated at the rate of one 14[* * *] per cent for every month or part of a month comprised in the period or periods from the date or, as the case may be, dates of payment of the tax or penalty to the date on which the refund is granted.
Explanation.For the purposes of this clause, date of payment of the tax or penalty means the date on and from which the amount of tax or penalty specified in the notice of demand issued under section 31 is paid in excess of such demand.
(b) If the proceedings resulting in the refund are delayed for reasons attributable to the assessee, whether wholly or in part, period of the delay so attributable to him shall be excluded from the period for which interest is payable, and where any question arises as to the period to be excluded, it shall be decided by the Chief Commissioner or Commissioner whose decision thereon shall be final.
(c) Where, as a result of an order under 15[sub-section (3) or sub-section (5) of section 15 or] section 16 or section 22 or section 23 or section 24 or section 26 or section 28 or section 34, the amount on which the interest was payable under clause (a) has been increased or reduced, as the case may be, interest shall be increased or reduced accordingly, and, in a case where the interest is reduced, the Assessing Officer shall serve on the assessee a notice of demand in the prescribed form specifying the amount of the excess interest paid and requiring him to pay such amount; and such notice of demand shall be deemed to be a notice under section 31 and the provisions of this Act shall apply accordingly.
(b) shall make such amendment for rectifying any such mistake which has been brought to its notice by the assessee, and where the authority concerned is the 25[Deputy Commissioner (Appeals)] 26[or the Commissioner (Appeals)] or the Appellate Tribunal, by the 27[Assessing Officer] also.
(3) An amendment, which has the effect of enhancing an assessment or reducing a refund or otherwise increasing the liability of the assessee, shall not be made under this section unless the authority concerned has given notice to the assessee of its intention so to do and has allowed the assessee a reasonable opportunity of being heard.
(4) Where an amendment is made under this section, an order shall be passed in writing by the gift-tax authority concerned.
(5) Subject to the provisions of sub-section (2) of section 28[33A], where any such amendment has the effect of reducing the assessment, the 29[Assessing Officer] shall make any refund which may be due to such assessee.
(6) Where any such amendment has the effect of enhancing the assessment or reducing a refund already made, the 30[Assessing Officer] shall serve on the assessee a notice of demand in the prescribed form specifying the sum payable, and such notice of demand shall be deemed to be issued under section 31 and the provisions of this Act shall apply accordingly.
he shall, on conviction before a magistrate, be punishable with fine which may extend to rupees ten for every day during which the default continues.
(2) If a person makes a statement in a verification in any return of gift furnished under this Act or in a verification mentioned in section 22, 23 or 25 which is false, and which he either knows or believes to be false, or does not believe to be true, he shall, on conviction before a magistrate be punishable with simple imprisonment which may extend to one year, or with fine which may extend to rupees one thousand, or with both.
Provided that the Chief Commissioner or, as the case may be, Director General may issue such instructions or directions to the aforesaid gift-tax authorities as he may deem fit for institution of proceedings under this sub-section.
Provided that nothing contained in this sub-section shall render any such person liable to any punishment if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.
(2) Notwithstanding anything contained in sub-section (1), where an offence under this Act, has been committed by a company and it is proved that the offence has been committed with the consent or connivance of, or is attributable to any neglect on the part of, any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall also be deemed to be guilty of that offence and shall be liable to be proceeded against and punished accordingly.
(ii) an association of persons or a body of individuals means any member controlling the affairs thereof.
Offences by Hindu undivided families.
Provided that nothing contained in this sub-section shall render the karta liable to any punishment if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.
(2) Notwithstanding anything contained in sub-section (1), where an offence under this Act has been committed by a Hindu undivided family and it is proved that the offence has been committed with the consent or connivance of, or is attributable to any neglect on the part of, any member of the Hindu undivided family, such member shall also be deemed to be guilty of that offence and shall be liable to be proceeded against and punished accordingly.
Section 360 of the Code of Criminal Procedure, 1973 and the Probation of Offenders Act, 1958, not to apply.
40-41[Presumption as to culpable mental state.
35D. (1) In any prosecution for any offence under this Act which requires a culpable mental state on the part of the accused, the court shall presume the existence of such mental state but it shall be a defence for the accused to prove the fact that he had no such mental state with respect to the act charged as an offence in that prosecution.
Explanation.In this sub-section, culpable mental state includes intention, motive or knowledge of a fact, or belief in or reason to believe, a fact.
42[Proof of entries in records or documents.
43[Power regarding discovery, production of evidence, etc.
Power to call for information.
Provided that no legal practitioner shall be bound to furnish any statement or information under this section based on any professional communications made to him otherwise than as permitted by section 126 of the Indian Evidence Act, 1872 (1 of 1872).
Effect of transfer of authorities on pending proceedings.
54[Computation of period of limitation.
40. (1) A notice or a requisition under this Act may be served on the person therein named either by post or as if it were a summons issued by a court under the Code of Civil Procedure, 1908 (5 of 1908).
(2) Any such notice or requisition may, in the case of a firm or a Hindu undivided family, be addressed to any member of the firm or to the manager or any adult male member of the family, and in the case of a company or association of persons be addressed to the principal officer thereof.
55[(3) After a finding of total partition has been recorded by the 56[Assessing Officer] under section 20 in respect of any Hindu family, notices under this Act in respect of the gifts made by the family, shall be served on the person who was the last manager of the Hindu family, or if such person is dead, then on all surviving adults who were members of the Hindu family immediately before the partition.
Prohibition of disclosure of information.
57[Publication of information respecting assessees.
41A. (1) If the Central Government is of opinion that it is necessary or expedient in the public interest to publish the names of any assessees and any other particulars relating to any proceedings 58[or prosecutions] under this Act in respect of such assessees, it may cause to be published such names and particulars in such manner as it thinks fit.
62[Disclosure of information respecting assessees.
41B. 63Where a person makes an application to the 64[Chief Commissioner or Commissioner] in the prescribed form for any information relating to any assessee in respect of any assessment made under this Act, the 65[Chief Commissioner or Commissioner] may, if he is satisfied that it is in the public interest so to do, furnish or cause to be furnished the information asked for in respect of that assessment only and his decision in this behalf shall be final and shall not be called in question in any court of law.
66[Return of gifts, etc., not to be invalid on certain grounds.
Bar of suits in civil court.
42. No suit shall lie in any civil court to set aside or modify any 67[proceeding taken or ] 68[order] made under this Act, and no prosecution, suit or other legal proceedings shall lie against 69[the Government or] any officer of the Government for anything in good faith done or intended to be done under this Act.
70[Appearance before gift-tax authorities by authorised representatives.
70a[Appearance by registered valuer in certain matters.
43A. Any assessee who is entitled or required to attend before any gift-tax authority or the Appellate Tribunal in connection with any matter relat-ing to the valuation of any asset, except where he is required under this Act to attend in person, may attend by a registered valuer.
Agreement for avoidance or relief of double taxation with respect to gift-tax.
Explanation.The expression reciprocating country for the purposes of this Act means any country which the Central Government may, by notification in the Official Gazette, declare to be a reciprocating country.
73[Rounding off of taxable gifts.
74[Rounding off of tax, etc.
Act not to apply in certain cases.
46. (1) The Board may, by notification in the Official Gazette, make rules for carrying out the purposes of this Act.
(g) any other matter which has to be, or may be, prescribed for the purposes of this Act.
99[Power to make exemption, etc., in relation to certain Union territories.
Provided that no such order shall be made after the expiration of three years from the 1st day of April, 1988.
Value of gifted property, how to be determined.
9[Quoted shares and debentures of companies.
2. The value of an equity share or a preference share in any company or a debenture of any company which is a quoted share or a quoted debenture shall be taken as the value quoted in respect of such share or debenture on the date on which the gift was made or where there is no such quotation on such date, the quotation on the date closest to such date and immediately preceding such date.
Explanation.The words and expressions used in this rule and rules 3 to 7 but not defined and defined in rule 2 of Schedule III to the Wealth-tax Act shall have the meanings respectively assigned to them in rule 2 of that Schedule.
Special provision for quoted shares of companies.
Provided further that where the assessee opts for the average of the values so quoted, he shall get such values certified by an accountant and attach the certificate to the return of gifts in respect of the relevant assessment year.
Explanation.For the purposes of this rule, accountant shall have the same meaning as in the Explanation below sub-section (2) of section 288 of the Income-tax Act.
(b) where the preference share is issued before the said date at a rate of dividend of less than eight per cent, be the adjusted paid-up value of such share.
(b) in the case of a cumulative preference share, by one-half of the rates specified in the aforesaid Table.
Explanation.For the purposes of this rule, adjusted paid-up value, in relation to a preference share, means an amount which bears to the paid-up value of the preference share the same proportion as the stipulated rate of dividend [being the rate of dividend on the preference share specified in the terms of issue of such share, and in a case where such dividend is required to be increased under the provisions of section 3 of the Preference Shares (Regulation of Dividends) Act, 1960 (63 of 1960), the rate of dividend as so increased] on such share bears to the rate of eight per cent.
Unquoted equity shares in companies other than investment companies.
5. (1) The value of an unquoted equity share in any company, other than an investment company, shall be determined in the manner set out in sub-rule (2).
(2) The value of all the liabilities as shown in the balance sheet of such company shall be deducted from the value of all its assets shown in that balance sheet; the net amount so arrived at shall be divided by the total amount of its paid-up equity share capital as shown in the balance sheet ; the result multiplied by the paid-up value of each equity share shall be in the break-up value of each unquoted equity share, and an amount equal to eighty per cent of the break-up value so determined shall be the value of the unquoted equity share for the purposes of this Act.
(vi) any amount representing contingent liabilities other than arrears of dividends payable in respect of cumulative preference shares.
Explanation.For the purposes of this rule, balance sheet, in relation to any company, means the balance sheet of such company (including the Notes annexed thereto and forming part of the accounts) as drawn up on the date on which the gift was made and, where there is no such balance sheet, the balance sheet drawn up on a date immediately preceding that date, and, in the absence of both, the balance sheet drawn up on a date immediately after the date on which the gift was made.
Unquoted equity shares in investment companies.
6. 10-11(1) Subject to rule 7, the value of an unquoted equity share in an investment company shall be determined in the manner specified in sub-rule (2).
(2) The value of all the liabilities as shown in the balance sheet of such company shall be deducted from the value of all its assets shown in that balance sheet ; the net amount so arrived at shall be divided by the total paid-up equity share capital of the company as shown in the balance sheet, and the result multiplied by the paid-up value of each equity share shall be the value of the unquoted equity share in that investment company for the purposes of this Act.
(3) For the purposes of sub-rule (2), the value of an asset disclosed in the balance sheet of the company shall be taken to be its value determined in accordance with the rules as applicable to that particular asset and, in the absence of any such rule, the value of such asset shall be its value as determined under rule 20 of Schedule III to the Wealth-tax Act.
(b) the amounts referred to in sub-rule (3) of rule 5 shall not be treated as assets or liabilities.
(5) For the purpose of facilitating the valuation of unquoted equity shares under this rule and rule 7, the company concerned shall have such valuation made by its auditors appointed under section 224 of the Companies Act, 1956 (1 of 1956), and a certificate of the auditors relating to such valuation in the prescribed form shall be furnished to the Assessing Officer and the shareholders of the company; and the valuation made by the auditors shall be taken into account in the assessment of the shareholders of the company.
Unquoted equity shares in interlocked companies.
7. 12(1) The value of an unquoted equity share in one of the two interlocked companies held by the other interlocked company for the purposes of rule 6 shall be equal to the paid-up value of such share or the value determined under sub-rule (2), whichever is higher.
and the resultant amount divided by the number of such equity shares shall be the value of such an equity share in such company.
(g) the aggregate of the book profits for the five accounting years so arrived at, divided by 5, shall be the maintainable profits of the company. | 2019-04-23T16:11:44Z | http://cainindia.org/news/9_2010/the_gifttax_act.html |
I bought myself this gorgeous horse to add on my horse collections. I had a good boxing day deal for this one. I guess I am ready to start spending few bucks once in a while for the things I love eventhough it is not as important as it seems. But collecting something sometimes can release some stress.
I love horses aside from the myth saying that it can create some LUCK somewhere. I don't believe on LUCK. I always believe that if it is God's will, then anything is possible. I just love to have somethings that can be remember as ME. Just a hobby I guess!!!
I declined about 4 tasks today. I just simply don't feel like taking opportunities that require to much links and later on will receive a notification of link removal. I really think that too much links can create an error to both the one giving the link and the one receiving the link. Most of the advertisers don't realize this until they are fenalized by the big boss.
Aside from the too much links required, I am also not comfortable with their system of creating the link myself. I wish they have the system of just copying and pasting the link with the keywords together so their blogger don't have to spend too much time creating the post.
Og well, I guess I shouldn't compare each system from each of my sponsors. Everyone have their own unique way of running their business. I just wish they don't require too many links for each post.
My laundry area is so small which makes me spend most of my days and time doing the laundry specially during weekdays when I am supposedly just doing some cleaning maintenance in the kitchen and basement. I have to wait another day until the first batch of clothes that I hanged to dry and do another batch the next day. It is exhausting.
So I bought a new laundry drier and do the laundry during the weekend only. I just hanged few clothes that are thick and takes long time to dry. It is so convinient.
I also bought a new upright vacuum cleaner for my kitchen area so I don't have to exert extra effort in bringing one vacuum up and down the kitchen from the basement when I need it. Now I can focus more on important things during the weekdays. Thank you Lord for all the blessings.
Ahhh I am so happy putting my house this Christmas Decor. I don't have a Christmas Tree anymore since my kids are not babies anymore, but it is good to feel the Christmas season inside the house after few years of not feeling it in my house. I am happier now than before and it just simply shows on the way I take of my house and my family.
I have finished one assignments from my newest sponsor. I also was able to submit 3 assignments from my very first sponsor. It was a direct offer from the advertiser and the price is pretty much inspiring. God is so good to me.
My life is so busy and I guess this keeps me going each day. Some days I feel stress but most of the time I am happy thinking how much blessing are pouring upon me. So why not take advantage of it.
I am there to work and work alone. If people don't like me then so be it. As long as we can work then everything will be fine.
Some people have to be such a hypocrite and just cant stop talking and judging on things that they see around without even looking at their own dirt. Ahhhhh who cares!!!!
My life is full of things that I have to thankful for. God is so good to me.
Too busy to update my blogs and I really think it is about time for me to slow down a bit on my part-time cleaning to accomodate me regular routine both online and personal life. I have to balance everything and be able to do everythings without stressing myself too much.
I am deciding to cancel one of my cleaning customer so I will have more time to do things that I regularly do like blogging and keeping my house neat and clean all the time. Beside, I can always have new customer anytime I want to.
Funny how some people just can't control their enviousness for my happiness. The more I ignore them, the more they hate me.. hahahahahha!!! Ignore, Ignore, Ignore!!! They are such a trash so all they deserve is a BIG IGNORE!!!
Is this how important my attention is?????? These people just make me feel so important!!!!.. I feel so special!!!
Some people cannot accept the fact that not everyone work hard just to pay bills. I do work hard because I have plans for me and my family. This is the reason why I am happy working hard. It is not that I have to force myself to work double time because of some due date bills. I am happy working hard because I can see all my plans taking in place. Thank you Lord for all the blessings.
I just withdraw the balance I have on one of my paypal account where all the income I receive from blogging goes through. The balance has been there for a couple of months now and I didn't realized that I have enough balance to transfer to my bank account.
I never thought I can start cleaning again or even do it while I am working full-time on my night shift job. I dont know when, where and what push me into this. I guess it's my boredome staying at home alone in the morning. I am happier now that I have something to be busy with in the morning and make extra income from it...Thank you Lord for all the blessings.
I still have not even started doing the last two small orders and I feel so so so bad about my laziness. I have few cleaning cancelation and had so much time last weekend, but I am so stupid to abandon this two small orders. Now I don't know if I can do it this weekend and I have to.. grrrr!!
I thought shutting down my webstore is a good idea but not in my plan right now. I still want my website up and running because I spend so much effort to make this up and running. And look, I am still getting some orders.
Once I got the time and full motivation, I will start advertising it again. I wanted to and I have no problem with that, but I am just not sure if I can or will have enough time to do all the orders. There is always the right time for everything.
So funny how envious people looked when they are confronted. Their face turned stupidly BLANK!!! They always thought they can get away with their evilness.
I know we should always be nice but when people keeps on provoking you, you can't just sit around and let them do their stupidness. You have to stand up and do something about it.
I don't care where it will go or how will it go, but I will not let anyone just do things against me that makes them happy.
I have two small Mineral Makeup orders but I am too lazy to make it. I am just unmotivated for my Mineral Makeup business. For some reason, the extra money I am in my cleaning just makes me feel contented and at the same time, lose my interest in my online business. VERY BAD!!!
The montly payment for the domain name and service of my webstore continously goes to my credit card. I can stop it and just abandon what I have started but I just don't have the heart. I have put too much effort aand energy for this webstore.
I didn't update any of my blogs for a couple of days because I know there are some people trying to find out the reason behind my absense. I just hate it when people snoop on someone's life like that. They can always ask so why snoop?
Anyway, I didn't update my blogs as well as submiting about 3 opps from my newest sponsor. But I am happy to be able to submit them all at the right time. Thank you Lord for all the blessings.
PR of this blog dropped and most of my blogs have drop its PR too. Oh well, what can we do.. It's the Big Boss decision and we cannot do anything about it.
For this blog, I will not be surprised for the sudden lost of PR, since I have not been regularly updating this blog for a couple of months now since I have been very very busy with my cleaning. I guess I will also take the same reason for the rest of my blogs since I have lost my time in updating all my blogs.
I will try my best to regularly update all my blogs, at least 2 times a week. I know it will be hard since I am really booked for cleaning even on the weekend. But I know that God will help me on this.
I just love my hair using the Topstyler that I ordered online. I am still thinking if I will post this before and after picture on my FB, because I am sure some will like and and most of them will hate it..heheheheh!!!!
The funny and irritating part is when someone who hates me will buy the Topstyler and copy me, since I know very well one chronic COPY CAT on my FB list. She will either hate it or copy it. ahhhh whatever!!! I will just enjoy my TOPSTYLER.
Yey!!! Finally, the Topstyler that I ordered online arrived today. I am so happy. I tried is already.. My hair was very oily that's some part of my hair were not curled but some part curled nicely. I will try to curl my hair again tomorrow and see if I can take a picture of me to post on my facebook. hehehehhe!!
I am still thinking about someone's way of thinking and way of living as well. Why she act like that and yet, will embarass herself in borrowing money to different people.
I really hope that she will realize that God see, feel and know everything inside our heart. If you keep on hating people around you, life will never be good to you.
I work hard and will enjoy what I work hard for. But some people are unfortunate to work hard and yet, cannot enjoy much all of what they have been working hard for. Misfortune keeps coming in.
God sees us no matter where we are. I know that I have made mistakes before and will always make some..... Mistakes should make us smarter and not a hater!!! Life is good, because God is good!!!
We will be away for two days and one night and my father will be left alone in the house. So I am plugging in my Nettalk to make sure that my father will hear the phone ring in case we call. Also, so he can use it if he wants to.
This is what's good about having Nettalk, you can unplug it and just forward the call to your celphone. However, you need to have unlimited calling so you won't have to worry about over using your calling data usage.
Me, my husband and my two kids have our own celphone so I realized that paying more than $50/month for home phone doesn't make any sense. With Nettalk, I only have to pay $40/year.
The Dermawand is finally here!!! Yepeyyyy!!!!.. I am so VAIN!! hahahhaha!!! Who cares? I am happy pampering myself so i dont give a damn what other people think about buying all these beauty products.
Anyway, I have finally booked a Hotel for us in Grove City Pennsylvania, USA. Me and my family will shop. I will be spending my money to make my beautiful kids happy!!!
I will bring my Dermawand with me in Pennsylvania to make sure that my skin will be pampered continously.. hehhehehe!!!!
I am happy looking at my bank account and not to mention the cash I always have on my wallet. This is just the result of my hardwork. It really makes a difference.
Aside from the money, I feel self-fulfilled somewhere because I never thought I could do this but I did..... It's like running a business and making customers satisfied with my service.... And every time I see and feel the satisfaction of my customer, I feel fulfilled inside which gives me this extra smile on my face.
I can't wait to have the DermaWand and try it on my face. Now I just ordered Tospstyler and I can't wait to have it and try it on my Hair.
Yeah I am vain and I am happy making myself beautiful. I don't see anything wrong with buying all these beauty equipment. I work hard and I deserve to be able to have some of the things I love to have for myself. I just can't wait to have these two new beauty toy for myself.
I already have the shipping notification of Dermawand and I can't wait to have it and start using it. I have a very strong feeling that it will work effectively like the Nubrilliance I bought about 3 months now.
I don't care how they see me, what they think about me, and what they say about me. All I know is I am happy and I will continue being happy. All I know is God is always good to me because he is always there when I need him.
Sure life have ups and down and who don't? But at the end of the storm, I know he is just beside me and my storm never stay long.
I am so happy when I open my account from my newest sponsor. I have about 16 new opportunities to work on this week. All the topics are interesting to post on my blog and I am excited to start creating article for each assignment.
Anyway I just got home from my bi-weekly Sunday part-time cleaning. It's a 4 hour job but I was able to finish it for 3 hours. God is good to me. My plan is all in place.
Hard work is needed for all God's blessings are all just infront of us. It's only up to us how to make all those blessings from God to work for us. Thank you Lord for all the blessings.
Oh yes, I am 44 yrs old but does it show? I love pampering myself. I buy those beauty products and keeps using it. It's not that I am afraid to get OLD.. Of course NOT because we all go there. I just want to make it nice and lovely...Ohhhhh di ba?
I just declined few tasks from my other sponsor. I am so busy and their system is quite time consuming. Creating 3 links with appropriate anchor text just consume my time so much plus, they require quite long article for each post.
This is the reason why I am more comfortable accepting jobs from my newest sponsor. Their system is very easy and fast. All I have to do is copy and past the link with anchor text and creating a personalized article for the products or services.
I guess this is the end of my patience and understanding with one person that I consider a friend eventhough, most of the time she is backfighting me due to her bitterness and jealousy. Perhaps her high ego and pride attitude will always stay the same, so I guess it is about time for me to avoid this person and move on.
It is sad to learn, how hard it is to find someone whom I can consider a friend. Someone who will never see me as a competitor in their life. No matter how humble and honest I try to be, they will always see me in a different way.
I realized something that makes it as my wake up call. Sometimes what we thought can be easy may not be as easy at we thought. Sometimes it takes time and more work to make something come into reality. Things that we are not happy doing sometimes have a good reason why it is there for us. God is good and he knows always, what is best for us. We just need to keep our eyes and heart open to everything and accept it even if it is against our will. Everything is not permanent.
I am so tired dealing with creepy people. I want to change my life. My life on that place is like a life of a celebrity. I always find myself trying to hide things from anyone because once you share something to someone, more people might know about it. I was wondering if this is really a normal things for human beings.
I guess I am just too tired of it. I need more privacy... I want to hold my time and do my things without following different expections. Everybody needs some changes at some point in our life. I need it now!!!
I have been thinking of switching to other cable tv company because our cable tv provider bills is getting higher almost every month. I know that there are so many tv provider that is coming out nowadasy, and this makes choosing which provider is suitable for us harder. So I thought of making some research on the internet.
I saw this direct tv website. They offer package that provide clear picture with 1080p HD quality and Dolby Digital 5.1 Surround Sound. It says that they have superior service with with 5 package options which are the ENTERTAINMENT, CHOICE, CHOICE XTRA, CHOICE ULTIMATE and PREMIUM Packages wherein Local channels are available with all package.
They rae the top satellite TV provider which is better that DISH Network and cable. Over 19 million Americans are enjoying directtv service every day,from the most sports, movies, shows and HD channels. DIRECTV offers the best dx3 technology that will make your viewing experience to be the best. Their HD DVRs program provide mobile apps that you can set your DVR from anywhere. So even if you forgot to hit record, the show gets recorded. One HD DVR will work for up to 15 rooms.
I've been busy making money and I forgot to update mos of my blogs including this one. Ahhhhh, working full-time and having a prt-time job can really make you busy but everytime the money land on my hand, everything just feel ALRIGHT. hehehhehe!!!
Good thing that I don't have any order lately, otherwise I will not know how to squeeze in my schedule to do all these things. My blogging and my online business is not making that much money as it used to that's why I have to find another way to make extra money, but I dont have the heart to stop it because its been part of my daily living. I just need to be more organize and focus to keep myself doing it all.
I have one customer who keeps calling about the depigmenting cream that I posted on one of my beauty and health blog. I am so happy how my blogs have been reaching a lot of people. I might call her later today to know if she is interested in buying this depigmenting cream so I can ask someone from the Philippines to buy about 5 depignmenting creams for me. This way, the creams that I will personally use will be actually free since the customer will pay for the shipping. Wooohooo!! Love this business.
I am so glad that my customer enjoyed the Making Mineral Makeup Workshop yesterday. I totally forgot to take a picture of me together with my customer yesterday for remembrance and of course, to show it off on my Facebook. Let everybody know how productive I spend my Saturday sharing my skills and talent with someone I dont know, and make money from it. It is actually a good money and how I wish there are more people who will be interested in Making their own Mineral Makeup.
The workshop started at 2:30pm and end at 5:00pm. It is all worth the time with the amount of money she paid through Paypal. I am happy that she still find it very interesting, fun and educational despite the fact that I didn't have the handout which I normally have for every workshop, because my printer run out of ink.
I might post an advertisement on Kijiji with this workshop. The money is good actually and it doesn't take so much effort since I have done this workshop for a couple of times already. Everything comes out naturally since it is really my skills that I am sharing.
Today I am planning to clean my house to give an estimate on how much do I really have to spend in cleaning a house. Then I will start preparing the basement and all the things I need for the workshop tomorrow at 2:30pm. I thank God for this blessing. I am glad that this is already the third time to do the workshop so I don't have to spend too much time thinking how to do it. All I need is to prepare the place and the things I need.
How I wish that there are a lot of people who are interested in Making their own Mineral Makeup. One workshop cost is just so nice for me to be thankful for. Aside from the Money, I enjoy imparting my knowledge on How to Make Mineral Makeup. This is my expertise so I hav no worries to answer any of their questions.
I am glad that the problem I encountered with the domain name of one of my blogs are already resolve. The problem with the webhosting company that I am with is that, thet don't have any customer service where I can call or even email to discuss the whatever problem that I encounter. They sure have a very cheap price but it is also important to have good and easy access to any customer service representatives for any technical issue that may occur.
There are so many webhosting company that you can choose from but it is important to know which of these website hosting is appropriate to your need of domain name. WebsiteHosting.com provide the list of top 10 list most trusted and reliable web hosting providers. They made a thorough research and compared different web hosting companies from more than seventy hosting review sites to come up with the selection of the best web host which can be seen on their website.
They are an independent hosting review and ranking websiteand are not being paid by any web hosting companies. So whether you are in need of a web hosting for your personal or business use, it is good to visit this website and make your research easier in finding the best webhosting that will suit your needs. You can visit their page for webhosting news to learn more.
I finally mailed the small order last Saturday. I have to tell lie to the customer that the order was probably lost. I need to shapen up my attitude towards my business. Otherwise, I should shut it down which is very unlikely because it has been part of my life.
I just send a "Money Request" for the customer who is very much willing to attend the Making Mineral Makeup on Satuday. I hope to receive the payment soon, so I can start setting up my place for the workshop. At least, this is the second workshop that I will conduct and it is not that hard for me anymore. I will just print it out, prepare the materials and everything are all set, to share my knowledge in Making Mineral Makeup.
I just love sharing how to make mineral makeup, however, my mind is not set with this right now. My excitement for the workshop is being covered by something unpleasant that is happening in me right now. I wish this storn will go away soon and start enjoying my day again.
The sample order is now ready to be shipped. I was suppose to mail it yesterday but I have to attend to one special appointment and I went home so tired. So I thought it would be better to mail it anytime today. I will ship it together with the Mineral Foundation Sample that I want to give to my bestfriend from the Philippines and the the change of premium form of our Insurance Policy to our Insurance Broker. I forgot to ask hubby to sign the form so most probably, I will mail it this afternoon after hubby sign it.
Everyday is busy for me lately but I am hoping that sometime next month, my morning after work wont be this busy so I will have time to relax before going to bed. It is very stressful just thinking how many things I have to do every morning when I get home from work. I try my best to take it all easy and do it one day at a time. I have few more things to catch next week. Huhhhhh!!!!
I was able to do the label for this one pending order even if the ink of my printer is almost gone. Thank God. I will just do my workout for today and see if I still have the energy to start processing this order. I still have some laundry to do for today. Gzzz, everyday is a busy day for me. I need to go to bed before 12 so I will see if I can do all of this.
,br> I also need to print something for our insurance but I dont think I can print it since the ink is almost gone. But I will still try.
I also need to call my laser clinic to set an appointment but I dont think I will do it today. I might do it sometime before the end of this week. I will to fix the order for my ink at best buy. I think there is a problem with the credit card I used to order the ink.
Grrr the printer ink that I have is not refillable so I have to wait for the printer ink that I ordered online. This is so terribly wrong. I might email the customer and tell her that I will just double the order she made for this delayed. Or I will just try to do the label tomorrow and see if it will look okey to use the remaining ink for the label. Gzzzzz, this is just not right.
I forgot to have the ink cartridge be refilled. I cannot make a label for this one pending order. I might go to the mall tomorrow again to have it refilled. The Ink that I ordered online won't arrive until 10 days and I need the ink to make the label for this order. I really hate my forgetfull mind. Anyway, I still have some pending things to work on this coming week. I am trying not to stress myself on finishing it all that's why I am making it one day at a time. I hope I will finish them all this week so on the following week, I can just relax when I get home from work and perhaps, scheduled for a massage.
I have to refund the payment of the last order because I realized that the price of the product that she ordered have increased by my supplier and I wasn't able to update the price on my webstore. The prices increase was too big and I cannot afford to lose money for this one order. I feel bad about it but what can I do? I do this business to make extra income and not to lose money. My fault for being negligent on updating the price of my products.
Oh well, I don't know when can I find the drive to be focus on my business again. I just don't want to add stress on my life anymore. I had enough during that year when my mind was so focus on starting up my online business. I look terrible during that day. My skin was full of pimple breakout because I have no time to wash my face and keep using products that are not suitable on my skin. I was so FAT because I am always in a hurry and end up eating the wrong food. I dont want to go back to that anymore so I will just do whatever I can.
I have one pending order before I went for my 3 weeks vacation in the Philippines and I have not started procesing it. And I already have one order for this week so I have two orders to make. I am not sure when to start making this two orders since I have so many pending things to do.
Ahhh my stressful like just started. I dont want to stress myself doing everything in one day since I have to work on my full-time night shift job. I just feel so stress whenever I see my house messy and filty so I spend most of my time last week just cleaning and tiding up my house when I get home from work. And I already have some line up of things to do at home... gzzzz God help me to do this!!!
I am enjoying my vacation with my daughter so much. I don't think I need any friends to make my vacation completely fun. Just being with my daughter and my family is already enough for me to thankful for.
I just need to accomodate some people unreasonable expectations of me, spending money for then with the thought that I have enough money to spend for them. Oh well, what can I do?
I have one task to make from m yother sponsor and I like the product that I will advertise on one of my health blog. It really fit on the content of my blog and one of the things I want to blog about. Not to mention that the price offer was pretty good. I will do it maybe tonight to make sure that the advertiser to receive it soon.
Anyway, I am thinking of making a big bunch of Mineral Makeup Foundation for my sister to use. She also have sensitive skin so I know she love it the last time I send her some batches of Mineral Foundation. The last batch that I made for myself are still good enough for me to use during my vacation in the Philippines so I don't need to make some for myself.
I dont have any assignments or tasks from any of my sponsors. I also don't have any orders. Well, it is a good timing not to have any extra work for now because I am busy preparing for my vacation in the Philippines next week. I am trying not to be stress with the issuance of my new passport but I really hope I will get it on the scheduled day of release.
I heard that there will be a new Walmart that is soon to be built near our house. I am thinking of applying of a part-time job in Walmart if it is really true. This will keep me very very busy and will take my mind off the boredom.
It's a lot of work specially if your motivation have been gone for a long time. It's hard to explain why I lost it but for now, I will try my best to keep it live on the internet and hope that someday my enthusiast will come back and bring back the smile in my face everytime I am processing orders. Thank you Lord for all the Blessings.
Oh God, I still have so many things to do today and tomorrow and I asking God to give me the motivation to finish these 4 orders that I was supposed to ship for 2 weeks now. If I am the customer, I am pretty sure that I will be questioning the owner of the website, why its taking so long for the order to be shipped.
I am sometimes having some thoughts of canceling or deleting my webstore so I don't have to worry everytime there is an order to make. I just lost my motivation on my online business and I just want to take things life easy each day.
I finally receive some of the claims I submitted at our new Company Insurance. I am still waiting for some more that are now being processed. I hope to have the money soon because all the bills are on my desk now. I also received that half of the payment for my orthotics, I need to re-submit it to hubby's insurance so I can have the rest of the amount they have to re-imbursed. I am glad I can have weekly massage since our company increase the massage therapy benefits. I really need this for the type of work that I have. It really makes a different.
The 25 pieces Mineral Foundation Jars and the Red Iron Oxide that I ordered from one of my supplier in USA, finally arrived the other day. Now I dont have to worry if I will run out of jars or not. I have to make sure to have enough stocks of items that I purchase from my supplier in USA because it takes two to three weeks for my order to arrive.
I am just waiting for the Bynny Tails Puffs that I ordered from my other supplier in USA. I hope to receive it soon so I can post the availability on my webstore for my customers who are waiting for this item. I am also going to post it on my blog once it is already available for purchase.
I transfer the remaining amount I have from my blogging paypal account to my bank account, after I purchased everything I need for my online business. It's been very slow for a couple of months and I have not transfered any money from my paypal since last November. Good thing that the money I earned from Google Adsense came in last month which gave me enough budget to buy things for me and my kids during the holiday. God is so good to me. I have two small orders to make and as usual, I am lazy to do it. I am planning to go to bed early today after doing one phone call to the immigration to make a follow up for my father's citizenship interview. Then I hope to be able to watch one episode of Filipino Drama series. But if I don't have enough time, I will just watch it tomorror. I might just start doing the label for these two orders tomorrow.
My weekend is over again and I will be back to work again tonight. I have been working in this company for so long now and so far, I am very happy with how the company have been paying me with all the services and hard work that I have dedicated for them. However, I must admit that money is not all the answer to complete my happiness. I still wish to do something that I really love to do.
There are so many rewarding jobs or careers that I can choose from, but the question is, which one will give me self-satisfaction? I think this consultant interview course will be very interesting. It is conducted by Oxford Medical. It has an excellent feedback and all their tutors are NHS consultants with excellent interview experience and training.
I also think that medical teaching course will be interesting since I have some background in teaching already. It is a growing field. However, you have to be a doctor yourself to know how to teach other doctors and staffs.
Medical field is one of the fast growing job and career opportunity. I would love to take medical management course as it only take 3 day course for doctors that is delivered by expert NHS clinicians and managers. But for my age, But for my age, it will be hard to focus to start a new life as big as this.
Yey It's Friday and I am so happy to see new set of assignments from my newest sponsor. Thank you Lord for all the blessings!!!
Today I went to bed early so I can have enough energy for my kids. I brought one of my daughter to a 45 minutes massage therapy and I am so happy to see her happy. She looks so relax. I am glad that our new company insurance gave us enough amount of money to cover this expenses for me and my family.
Tomorrow will bea quite busy day for me. I have a massage therapy and 10am and then 11:30 appointment for my car maintenance.
I was able to do everything yesterday, and now it's time for me to relax watching one filipino drama online... hehehhehe!!!
I did the last load of laundry yesterday, fold clothes, change the bedsheet and pillow cases of my bed, call our company insurance for some questions, call to set an appointment for massage therapy for me and my kids, did my hot bath salt and was able to watch one episode of the filipino drama series.. lols... lovely day and I hope to have another lovely day today since its my last night at work tonight..
I don't think I will be able to do one thing that I planned to do for today because I am running out of time. I want to go to bed early today because I wasn't able to get a good sleep yesterday because of too many phone calls and noises.
I just need to call our new company insurance to know how to submit claims online and to know if the workout DVD and running shoes are covered under our wellness account. I want to make sure these are covered under our plan before I buy them. I will just call them tomorrow.
Anyway, I was able to follow up my order from TKB with regards to the shipping price. I wasn't charged for the shipping and I will usually get a response from them to pay for the shipping. Strange but until now, I haven't got any response from them since I placed the order last weekend.
Oh well, I wanted to watched the new filipino drama but I feel so sleepy already. I will see if I can watch it tomorrow.
My other blog where I usually write my daily activities have been busy so I just decided to write my daily life here for a couple of days and write the summary on my other blog on the weekend.
Anyway, I did all the things I planned to do for today like calling my previous company insurance to get something. And then set an appointment at Castle Honda for the maintenance of my car on Saturday.
I have few mails to send at the post office but I will mail it this afternoon after I pick up my kids from school. This way, I only have to go out once for today.
I still don't have any email response from the customer of this one pick up order. I hope to hear from her soon. I feel a little bit guilty since I am suppose to finish processing this order since last weekend, but I was so unmotivated to work on it. Silly me.
Well, at least I have no pending work on my head about my online business. I was able to order all the things I need for my Mineral Makeup products. I hope to receive all the items I just ordred from my two suppliers in USA soon.
I am finally done with one pick up order and I already emailed the customer. I will be waiting for her response on when will she be available for picking up the order.
I also order the sifter jar and the red bc iron oxide at coastal scents since I am running out of these two items. I am glad that they offer discounts for all order this weekend.
I also order the bunny tail puffs on TKB since it's been out of stock on my webstore for quite a long time now. Also, I am using this for my personal use and I only have about 3 puffs available for myself. So I ordered and hopefully to have it soon so I can post the availability on my webstore.
I also did few changes on the products on my webstore since I decided not to use the Fruit and Botanical Extracts anymore on any of my products.
Ahhh, finally!!! I did some work for my business.
I feel so exhausted to start the processing of this one pick up order so I might start doing it tomorrow and will try my best to finish it at the end of the day so I can email the customer when does she want to pick it up.
Anyway, I am happy that I was able to submit the last assignment from my newest sponsor today since today is the deadline of submission of all the assignments. Thank God for the blessings.
Gzzzz I am so busy with my workout and I really have no time to do this one pick up order. But since tonight is my last night, I will make sure to start doing it tomorrow morning after my Dance Workout. I am not sure if I can finish it but I will try my best to have it done by Saturday morning so I can email the customer to pick it up on Sunday or anyday next week.
My mind is more focus on my fitness life. It keeps me look forward on something and keeps my mind off from something unworthy. However, my mind is still off in making my online business my priority. I have not started working on this one big pick up order and I really need to finish this order before the weekend so I can email the customer when can she pick up the order.
Aside from that, I also need to spend more time updating my blogs particularly this one because it might lose its good ranking if not. I am trying to avoid that to happen because it is affecting my online income. I still thank God for all the blessings despite my negligence in working harder to all the sources of my extra income online.
I have one big order to be pick up. I didn't realized that it was a pick up order so I need to focus on making sure that this order will be finish before the next weekend, so the customer can pick it up next Saturday or Sunday.
Gzzz, I sometimes want to stop my online business but it's hard for me to turn my back on this business because I worked so hard to start it. But then, my mind is not well focus on this anymore and I just have to push myself to process the order everytime. Oh well, it's good for extra income anyway. | 2019-04-22T12:33:20Z | http://mydaysinmymind.blogspot.com/2012/ |
These design documents were devised to assist in development of similar Starflight style or any space simulation games. Authored by an interested fan lacking any real resources into how either Starflight 1 or Starflight 2 was designed, they are a combination of gameplay observations, reverse engineering discoveries and outright speculation. Information is focused on underlying game logic and avoids discussion of any particular interface and storyline/plot. All material is original work and copyright (C) 2006 SWirsz and may be used freely as long as it is credited. Feel free to suggest any other topics.
Sources include discoveries recorded on this web site, the Early design documentation for Starflight 1 released by T.C.Lee, and the Microsoft Excel data tables created by Jason Horner for Starflight 1 and Starflight 2 This document also glosses over basic gameplay details which can be found in the Starflight 1 and Starflight 2 manuals.
These documents do not describe any Starflight game in existence, but attempt to promote and break down ideas which could be used for future Starflight-style games. As with most design documents not everything here may be completely feasible to implement.
Notices from Interstel given over time or given in response to major plot events. The purpose of these notices is to give the player hints to start off with, announce major events, give the player a sense of accomplishment and demonstrate consequences of actions, and of course humor.
Evaluations are messages from Interstel to the player usually with a monetary reward or penalty. Examples include colony recommendation rewards and penalties, loss of a terrain vehicle and notice of its replacement, rewards for major plot events, etc.
Although there is no limit on how many crew can be hired and trained, only six crew can be used on a ship at once as there are only six roles that crew can fill. One crew person can fill multiple roles however so there is no fixed requirement on the number of crew any ship is required to use. Crew can be hired at starport or they can be obtained through exchanges with alien races.
NAVIGATION Accuracy of weapons and chance to get lost in planetary storms and continuum fluxes.
Crew must be assigned to fill all of these roles before the ship can leave starport. If a crew member dies or becomes comatose, the next most highly skilled crewmember takes over there role. The player should have the ability to create, delete, assign, train, and cancel training of each crew member.
* In Starflight 2, these races had undefined default skill levels. Their initial skill levels depended on the crewmember that was traded for them, and they had a maximum skill of 250 in all areas. If they can be hired at starport their skills need to be better defined and toned down.
Training takes time and money. Both are determined by the learn rate. Let us again take an example of a Veloxi. The learn rate of the Veloxi race is 6, and this particular individual has a learning rate of 7. The initial navigation skill is 100 and the player wants to train this crew member in navigation. When the player chooses train on the personal menu, they then choose the navigation skill and are prompted for how many training sessions. The computer takes the highest possible 90% percent maximum train value (225), calculates the difference (125) and divides by the learning rate and rounds up (18). The user is prompted then for how many training sessions (0-18) and then pays for the training sessions and a crew member is unassigned any ship position and put into training mode ("In Training" logo appears across the character record). That character becomes unavailable for as many days as training sessions are selected. Every day that passes the character will increase and skill equal to his or her learn rate. If training is selected when the character is already in training, the option "Cancel Training?" appears and if the player selects yes then all unused training sessions are refunded and the character becomes available to be assigned.
Only real experience on board a ship will allow a recruit to increase their skill past the training limit to the individuals maximum ability. The following table describes the actions that increase a crew member's skill.
Three classes of ships that may be purchased. Each subsequent ship allows higher equipment class options at the expense of ship mass. Ship mass affects acceleration in combat and fuel usage (hyperspace and landing on planets) All ship equipment regardless of class except for engines and armor has the same mass. Changing ship type causes all equipment to be sold at market rates and then the change in relative price is either added or subtracted to the player's account.
Acceleration of other ships relative to the interceptor should be determined by prototyping and game testing.
Cargo pods, thrusters, and turning jets have the same purchase and sale price. All other equipment fully repaired is sold for 90% of its original value. Perform a check when selling cargo pods to ensure the player can not sell a partially full or full cargo pod. The ship has a base storage of 50 m³ and each cargo pod stores 50 m³. This minimum number of cargo pods = (Total Amount of Cargo - 50) / 50.
Drydock repairs are available for instantly repairing ships systems. Cost is determined by equipment initial value X percent damaged X 1.25. The communication system and sensors are evaluated at 8000 each.
All interface controls should be accessible in three different ways. The classic the system is a basic menu interface, accessible when that game is paused. Likewise a series of relevant icons clicked on by the mouse can also provide controls. Finally a set of customizable hotkeys is highly useful especially for combat controls in particular. Controls only need to be visible and accessible in certain context areas. One suggestion would be to use the function keys lining a roll of icons on the top of the screen that changes for every area the ship is in.
Let's take for example a patient with 50% health in a terrain vehicle being treated by a doctor with 210 skill. The patient's natural healing will heal one point every 12 hours and at the same time the doctor will heal (210/50)/2 = 4.2/2 = 2.1, round down to 2 health points every hour on top of that.
Crew left unassigned any role and abandoned at starport heal as if they were being treated by a fully qualified (250 skill) doctor onboard a ship.
A number conditions may leave the player stranded with no possibility of further actions. Examples include running out of fuel or having destroyed or inoperative engines which cannot be repaired. In this case the player has the option to put the crew into cryogenics (sleep pods) and sending a emergency distress call to Interstel for rescue. From the players point of view the transition from where they are to starport is instantaneous. An animation may be played here for the return to starport, either simply a fade to black and reappearance at starport, or a high-speed travel animation, or a fallout style moving animation of a cryogenics pod.
Time Passage: measure hyperspace distance to Arth or to the starport in the sector and multiply normal hyperspace travel time by three.
Towing Cost: Determine as a factor of the players engine class and the hyperspace distance towed to starport. Use a factor multiplied by the fuel cost calculation of the star map for simplicity. Balance this value out so a player with class five engines towed halfway across the galaxy will pay roughly 100,000. Towing charges are assessed at operations/evaluation. The player is required to view the evaluation before they launch. Towing charges may make a player's financial status negative.
Damage is first applied to shields, then armor, and then structural items and crew. Damage to structure is divided randomly between seven categories. If any of these categories are missing, then damage will be applied to the remaining categories at a higher rate due to statistical distribution. Damaged items have the possibility of failure and becoming inoperative every time that component is used. Ship systems are displayed as being 100% operational initially and operational percentage is reduced by damage. The percentage chance of a component becoming inoperational is described in the table below. An inoperative component has a 5% chance of becoming operative again every single time 1% of its damage is repaired.
Repair Time = Optimum Repair Time * round up(6 - engineer skill/50). Again the same captain's bonus to the engineer skill applies, but if the derived engineering skill after the bonus is 249, the engineer will take twice as long as an engineer with the derived engineering skill of 250.
Damaged systems never repair themselves unlike injured crewmembers. Destroyed systems are 100% inoperational immediately without any failure check. Also when a system is being repaired there is a 7% - round down(engineer skill/50) chance (range of 2% - 7%) of needing between 1-10 cubic meters of a random repair mineral every single time 1% of the system is fixed. The player is notified every time a mineral is required for repairs. If that mineral is in cargo a question will be asked "Shall I take this from cargo? Y/N" If the player says no or if the mineral is not in cargo then a message ceasing repair appears and repairs that component stop. If the engineer is told to repair a different system while currently working on another one, the message "I am currently repairing system X, shall I stop and start repairing system Y?" appears with obvious consequences.
* When a ship system is 100% damaged it is considered destroyed and unrepairable, so these time estimates are really only the period of time it would take to repair 100% of a ship system, repairable damage is never greater than 99%. Destroyed systems can only be repaired in dry dock at starport or by selling and replacing the system. When hull damage reaches 100% the ship is destroyed and the game is over.
** Chance of failure on using engines is only rechecked when the ship has not been moved in five seconds of real time. Engines will not fail if a player is constantly thrusting and moving, only when he starts to thrust and move. An example would be if engines are 60% operational, then (1 - 60%) / 5 = 8% chance of engine failure every single time the ship starts moving.
One hour of game time for every 10 seconds of real-time except when the game is paused, at starport, in communications, or in a trade center. Encounter game time may also be slowed or stopped.
Entering a solar system will give the player a spherical or oval mini map view (rectangular view in previous games) of the star and a number of planets orbiting it and a larger view zoomed in close on the players ship and the immediate space around it. A player may enter the solar system either from hyperspace which drops them on the edge of the solar system, or from leaving a planet's surface, which drops them roughly on top of the visual graphic of the planet. Players can also enter and leave this view by entering an alien encounter.
The solar system is composed of one or more suns, and since the majority of stars in the Milky Way are binary systems, hopefully a few binary systems will exist. To simplify orbits and planetary conditions, it is recommended at any depicted binary stars show both stars as relatively close with the first few orbital positions devoid of planets. The equivalent stellar class of a binary system is either two classes higher than the brightest star of the group if the stars are within one class of each other, or else just one class higher than the brightest star of the group. Other components of a solar system include planets occupying orbital positions around the star(s), moons orbiting around individual planets, alien ship fleets traveling around the solar system or orbiting planets in the solar system, and any incidental background graphics such as asteroid fields which the player cannot interact with.
The background space will either be black or nebula depending on if the player is in a nebula when they enter the solar system from hyperspace. If the solar system is a nebula then nebula conditions exist (shields inoperative) and the nebula graphic will be used instead of the starry black background for the star system view and for the background planet view from orbit.
Each planet type has multiple color and design schemes within that type which reflect their images on the solar system map. Examples of this are "rock:greenish" "rock: grayish" "rock:desert brown", etc. These planetary images could be chosen automatically by calculating the highest percentage of the planet surface that exists within one topographical range or they could simply be calculated randomly, i.e."liquid:dark blue" "liquid:light blue"
Every solar system consists of eight planetary orbits, all spherical and coplanar for simplicity's sake. Planets may or may not occupy each of these orbital positions. There is an overall 25% chance per orbital position that a planet will exist there. If a planet exists, examine the probability table below to determine which type of planet to place. When the player enters a solar system, the planets are placed in random positions on their orbital pathways. Either immediately or after a period of time, such as 10 days outside the solar system, these orbital positions are rerandomized and the player will see planets in a different configuration when they reenter the system.
The players ship is represented by a small icon representing there ship class. Movement in the solar system is determined by Newtonian physics. The player can spin or rotate their ship at a speed determined by the ship class and the number of turning jets. Turning the ship simply spins the icon in place, movement only occurs by thrusting. When thrusting the players movement is determined through vector addition by taking into account the ship's mass, thrusting force, and existing momentum a to the ship's maximum speed which is also determined by ship class & number of thrusters. When the player hits the center button on the keypad, the ship's thrusters work automatically to cancel all movement. Objects such as planets or moons create a slight inward vector to simulate gravity. This force can easily be compensated by applying minimal thrust. The player cannot "crash" into objects as he or she will simply enter orbit upon "impact." When leaving orbit around a planet or moon, the players ship icon will appear centered over the planet or moon at the point where there is no "gravity" and cannot reenter orbit unless they travel a decent distance away from the icon and then return to it.
Alien ships in the solar system can be represented by one of three possible systems: invisible icons that can only encounter the player ship if they are on top of the player ship on the mini map the exact moment of an 2 hour change. This system was used in the previous two Starflight games and artifacts such as the system scanner overlaid a static dot on the map for each ship detected similar to a radar ping when the artifact was used. If the system is used and alien ships must travel at a speed of roughly 1/4 to 1/3rd of the players ships speed. The second possible system would be to use a hybrid slowly updating set of icons on the mini map showing alien ship movement and then display a actively chasing icon representing the alien ship once the ship gets close enough to appear in the zoomed in map. The third method would be to keep actively updating and moving icons on the mini map and keep the actual alien ship hidden on the larger view map, making the actual encounter more random and unavoidable if the alien ship is very near (probability count for counter rather than intersection of an alien ship image on top of the players ship) These last two methods allow alien chips to chase a player at a much faster rate.
Alien ships not specifically specified to exist in the solar system will be generated by the computer if the solar system is within that alien territories sphere of influence. If that sphere of influence moves, grows, or shrinks then the presence of alien ships in a solar system may be reduced, disappear completely, or be replaced by aliens of another race.
If the first method is used then alien ships can be set to always chase a player. To simulate more accurate behavior with either of the other methods than three state conditions may apply. Behavior in each condition is identical but the conditions are modified. When the alien ship is within a certain radius, it will turn to chase the player. Outside that radius it will ignore the player and simply wander or orbit a planet. When the player first enters a system all ships are in a neutral condition and will chase a player if they are within a moderate radius. If the first encounter ends in combat then all ships in the solar system enter a hostile condition and will chase the player as if the chase radius was infinite. If the first encounter ends peacefully, all ships in the system enter a friendly condition and the chase radius is greatly reduced. Any subsequent encounters ending in combat or not may change the classification from friendly to hostile or vice versa. This condition has no relevance to an alien's emotional index as used in the communication system.
After an alien encounter there should be a minimum time allowing the player to escape if he wishes before he meets another alien encounter or perhaps the same alien encounter a second time. Two different time counters, a larger one for meeting the same alien again and a smaller one for meeting a different alien encounter could be justified. Another method is to freeze an alien encounter that was just left and make it immobile for a second or two.
When in orbit or landed the player can perform a number of functions. (see ship operations) While in orbit a tiled topographical map of the planet surface with random cloud cover will be visible. Atmospheric thickness determines percentage of cloud cover. This topographical map will be overlaid on a sphere roughly a size proportional to the mass of the planet rotating continuously. The angle of the planets axis is a randomly determined value between -90° and +90°. This angle will be visible as the angle seen from the planets orbit, which always approaches along the solar plane. When the player chooses to descend the topographical map will be stretched into a mercator map view without the cloud cover giving the player a chance to select the longitude and the latitude where to descend. The selector bar is a smooth process, showing tiny increments of longitude and latitude to four decimal points. A certain centerpoint is defined on the map and from this point measurements are taken between 0°-180° east or west, and between 0°-90° north or south.
The landing sequence is a three-step animation which occurs with the players controls locked. The first step is the approach to a partially cloud covered sphere. When close enough to hide the transition convert to a flat mercator view and continue filling in fractal generated details as the planet gets closer. The cloud cover layer should be pierced during this transition. The third step is converting flat detail to a three dimensional image of the terrain surface. When this occurs slowly rotate the player's viewpoint either to the right or to the left (determined randomly) and start to tilt the camera view downward while slowing descent. By the time the ship has "landed" the viewpoint should be 90° left or 90° right of the original angle and the camera viewpoint should be perfectly flat showing the terrain for a reasonable distance.
This view shows the last step of the landing sequence, the mottled terrain directly outside the ship and the sky color. See Planet Generation notes for steps for determining the color of the sky. Launching obviously follows the exact reverse animation as the landing sequence.
The mass and the gravity readings in this table are all from a single planet that has had its planet type changed. As you can see each planet type has a certain defined range of mass which is multiplied by a constant generated randomly for each planet. This ensures that all planets of a certain type fall within a certain mass range.
Generate planetary surface using a stored random seed passed to a fractal surface generation routine. Submit a few dozen fixed seed values to a diamond-square algorithm. Overlay a grid on that map and average out the altitude inside of each grid and display the internal section of each grid as a constant color on the global planet view map. Now let us say that you land somewhere on that map. Simply take the average elevation of that grid square and repeat the process, defining a number of high and low altitude points on the terrain and slanting the terrain around it. At both poles use a straight line or a line of points with all the identical altitudes. As the terrain vehicle travels over the land it is simple enough to load the next grid from the planet map and then repeat the process, dynamically generating the terrain as you go. To simulate water, allow negative altitude points and any terrain under zero simply show as a flat surface of water. Use the altitude and the type of planet to determine what landscape graphic tile to use, similar to a detailed topographical map.
Surface consists of a topographical map more the lowest surface is liquid. Liquid and a rock planets have identical characteristics. When entering a solar system containing liquid or rock planets, precalculate the percentage of the surface of each liquid and rock planet. If the planet is more than 50% rock surface, use a rock surface graphic on the system display. If the planet is more than 50% liquid surface, use a liquid surface graphic on the system display. To do this easily simply average out the seed altitude points given to the planetary generator. Negative altitude points correspond to layers of liquid and positive altitude points correspond to high terrain. If the overall average is negative then a greater percentage of the planet surface will be underwater and the planet should be categorized as liquid. If the average is positive than a greater percentage of the planet surface will be land and the planet should be categorized as rock. The same seed may be used to randomize the exact planetary mass within the range of that planet's size (as determined by planetary type). Topographical map of liquid and rock planets consists of the following spectrum: dark blue, yellow, brown, dark gray, gray, white. Random forest green tiles, swamp tiles, etc. can be used in low terrain areas.
Placement of objects is generated when the player enters orbit around a planet. Given a total of 180 * 360 unique map coordinates, the altitude and type of terrain is taken into account and objects such as minerals, lifeforms, random ancient ruins, random recent ruins, are assigned to each of map coordinate (with all of their properties such as type and size). This randomly generated table is cleared if the player enters orbit around another planet or leaves the solar system. Important objects such as unique artifacts and quest messages are tracked separately and always placed at the exact same map coordinates and disappear permanently when picked up. This data table is simple, containing only a list of objects within each coordinate only with no other values, and all 65,000 coordinate squares may be pregenerated or generated dynamically as the terrain vehicle travels to them. If the player leaves orbit this table is still maintained, only when the player leaves the system and enters hyperspace or orbits another planet is this table cleared.
When the player lands and disembarks, the planetary map in a 4x4 coordinate square is generated around the ship and objects are placed on exact positions within each coordinate and lifeforms come alive and are allowed to move. This data table stores the state of every life form, the exact km square within each coordinate were every object is placed, and can be modified by player actions. When the terrain vehicle moves outside this 4x4 coordinate square a message appears "Scanning New Terrain" and new objects are placed. Up to 20 of these 4x4 squares are actively stored in memory, and every exact position of every object is tracked unlike the previous table which generalized objects only within a coordinate. When minerals are picked up, lifeforms captured or killed, endurium taken, the record is kept track only within these data tables and not on the generalized tables. Records are also more precise, the ancient ruin is stored as a separate object from the endurium. When the player leaves orbit all of these 4x4 coordinate square data tables are cleared and if the player returns the same spot would find all objects undisturbed again, in slightly different positions but still within the exact same coordinates they were placed in.
Gas planets cannot be landed on and never show a Bio % reading. Atmospheric density is always very thick, global climate is violent or very violent.
Mineral content follows a bell curve distribution with a median of 25%. Mineral density is dependent on elevation.
Bio % = random * colonization criteria (broader tolerances for life then for colonizable planets however) If Bio % results in a number of 5% or below, set level to 0%. Criteria ranges do not all have to exist, but as the planet falls out of tolerances, %life max decreases.
Atmospheric activity (Global Climate) = planet type * planet mass. Limit the top range by atmospheric density. Gas giants should either be violent or very violent depending on mass for example.
Surface Temperature (upper and lower values) = incoming radiation , atmos density, random (atmosphere chemical components) Higher atmospheric density reduces the range between upper and lower values. For example a planet next to a hot sun will have subarctic to Inferno ranges. When traveling on the planet surface with the terrain vehicle, latitudes near the poles will be near the lower values of surface temperature, and latitudes near the the equator will reflect the higher surface temperatures.
Solar system Ecosphere: static value based on stellar type. This value represents the range of orbital positions where colonizable planets are most likely to occur. This is not a constraint but simply a observation were temperate and tropical planetary temperatures are most likely. Colonizable planets are determined randomly and may fall outside this zone.
""Turquoise Oceans and Reddish Yellow Sand with Gelatinous Carpet Lifeform under a Starry Black Sky."
If ancient ruins are set to exist on the planet then distribute them evenly over the entire planetary surface was no distinction between high or low terrain. Every ancient ruin will have a endurium mineral deposit of 1.0-9.9 m³ in an adjacent square. Ancient ruins have a 10% chance of the random curio artifact stored inside the ruin itself.
If recent ruins are set to exist on the planet then distribute them randomly over the lower altitude terrains diminishing in frequency as the terrain gets higher. Recent ruins have a 20% chance of a random curio artifact stored inside to ruin itself.
overlay displays event such as weather changes, attacks on crewmembers, etc.
Terrain vehicle movement has two factors. The first is the movement speed and the second is fuel or energy usage. Energy usage is determined by terrain and weather. This usage value is reflected in the efficiency rating displayed for the player. Movement of the train vehicle is smooth, squares are hidden terrain tiles that are used for distance calculations only. Fuel usage is calculated by an inverse ratio of energy efficiency. 10% efficiency equals 1% energy usage per square.
Terrain Efficiency is not uniform. It is modified by the nine squares around it. If all nine squares around the square are of lower efficiency than the square will be at the lowest edge of its efficiency range. If all line squares around the square are of higher efficiency then the square itself, then the square will be at the highest edge of its efficiency range. Water and lava count for 100% efficiency when used in this calculation.
Speed of movement depends on terrain type (value between 0 and 5). Changes to altitude and altitude itself has no bearing on energy efficiency. Distribution of terrain depends on temperature which is determined by altitude, latitude, and the total planetary temperature range or climate. For example, all terrain with a negative altitude will be liquid or lava, depending on planetary type. A planet which has a climate range of Temperate to Arctic will most likely have rock, snow, or an ice at high altitudes and near the poles. Tropical temperatures will have a higher percent chance of containing terrain that is mud, sand, or carpet life(if the planet supports life.) Similar to altitude points, a number of terrain seeds are scattered randomly over the planet surface and grow their terrain until they intersect with another terrain seed's territory. As you can see from the table below, sometimes it is possible to move faster over terrain which requires more energy.
Weather patterns are dependent on planetary weather. There is a 10% chance of weather shift every hour to a new random pattern. Temperature refers to only the derived temperature at the planet's specific altitude and latitude. Temperate and Tropical = warm. Anything cooler than those ranges = cold. Anything warmer than those ranges = hot. Certain weather conditions only exists in one type of temperature. For overlapping sets (warm weather planets) pick between either condition randomly.
For example, let us say that a human gets hit by electrical storm damage over water. First damage is randomized between 100 and 200, let us say 150. Terrain efficiency is 14%, weather penalty is 50%, and the crew durability is 6, so 150 * (10 / 14) * (1 / 0.5) / 6 = 35. Being in sheltering terrain greatly reduces damage as you can see from the formula above.
Every hour during a storm there is a 20% chance of a crew member taking damage and a 10% chance of two crew members taking damage.
If a planet is considered tectonically unstable (greater than 2 G's) then first before any other calculation a random chance is figured to determine if an earthquake condition (5%) occurs or any other weather pattern (95%) occurs. If the 95% chance occurs then one of the random weather patterns above is determined.
Loading the terrain vehicles cargo inventory screen performs the following functions: list all cargo items sorted by cargo type (artifacts, minerals, lifeforms), each items size in M³, and value per M³. Cargo can be dropped (give option for quantity to be dropped, lifeforms cannot be partially dropped so give the player and option of how many lifeforms to drop instead of size in M³ to drop) The inventory screen will also display free space remaining.. Terrain vehicle artifacts are automatically loaded onto the terrain vehicle when it disembarks from the ship. If more than one terrain vehicle artifact exists of the same type, only one is loaded.
Lifeforms have the following behaviors: attacking, fleeing, wandering, sessile, stunned, dead. Check the life form table under the Starflight 2 section of the main web site for further details of life form types and check the Starflight 2 manual for life form descriptions. Lifeform distribution density on the map is based on two factors: terrain type and planet bio density. Multiply those two values (see terrain type table) to determine and it will give you a value to use for life form density on a planet surface. On terrain which has 100% life form density on a planet with 100% bio, on average every 9x15 area (135 squares) will contain four lifeforms for an average percent chance of 3% per square. Take from the list of tradable lifeforms a total of 5 life form types and distribute over the planet's surface.
Nonaggressive lifeforms can simply be picked up, if cargo space is not sufficient to carry the whole life form then the life form is not picked up. Aggressive lifeforms (determined from the danger level on the lifeform table) must be stunned before being picked up. When a lifeform attacks the terrain vehicle, it either has a 80% chance of hitting or a 20% chance of hitting (if the flat device/TV shield is used) Attack damage is modified by crew durability and by damage rating of life form. Lifeforms must be near the terrain vehicle in order to attack crew. Crewmember attacked is picked at random.
Mineral dispersion follows the same pattern as lifeforms, except with mineral density factors and the planet's total mineral percent rating of course. Minerals have a random size between 1 M³ and 9.9 M³. Use the Lithosphere components table described in planetary generation to determine what the percent chance of which mineral to place. If the cargo space is not sufficient to store the entire mineral deposit then only enough of the mineral to fill the cargo capacity to 100% is picked up.
If sentients are present on the planet, place collections of housing, icons indicative of their technology level in diagonal groupings together. One out of four settlements contain a single trade center. Sentients either on foot or in a vehicle depending on technology will randomly leave one housing icon to travel to another, 50% of the time in same settlement, 50% of the time to another settlement.
Sentient lifeforms will attack the terrain vehicle if the terrain vehicle has fired on sentients on foot or in a vehicle within the last five days, and/or if they are a spacefaring race and the player is on hostile terms with them in space, or if they are simply a hostile race to begin with. Sentient lifeforms attack with ranged weapons that can fire on the player anywhere on the zoomed in map viewpoint. The damage rating and description of their attacks depend on their technology level, Stone Age, metal age, industrial age, space-age. Check the life form table under the Starflight 2 section of the main web site for further details.
Scrolling log of trade chat or display lists sorted by artifacts, then specialty, than standard, then lifeforms, then elements. Price is listed as zero if the item is unsellable, else the initial or final trade price is listed after each item.
When on top of a trade center or in any of the eight surrounding squares with the terrain vehicle the player is prompted after dropping out of move mode if they wish to trade. If they choose yes, then the trade window is loaded. Perform an emotional index check with the alien race. (if space faring, perform an additional check to see if on hostile terms) if player has fired upon a planetary residence or vehicle of the alien race in the last five days then kick player out of trade center.
When first entering the trade center create the standard goods / elements list and quantity, and create the final best price point for all items. If an item exists on both the buy and sell list, then perform a special evaluation. If the player buys an item and sets a finalized buy price, then change the best possible price point for selling the item to be less than or equal to the buy price but let the player barter for this price independently if they wish. If the player sells an item that is also on the buy list, change the best possible price point for buying that item to be greater than or equal to the finalized sale price. This prevents the player from making money inside one trade center without leaving, and resolves the infamous Starflight 2 trade bug.
If the buy option is selected, display a list of the fixed artifacts and specialty trade goods (0-3) first. Check technology level and display the generated standard trade goods of that level and below. Number of standard trade goods available is also randomized, up to a maximum of 15. If race/planet is set to no bartering, display the best price point values and immediately let the player choose a quantity. If bartering, engage the barter engine and let it set the final barter price and final barter flag to true before selecting quantity. On the selection menu and when the item is chosen, display the percentage of the standard trade value that the displayed price represents. Purchased items are put in the starship hold, so perform a space available check and a money check as the player increases the quantity to purchase. Obviously the player cannot buy more than he or she can store or afford.
If the sell option is selected, first display all items in the starship hold in the order of specialty goods, standard trade goods, lifeforms, elements, then artifacts, and then do the same for the items in the terrain vehicle. Same properties as the buy option except reversed.
Initial trade values are determined by bartering type (a lot, a little, none) and by the best price point, and by emotional index. Initial buying and selling prices are 25%-40% better when the emotional index is green. The best buy point is not affected by emotional index.
X ended trades will move the emotional index one point more hostile. When a trader is "red" on the emotional index frustration points are doubled.
Selling any quantity of a desire trade good unlocks any "locked" specialty good or artifact and moves the emotional index one point more friendly.
During the barter process, the system should reward players who slowly haggle the computer towards the best price point. If the player makes an extreme offer either over 300% or under 33% of the best price point, the computer will make a "I can't hear you" style comment and increase the frustration counter. If the player makes a mistake and enters a value better or equal to the computers offer, the computer will instantly agree and fix the price at that value.
The computer will adjust its offers to the same percentage degree that the player does towards the best price point. If the computer's offer is much closer to the best price point than the players subsequent offer, the computer will stand on its current offer (more likely for barter a lot economies versus barter a little?) and increase the frustration point. If the player does not move at least 10% closer to the best buy point, the computer will make a comment similar to "why would I accept X if I did not accept Y", but still will either stand or change its offer based on the compared difference of both offers to the best price point. The computer will never change its offer by more than 20% of the value of the best price point. The computer at minimum will always change its offer by at least 10% of the value of the best price point. If the computer reaches the best price point it will refuse to change its offer and increase the frustration counter each time the player does not accept its offer. The frustration counter is set to zero after each successful trade.
Refuse increases frustration points by two, and has a 30% chance of ending a trade for specialty good permanently and 60% chance of ending a trade for a standard good/life form/elements permanently. If trade does not end, the computer moves 50%+-20% closer to the best price point.
If trade for an item has been ended without coming to a conclusion, it does not affect any other trades, but does make that item 80% likely to be untradable for the next five days. If the 20% chance occurs, a "my feelings are hurt, I sulk" message appears and trading can continue except frustration points are set to 2 initially. If trade ends with frustration failure a random message "I'm out of patience" may appear (% chance) and the emotional index will be moved one point more hostile. If the emotional index is already red and moved more hostile then the computer will generate a message "I am ending trade" and kick the player out of the trade center.
A window taking a majority of the screen will display the starship graphic against a background of space with "hyperspace swirls" or against a background with nebula graphics. Ship movement is shown and controlled on this view. Ship momentum is similar to physics in the star system except that a constant drag is applied against the ship. If the player does not constantly thrust then the ship slows down and stops in place, a distance equivalent to its momentum. Turning jets determined rotational speed but only engine class, not ship mass or thrusters, determines acceleration and top speed. All movement requires fuel, see fuel usage table on the main page. The player's top speed is determined solely by his/her engine class, however this should not be substantially different, class five engines should only be maybe a quarter faster than class one engines, even though class five engines are far more energy-efficient. Alien ships also should have their hyperspace speed somewhat determined by their engine class, except on a different scale toned down to give the player a slight speed advantage.
In a small circle placed to the side of the screen a radar style map view shows the the nearby area of hyperspace larger than the local view. Stars are displayed as large bright circles on this map, either flickering moving black dots or actively moving dots represent alien ships. Nebulae show up as grayish circular areas of space which completely conceal anything inside of it. The radar map view displays no details inside the nebulae, either ships or stars. Continuum fluxes do not show up on this map, only the local view and the star map.
From hyperspace all stars will appear to be different colors and sizes, reflecting their stellar class (see table in the star system section of this document) Class M,K stars will use a small star graphic, class G,F,A stars will use a medium sized graphic, and class B,O stars will use a large sized graphic. Entering a star system will place the players ship on the same side of the solar system as the side he/she entered it. Leaving a star system also makes the player face that direction in hyperspace away from the star. Only the eight cardinal points are used for these direction angles.
Nebulae are areas of space filled with gas and dust. There are four basic types of nebulous. Emission nebulae are clouds of high temperature gas, typically red because of the spectrum emissions of hydrogen gas. These areas are typically sites of recent star formation, and will often have higher densities of brighter, shorter lived stars. Reflection nebulae are areas of space primarily composed of dust instead of gas. They reflect instead of the light of stars inside of it and are usually shades of blue. These are also typically sites of recent star formation. Dark nebulae are clouds of dust usually void of stars. They block the light of stars behind it. Supernova nebulae are the result of exploding stars. Composed of heavier materials besides just hydrogen, these clouds of gas and dust are multicolored and dense. Ribbons of a vibrantly colored material are scattered throughout these nebulae. All nebulae interfere with sensors and shields. Some may cause random minor ship damage to the armor or hull at random intervals, although this should be uncommon and not prevalent to all nebulae. Encounters, star systems, and planet views inside of a nebula should all have the nebula screen background and restrictions to visual range/sensors and interference with shields. Only in hyperspace will damage occur from the nebulae itself.
A continuum flux is a wormhole in space that has the appearance of a black hole with an accretion disk of highly colorful gases. A continuum flux is difficult to detect in hyperspace and will only be visible on the local view depending on the navigator's skill. If the navigator has less than 200 skill, they will remain invisible. Between skill levels of 200 and 250 the range in which a continuum flux is detected increases. After a continuum flux has been found, a small gray X will appear on the mini map from that point on to represent its position. A ring device will extend the detection of a continuum flux to the entire local view screen, and will eliminate the chance of a navigator getting lost after traveling through one. Most of the time a continuum flux has two entrances, and the player enters one of them, the player can return to the original position by reentering the flux. Some of the time a continuum flux will be a one-way trip, and other times will put the player into a completely different sector. A water tunnel rendered animation will play while a player is traveling through one.
Unlike solar systems hyperspace encounters are determined by probability instead of being set. Certain classes of random ships may appear anywhere (Humana Humana, Nomads, and Minstrels in the last games) but alien ships will typically appear only inside their spheres of influence. A sphere of influence is a modifiable circle in which alien ships of one particular race can be found. These spheres typically will roughly encircle the race's home world, but can sometimes have different center points or move due to events in the game. Spheres of influence may partially or completely enveloped other spheres of influence, and if they do the chances of both groups ships appearing within the shared area is cut in half, giving the player an equal probability of meeting alien ships, but only a 50% chance of meeting alien ships from one race or the other. The sphere of influence (titled with a unique color and name the alien race) will appear on the star map after the player encounters a ship inside of the sphere. Generally one alien ship is created to chase after the player every five seconds of real-time.
When the player ship encounters an alien fleet, an animation is played (perhaps of the players ship shrinking or a pure black area of space growing over the local view map, etc.) and the player enters encounter mode. When the player leaves encounter mode and returns to hyperspace the animation is played reverse. In both cases the animation takes "time" in which other alien ships can move and the player cannot.
The sphere of influence has two actual values, the actual sphere itself which represents where of the alien ships will be created within, and the second sphere roughly the radius of two mini map views larger, which represents how far the alien ships will chase a player before disappearing.
Alien fleets are randomly generated (see solar system) with random numbers of ship types and overall number of ships. Typical patterns will be either X number of warships, 1-2 scout ships, or a mix with all three ships including transport ships. The alien ship fleet disappears if it is destroyed or communications end peacefully or if the player is on good terms with the alien race and simply flees. If the player is on hostile terms and runs away from an encounter then it will shortly reappear a few seconds later. If the player gets three hostile fleets with the top engine class chasing him/her and the player continually runs away, it should be impossible to escape them due to the delay animation described above. Gameplay testing should be used to determine the length of the animation and also the speed of movement of the players ship and that of the alien ships to balance this out.
The star map has several functions, the first is to display on a grid pattern all star systems and nebulae in a region of space. Alien spheres of influence and continuum fluxes are also displayed but only after they are discovered by the player. The player's current position is reflected by a small rectangle on the map, and the player's current position is shown in X,Y coordinates at the bottom of the map. The pointer which is moved by the mouse also has a "Destination X,Y" coordinate at the bottom of the map, and the fuel needed with the ship's current engine class to travel to that point is shown. The total distance that the ship can travel is displayed as a lightly colored gray sphere around the player's current position. Fuel would be exhausted if the player travels in a perfectly straight line the entire radius of this sphere, marking the range he/she can explore. The bottom of the screen also has tabs for displaying other sectors, hidden until they are traveled to.
The player can scroll the map by either clicking to "grab" the map and pull it one direction or another, zoom in smoothly in and out with the plus and minus keys or the mouse wheel, or can move the mouse to the edge of the screen to slowly scroll the entire map in that direction.
In an unexplored sector, or may be the distant corners of and explored sector, the star map should contain no details and only be revealed in a "fog of war" style fashion within a 30 sector radius of where the ship has traveled. This encourages exploration of the entire sector, gives a visual representation of where the ship has been and where it has yet to travel to. Visited stars are shown in a brighter hue than unvisited stars. When the mouse is moved over a visited star system then a small box with a list of planets appears. Each planet shows a mini icon representative of the planet's color as seen from the solar system, bio density, mineral density, and another mini icon if the planet is inhabited. If the planet was orbited then all of these details are filled in. If not then only the planets many icon is visible and the word unknown appears next to it. If the system scanner is used inside the solar system then all planets will have their details filled in.
When a player encounters another ship they are drawn into a localized encounter space. If the player's ship is recognized from previous encounters then a action may take place immediately, such as a friendly hail or a fight or flight reaction. Fight reactions occur immediately, often striking the player's ship before they have a chance to raise their shields, encouraging the player to preemptively raise shields in hostile territory. Friendly hails or any type of responses to hails take place in a random short period of time. Neutral or hostile/obsequious hails take place in a random long period of time.
When communications are established, the alien is given knowledge of all the crew and cargo on board the players ship. If any flags are set off at this time then the alien will respond immediately. Examples include the demand to return a religious artifacts, prejudice against the race of one type of crew on board the players ship, or an offer to purchase or demand to give cargo from the players ship.
Players can issue statements, ask questions of certain categories, change their posture in the middle of the conversation, or terminate the conversation. Aliens can issue statements, respond to questions, and ask yes/no questions of their own. If aliens are ignored they will either issue statements or questions of their own, or if they are ignored in a yes/no response they will issue impatience statements.
Once communications are terminated they can not be reestablished in the same encounter. The alien will either flee or attack after this point, no other actions will take place. If after 1-3 alien hails are ignored, again the alien will either flee or attack.
Effective Skill = 250 if communicating with spemin and the whining orb is on board.
Scrambled words are replaced with words composed of a random number of syllables (from 1 to the maximum for that alien class) selected from a Syllabary Table characteristic of that race.
Most alien races have a default emotional index in the diplomatic or neutral range to begin with and will modify this index based on the player's actions. Different actions such as posture, response to questions, player's shield and weapon status, etc. will modify this value during the encounter. The thresholds between ranges will vary between alien races, and not all aliens necessarily will even use some of these ranges. Actions which modify the emotional index have different values for different alien races. For example to one alien race raising shields and arming weapons is a negative action raising the emotional index, to others it is considered a neutral or even positive action. All actions have a value of X points +/- to the aliens emotional index. Negative actions always move the emotional index a greater distance than positive actions, because it is always easier to annoy someone then is to make friends with them.
Each race through the game will maintain a certain emotional index. When that race is encountered that emotional index is copied to the temporary emotional index for that particular encounter. After that encounter ends, the difference between the temporary emotional index and the stored emotional index is calculated and then halved. This is then applied to the stored emotional index for that race. This makes drastic emotional changes muted when dealing with an entire alien race. For example if the player has finally convinced a particular alien to be friendly, the next encounter may be diplomatic again but will be easier turn into a friendly encounter. If the player fires upon a friendly race, making that encounter shift into the fight emotional index, the next encounter may be diplomatic or hostile, but will not automatically be set in the fight range immediately if the player was formally on friendly terms. This creates more of a realistic sense of reputation.
scripted changes set the temporary emotional index for this encounter to a flat reading. For example giving nid berries to the Dweenle will set their posture to friendly no matter what it was before.
posture changes. This is what affect the players chosen posture (friendly, hostile, obsequious) has on the temporary emotional index. This value is typically small and is applied every time the player makes a hail (emotional index + 5 * posture value), a statement in a certain posture (emotional index + 1 * posture value) or a question (emotional index + 1/2 * posture value). An example would be friendly = -2, obsequious = -3, hostile = 10. A friendly question would move the index one points to the left, a friendly statement would move the index two points to the left, and a hostile question would move the index five points to the right.
shields raised or weapons armed status. If the alien race checks for one or both of these, these flags act as thresholds to the alien's temporary emotional index. If the alien is already beyond this threshold they are emotional index is " pulled back" to the threshold as long as the condition exists. For example the Humana Humana may not become friendly if shields are up and/or weapons are armed. The inverse of these conditions can also be checked. For example the G'nunk may have their emotional index set to hostile if shields and weapons are not raised and armed.
Alien yes/no questions contain a specific emotional value to both the "yes" and "no" responses. These values are stored in the database with all text conversation and are applied when the player chooses an answer. The third choice, terminate, the alien will accept as a "no" response in addition to ending the conversation.
firing on aliens in space or on the planet moves the emotional index a great deal more hostile for most aliens.
Diplomatic neutral or aloof questions and answers database. This set of answers to questions is typically smaller than other sets but will generally contain more questions. Again a subset or complete set of answers to questions in this posture may be shared with other postures.
The computer calculates the relative strength index between the players ship(s) and the aliens ship(s). This index determines the alien's actions when the alien's emotional index is in the hostile/obsequious or fight/flight range. Strength is populated by adding together the shields, armor, and most powerful weapon's strength of every ship on the player side and comparing it to the value obtained by adding together the similar values of all the alien ships. Only the strength of the one most powerful weapon that each ship is equipped is used for this measurement. Inoperative or destroyed equipment is ignored.
Typically if the players ship(s) is stronger than the aliens, the alien will follow the lower side of the bar depending on their emotional index. This entails being obsequious instead of hostile or fleeing instead of fighting. Not all aliens are rational and some will require different ratios of strength before responding differently. For example one alien race may be cowardly and the fearful if the player strength is even close to theirs, while another alien race may require that the player's strength is twice of theirs before acting obsequiously, and another alien race may be suicidal and always at hostile no matter what the odds.
No communication is possible. There still is many possible actions available here. The alien may either decide to attack, evaluate that the players ship is too strong and send out a distress call for more ships before attacking, or decide to flee. See conditions for surrendering. Most rational aliens have a threshold on their behavior between the hostile/obsequious and the fight/flight thresholds when the player's strength outmatches the alien's strength. Most aliens will give the player a chance to communicate and change their emotional index rather than flee outright indefinitely.
Each alien race has a database of answers that may be used for each particular posture and for each type of question. A pointer is used and incremented each time a particular answer is given. If all answers are given then the pointer resets back to the beginning of that particular database. If a posture change takes place and new answers are unlocked or simply added to each database, the pointer is set to these new answers.
For each encounter with scout ship(s) three out of five question databases will have a random lock somewhere between 50% and 100% down the list of answers. If the pointer reaches us this lock or is already below this lock then the alien will respond to this particular question with a "I don't know" answer. The pointer will not move so repeated attempts to ask the same question will not change this answer. For war or transport ship(s) only one out of the five question databases will have a lock.
If an alien race is in the fight/flight range a number of conditions may be used to trigger a surrender. One example would be if during a fight condition the relative strength index turned in favor of the player. Another condition may be if the player simply fires weapons at the alien. Another example would be if the alien decides on flight either before or during a battle and is unable to escape for a certain period of time. Cowardly aliens may surrender immediately upon evaluating that the player's strength is greater than theirs, while other aliens may never surrender. A surrendering vessel(s) may choose to either stop or continue fleeing, but on acceptance of a surrender by responding communication the surrendering vessel(s) will immediately stop moving and will lower shields and disarm weapons. Their posture will be set to the obsequious level and will not change the matter what you say to them in that particular conversation.
Certain alien races will take offense being ignored. Every time a certain delay is reached, for example Conversation lag or waiting for response to a yes/no question may increase or make an aliens temporary emotional index more hostile.
Combat (randomly cycling and/or situational within each piece. Different music when facing a very dangerous enemy, taken heavy damage, enemy starts fleeing, end of combat resolution close) Suggest breaking music into 2-5 second segments to allow for transitions. | 2019-04-23T08:36:28Z | http://www.starflt.com/tables/index.php/starflight2/game-design-ideas/ |
In-depth answers from Dana, Gotham’s Dean of Students.
Ask DanaI want to write. Where’s the best place to start?
In my experience, people LOVE hard and fast answers.
That won’t work; this will.
It’s about control, I think. No one wants to be wandering the wilderness, writing or otherwise, without a sign-post to safety or a clear path to success. It’s just too random, feels too insecure to have that much choice.
But couldn’t lots of answers to the same question be a good thing? Isn’t it nice to know that there are a bunch of ways to be right?
So, if you have a sense of what you want your end-point to be—film script, short story, picture book, or even “New York Times-worthy article” or “memoir about my time teaching math in Alaska”—start with a 10-week Level I class. You’ll get a strong grounding in craft, a chance to practice with weekly assignments, and feedback on the beginnings of that dream project.
But if you have a vaguer idea of what you want to end up with, a general goal—“I want to write stories” or “I think I want to write a script, but I’m not sure if it should be a tv show or a play”—go with one of our 6-week ‘101’ classes and just investigate storytelling through a broader lens first.
And if, say, you want to write about your life but you’re not sure whether to tell the story as it happened or fictionalize it and turn it into a novel, take a Fiction One-day and a Memoir One-day—only a couple of days of your time, a bit less of your hard-earned dollars—and see where the heat is before moving on to a longer class.
Yup, at Gotham, there are lots of right answers. Embrace it! And know that no matter what you choose, you’ll move forward with whatever seed of an idea you’d like to see grow and, most importantly, be challenged to WRITE!
Still want a hard and fast answer to ‘where’s the best place to start’? Okay, fine.
Ask DanaHow much time will I need to devote to my class?
As if there’s an answer beyond that.
And really, truly, there isn’t. Because everyone writes and reads at a slightly different pace. Everyone absorbs information at their own rate. And everyone has varying amounts of time to devote to class, which probably changes a bit week to week.
Plus, the time requirements are different for 10-week classes like Fiction I or Screenwriting I than they are for a 6-week class like Creative Writing 101. In-person varies from online. And in the 10-week camp, Level I vs. Level II makes a difference, too.
But, we hate giving non-answers to questions, so I always tell folks what they’re going to have to accomplish in a week, and let them figure it out from there.
From the looks of it, the online classes require less of your time. Maybe. But maybe not. Depending on how you learn, you might read the lectures more than once. And writing up cogent feedback on your fellow students’ work takes time that giving feedback off-the-cuff in class doesn’t’. Does that all equal the same three hours that you’d spend if you were in class in NYC? I bet you know the answer…it…wait for it…varies person to person.
What happens if you can’t give the class that much time every week? That happens. We know our students are busy people and there are going to be weeks when class can’t be a priority. We just hope you’ll give it your all for the weeks you’re with us so you have the best experience you can possibly have. And if you want to talk through your options to find the best format or best time to take class, give a holler.
Ask DanaIf I have an idea for a TV Pilot, do I have to start with TV Writing I?
And with so many more outlets available than ever before – network and cable, streaming and web series, live-action and not – there seems to be more hunger than ever to get into the TV game.
But the great pilots, the truly great ones – The Sopranos, The West Wing, Breaking Bad, Arrested Development, Community – are incredibly hard to write. Not impossible. I mean, it’s been done, right? But so, so hard. You have to establish the world of the show, establish the characters, chart a long-term course, AND tell a mini-story that’s worthy in and of itself.
And you have to do all that while navigating the particular nuances of storytelling for the small screen, from story beats to weaving storylines together to ‘sitcom vs. drama’.
Which is why we ask that folks do take TV Writing I before TV Writing II/Pilot.
In TV Writing I, you learn the TV ropes by studying the greats and then by trying your hand at a script for one of those great shows that inspire you. You get a handle on this unique storytelling form, and maybe even put some already well-drawn characters into a situation you might put your own characters in down the road.
It’s plenty challenging to write a TV ‘spec’, but a whole lot more doable than jumping into the deep end of a pilot if you’ve never written for television before.
What scenario could you cook up for the characters in This Is Us to wade through? How about the folks in Black-ish? Or Bojack Horseman? Spend some time in one of those wonderful sandboxes. And then go off and create a sandbox of your own.
Ask DanaI want to work one-on-one with an instructor. Would that be the Mentor Program?
Back in 2008, we launched our Mentor Program. And boy did we learn something right away.
“Mentor” is a VERY powerful word.
Maybe it’s because the word connotes seriousness. Sober, important, literary (in our case) endeavors, involving elbow patches and pipes.
That image makes people feel like they’re really going to be taken care of, like they’re going to be welcomed into a dark-wood-paneled professor’s office and invited to learn the mysteries of storytelling at said professor’s knee.
Which, to a degree, is true.
And if that’s what you’re looking for our Mentor Program might be great for you. But maybe we have something else that might be better.
So I thought I’d break the whole one-on-one thing down for y’all to show the whole spectrum of offerings, and help you find the best fit.
In the Mentor Program, you buy a block of 12 or 16 hours, and ‘burn’ those hours in a variety of ways over time. Sure, the mentor reads your work, writes up feedback, meets (or chats) with you about suggestions or to just brainstorm. But expect targeted assignments, too. Reading assignments, writing exercises, whatever the mentor feels will help you move your project forward. And if you’re, say, writing a memoir or a novel and trying to capture, I dunno, a particular character relationship on the page, your mentor might have you watch a movie to inspire your prose. We like it when the Mentorships are creative and multi-medium, and folks dig that, too.
But if you have a draft of a piece—prose or script or poem or whatever—and what you want is feedback, Book or Story Doctoring is often a better choice. Because it’s one-on-one, you’re still getting the deep attention you might like about the word ‘mentor’, but it’s a one-shot deal not the developmental experience of a mentorship. And honestly, could be exactly what you need.
Of course, you can take any of our classes One-on-One, too. Whether it’s a 10-week workshop or a 6-week class, you can have the regularity of weekly meetings and the learning experience of a course curriculum, but tailored to your tastes, interests, and needs. We even offer a 3-hour One-on-One version of our Intensives, which are perfect if you’re in from out of town.
Yup, the word mentor IS power-packed. But you get deep, personalized attention whether you choose the Mentor Program, or another flavor of one-on-one services. There are lots of choices. And I’m here to help laser-in on just which one will help you most. So call!
Ask DanaCan I take the same class again and again?
I love it for lots of reasons. First, it makes it seem like I’m putting my Philosophy degree to good use, something that makes my mom happy in a way that my former career as an advertising copywriter didn’t (I can connect those dots for you; just email me and ask).
Second, it’s in line with my world view, that we and everything around us is always incrementally changing, allowing something new to happen every time we open our eyes in the morning.
And third, it comes in handy when students ask about taking the same class more than once.
If you buy Heraclitus’ premise, you can take Fiction I or Writing Scripts 101 or Memoir II again and again, because you’re a different writer every time you put finger to keyboard. You’re a different writer because the river has flowed, and you’re likely in a different place in your work than you were last term or last year, making the same lecture material – even the written lectures we post in our online classes – relevant in new ways.
Add to that the fact that new novels and picture books have been published, new films and TV shows have hit the screen, big and small, the world has evolved (or devolved) giving journalists and essayists fodder for new reporting and fresh opinions. And all of that will inevitably inform your writing.
Plus, your second dance with the same class will put you in contact with a bevy of new fellow students with brand, spanking new things to say about your work, and projects of their own that will open you to their stories that just might impact yours.
Sure, if you’re ready for Fiction II after taking Fiction I once or for online Memoir II-B after taking Memoir II-A, go right ahead. My aim is not to put the kibosh on that plan. But know that you not only have permission to lather-rinse-repeat, but that we (and our pal Heraclitus) see the value in that choice.
Ask DanaHow do I protect my work?
I’m always of two minds when folks call in with this question. On the one hand, it’s really putting the cart before the horse. It feels best to advise people to focus on the writing first and not worry about getting it out there or whatever drama that might entail.
On the other, I get the impulse to be concerned. Many if not most artists want their work to be seen by the universe, and that happening centers on the work being special, unique, not like anyone else’s.
But whether I feel the question is warranted or not doesn’t much matter. My job—Gotham’s job—is to provide writers, new and not, a creative home, and to make everyone who wants ‘in’ feel comfortable making the decision to enroll and entrust us with their baby.
Now, bottom line, your work is legally your work as of its creation. Similar to the Poor (Wo)Man’s copyright of yore (actually people still do this), where folks mail themselves their own work, never to break the envelope’s seal, your computer date-and-time stamps what you’ve written just like the post office does. And it’s yours as of that date, that time.
Prose writers, poets, and songwriters, you can copyright your work with the Library of Congress for about $35.
Screenwriters, TV writers, playwrights, you can register your work with The Writers’ Guild, East and West. West costs $20 and lasts 5 years, East costs $25 and lasts 10. Or copyright if you’d prefer.
Don’t do both. That’s kinda paranoid.
You can’t protect an idea or a concept. If you could, Romeo and Juliet couldn’t exist in the same universe as West Side Story, Deep Impact and Armageddon couldn’t have graced our screens during the same summer, and Best Adapted Screenplay Oscar wouldn’t be a thing. You can only protect the exact rendering of an idea.
Stealing is hard to prove, even if you have ‘proof of authorship’ in hand.
Beyond that, I will say that being a writer requires a bit of healthy ego. You have to believe that YOU have a singular story to tell, that your story is the one that needs to be told. And because of that, the likelihood of someone plunking down $400+ to take a class and poach someone else’s idea is slim. To pass off the exact words and characters and dialogue and conflicts as their own? Even less so.
Think of it this way: taking a writing class is a wonderful experience where you can get valuable feedback, learn from the brilliant and less brilliant writing moves your peers have made, and find your people. And writing anything, finishing a draft of ANYthing, let alone a final, publishable/producible draft, takes time, heart, brain, and more than a bit of moxie. Best not to cheat yourself out what is poised to be a nourishing step in your writing journey. And to put your energy into creating, not worrying.
Ask DanaWhy should I take a One-day Intensive?
There are a few different types of “One-days”—let’s call them that and save some space/time/words—that serve different purposes.
We have One-days that offer a deep dive into one aspect of craft across the genres: Character and Dialogue.
We have One-days that are more about professional development: How to Get Published, Blog Basics, even Business Writing.
We even have a One-day that explores the basics of grammar: (wait for it) Grammar: The Basics.
But the bulk of our One-days are marvelous day-long overviews of our 10-week storytelling classes: Fiction Writing or Screenwriting, Memoir Writing or Humor Writing, and everything in between.
They’re substantive, providing mini-lectures on all aspects of the craft at hand, in-class writing exercises that get the creative juices flowing and often jump-start a major project, with plenty of time built in for Q&A.
And they’re by no means a mere advertisement for the longer classes, even though you will get a true sense of what to expect if you take one of those. You really will write throughout the day, and really will leave with shiny new tools for your writing toolbox.
So, why take a One-day?
Take one because you want to wade into the writing process a bit slowly where a day-long exploration feels like a digestible first step. Or because you’re only in town for a short time, and always wondered what a live Gotham class was like.
Take one because you’ve already taken one of our 10-week classes and want some extra time understanding character development or dialogue. Or because you’re deciding between two types of writing and aren’t sure where the heat is for you.
Take one because, once upon a time, you knew the difference between a colon and a semi-colon, but that bit of knowledge is stuck in some far-off brain file along with your first grade teacher’s name and the lyrics to The Brady Bunch theme song.
Or take it to get the all-important brush-up that will make a Level II class a better experience for you and your writing.
Just take one! Or give us a call and let us convince you.
Ask DanaThe Online class I want to take is scheduled for Tuesdays, but I’m never free on Tuesday. Can I still take the class?
Before Netflix, Hulu, and Amazon Prime, if you wanted to watch, say, The Mary Tyler Moore Show or Ally McBeal, you had to park yourself in your Barcalounger at a specific time on a specific night of the week. Or hope to catch reruns (yes, those were a thing) over the summer.
Same thing when it came to school. To take a class, you had to be there in real-time to participate, or you’d be pestering your best friend about copying notes or making up the work during recess.
Now there’s something to be said for the immediacy of being ‘in the room where it happens’. Whether it’s about being one of the 105.9 million to watch the series finale of M*A*S*H or taking that Chem exam along-side your friends instead of in the library on a Saturday, the energy of the collective experience is worth something.
But we’ve become busy. And our ‘busy-ness’ has turned us into an ‘on demand’ culture. In the same way that we now can choose when to tune-in to The Marvelous Mrs. Maisel, we want to be able to choose when to log into the writing class that’ll teach us how to write a TV show of our own.
And when you take a Gotham Online class, you can.
So, sign up for an Online class with us, and then do whatever you want on the Tuesday that your class posts. Do the laundry. Go out to dinner. Jet-off to Venice. Stay late at work. Watch The Handmaid’s Tale. Your weekly lecture, your Notebook assignment, any work that’s up for critique will all be there for you Wednesday or Friday or Sunday.
Oh, and the Online Class Tour answers a lot of questions about how the Online classes work. But, if you’re still not sure, call us up and we’ll be happy to help. We’re not ‘on demand’, but we’re around 9am-6pm NY time.
Ask DanaWho is your best teacher?
I’ve worked at Gotham Writers for 20 years (miraculous, since I’m a wee lass of 29) and this is by far the easiest question to answer.
Now I know it sounds a bit like I’m selling snake oil when I say that. But absolute truth: our teachers are the best you’re going to find. Anywhere.
They go through a very serious vetting process because we know that we’re only as good as what happens in the classroom, and because we’re deeply invested in every student having a wonderful Gotham experience. And we’re internally small enough to check in on them regularly, addressing any concerns that come up, nipping even the tiniest problem in the bud.
A unique, alchemic combination of teaching experience and writing success. Because there are tremendous writers who can’t teach worth a whit, and stellar instructors who can’t write to save their hides.
I mean, when you sign up for a writing class, you want someone at front of the room who’s faced the blank screen or page, experienced what you’ll experience, asked the questions you’ll ask, torn their hair out over word choice or character motivation, just like you will, and come out the other side published, produced, acknowledged.
But you also want someone who understands that teaching is an art all its own.
Being a fine teacher means being able to deliver inspiring lectures and come up with muscle-stretching exercises. It means managing time and keeping things moving, It means helping newer writers articulate exactly what they mean to say to a fellow writer about their work when they might not quite have the craft-vocabulary to do that. And, perhaps more than anything else, it’s about conveying passion, for story and character, for the written word and the writer’s life.
It’s not easy to find unicorns such as these. But we have about 120 of them on our faculty at any given time. And we couldn’t be prouder of that.
So who’s our best teacher? The teacher teaching the class you’ll get to most often over the six or 10 weeks of class.
Dana Miller is Gotham’s Dean of Students and Director of One-on-One services.
Ask DanaWhich are better, your live classes or your online classes?
I’m not a fan of the ‘compare and contrast’. And it’s not because I came up in the Montessori culture where no one is any better than anyone else., because I didn’t. And it’s not because I’m a Libra with a typical October-baby allergy to making decisions, even though I am.
It’s because you can’t compare Fujis with mandarins.
Or rather Fujis with a pie made from Fujis.
One is built from the other, but they serve different needs and tastes.
The in-person classes are classic. Classes like you remember them from grade school. You show up, same time, same place, every week, with other like-minded people and a (stellar) instructor, and you take class. You get the lectures, the discussion, the in-class exercises, and the critique of developing work in real-time, and you bond, mano-a-mano, right there in the room.
The online classes are made of the same fine stuff: lecture, discussion, writing exercises, critique. But they don’t meet at a specific time. You log in when it’s convenient, as many times during each week as you want, and your class unfolds flexibly, a bit at a time, instead.
And because you’re not sitting at your computer participating at the same time as everyone else, students get a chance to take class with folks from all over the country, maybe all over the globe, which is interesting and fun.
The teachers have the same credentials, whether they’re teaching online or in NY, and the goals are the same, too: a strong grounding in craft, feedback on your work, a safe stimulating place to bring your story to life.
So if you’re in or near NYC, you get the immediacy of the in-person experience. If you’re not, or you have one of those jobs where you can’t necessarily leave work on time every Monday or Thursday or whatever, you get the chance to take class with us on your time, and be a part of a global classroom.
It just depends if you feel like a great piece of fruit or an equally great piece of pie.
Ask DanaCan I go right into Level II or do I have to start with Level I?
If you’ve taken a class like our Level I class before – where an instructor taught the basics like structure and character and description, using lectures and writing exercises and maybe some peer critique – then going right into Level II should be fine. We’ll want to have a chat to hear what that class was like, make sure it’s a match, but chances are you’d be good to go.
Thing is, a lot of folks feel like they should be able to leapfrog over Level I. Either because they’ve written stories before or because they ‘write all the time at work’ or because they went to college or are accomplished writers of another stripe. Or they think Level I is remedial or ‘babyish’ in some way. And nothing could be further from the truth.
Our Level I classes are substantive explorations of the inner-workings and underpinnings of what makes a story a story. And by breaking fiction (or screenwriting or songwriting or memoir or anything else we offer) into its component parts, you end up with a toolbox and a blueprint you can use to build YOUR story and build it well.
Think of it this way: you wouldn’t unclog a drain or make mushroom risotto without instructions and maybe a YouTube video. And just because you can make a mean chocolate layer cake doesn’t mean you can make a mushroom risotto that’ll get you on the Next Food Network Star.
Our Level I classes ARE those instructions. They are that video. And we’ve had published authors and professors and PhD’s and tv writers who started with Level I when investigating what it would be like to write something new.
Plus, learning the art of the critique is an education in itself, and Level I hones those skills so they’re sharp as can be for Level II, where critiquing your fellow students' work is the Tootsie Roll center of the whole experience.
So if you genuinely feel that Level II is the best first step for you, give us a call and we can talk it through. But don’t underestimate the brightside of beginning at the beginning.
Ask DanaWill the Teen Classes help with the writing I need to do for school?
Let’s see, our teen classes are definitely creative writing classes. Except for our Grammar for Teens, which we run from time to time in NYC they’re all about storytelling and are designed to help younger writers find and unleash their ability to create on the page.
So whether it’s Unbound, our general creative writing class that sharpens powers of imagination, observation, and description so that teens start looking at the world through a writer’s eyes, or True Story which has teens trying their hands at writing articles and short personal essays with an eye towards that all-important college essay, or Action which introduces them to the world of writing scripts—the goal is the same. Our classes are for teens who love to write. They give them permission to let go of the need for right answers and the grab for good grades and just tell stories. True ones and made up ones. Stories for people to read and stories for them and their friends to act out in living rooms and garages with their iPhones documenting the event.
But will that help with book reports and research papers? In subtle, indirect ways, sure.
The more you put pen to paper or finger to keyboard, the better all of your writing is likely to become. With practice and consistency and attention, the idea of writing anything becomes less daunting, less mysterious. And when you’re more comfortable doing something, that something tends to be better.
Plus, learning how to organize your thoughts when you’re mapping out a short story about twin sisters who save their school from a band of bullies, or an essay about your first political rally, or a one-act play about a dog that becomes mayor of a small New England town works the same mental muscles as organizing your thoughts about Jane Eyre for English class.
So yes, come take a Teen class with us and we wouldn’t be surprised if you reported back to us that your teachers were super pleased to see how much better a writer you’ve become since last year. But you can take the class just for fun, too. Because sometimes it’s okay to do something just for fun. We won’t tell.
Ask DanaI just want to write better. Which class should I take?
This is always a tough one to answer because it can mean so many things.
It could mean that someone wants to write better stories/poems/scripts – in which case, we are bursting with classes to help. Depending on what kind of story you want to tell, any of our dozen or more Level I classes will fit the bill.
But more often than not, when someone says they want to ‘write better’, it means one of three things.
They feel like they missed out on some key points in English class and are sure everyone else knows how to use commas and what the difference is between ‘there’, ‘their’, and ‘they’re’ is and they don’t.
They want to write better at work.
Good news! We can help, no matter what your I-want-to-write-better-message is.
To build writer-confidence, I suggest Creative Writing 101. Maybe you don’t know how to start, or you’ve tried but don’t like what you ended up with. Or maybe you want to start, but are shy about jumping in. Whatever the case, that’s the class to take. It’s a mix of general but substantive lectures and imagination-sparking writing exercises that don’t need to be shared with anyone but your instructor. You’ll slowly wade into the writing process. And what you learn will help in just about any scenario where you need to get words or thoughts on the page.
If it’s the mechanics of writing you’re after, take Grammar: The Basics. It gets into the nitty gritty of all the stuff you learned in school…and have promptly forgotten over the years. Subjects! Verbs! Adjectives and adverbs! Tenses, prepositions, punctuation of every stripe! You’ll get it all, and all of it will be presented in a fun, creative way, with interesting exercises and examples to make the kind of dry material anything but.
As for writing better at work, our Business Writing class teaches good practices – being clear, concise, specific, well-organized, efficient. But we have a special sauce. While for many, professional equals formal and stiff, we think the key to good business writing is to write like you. And that’s what we teach. Writing like a human being at work. Of course, you can’t email your boss or your clients like you’re writing to your college roommate. But colorful word choice or a phrase that’s quintessentially YOU or a bit of storytelling is more likely to connect you with your audience, while sounding robotic and cold is more distancing. Our class gives permission to loosen up…just enough.
So give us a call and let us unpack what you mean by “I want to write better.” We’re excited to help!
Ask DanaHow do I choose what kind of nonfiction course to take?
There ARE a lot of choices, aren’t there?
I like to think of our nonfiction choices existing along a spectrum depending on how far (or near) the writer is from the material she or he is writing.
On one end, Article Writing. Learning how to write articles for newspapers, magazines, or websites, print or digital.
Say you have a compelling story to tell. It’s not about you or anyone you know, or about something you did or experienced. But you think it’s interesting, and you think others will find it pretty interesting, too. You want to learn how to present ‘just the facts, ma’am’, but how to relate those facts with a storyteller’s flair.
We’re not talking front-page news here, but rather the story behind the story. Not “Hurricane Harvey Hits Texas” but how caravans of students from sororities and fraternities who had started at U of Texas/Austin just weeks before traveled to Houston to hand out water and offer a kind word to those who Harvey had flooded out of their homes. Article Writing I will break it all down for you, and help you report that story.
But what if YOU were one of those students, and wanted to tell the world what it was like to hand out that water and offer that kind word? Well, that’s the other end: Memoir Writing. The how to’s of writing first-person true stories carved out of the larger story of your life.
And in the middle? Essay & Opinion. Learning how to write about those do-gooding caravans of kids and opining on what you think that means about this generation of young people. So, not your story, but not neutral, either.
Of course, if you know you want to tell true stories, but you’re not sure what shade of true you want to pursue, take Creative Nonfiction 101 and you’ll get the whole Joseph’s Technicolor Dreamcoat of choices. A bit on article, memoir, and essay, but also profiles, travel pieces, and reviews in a tidy little 6-week exploration.
There are so many ways to go when it comes to creative nonfiction. And figuring out what’s right for you can be its own super-confusing narrative. Call us! We’re always happy to help. True story.
Ask DanaWhy isn't there a Novel Writing I course?
The message baked into that question: I want to write a novel but I’ve never taken a fiction writing class before and there’s nothing called ‘Novel I’, so what do I do?
And the answer: take Fiction I.
Because Fiction I is going to teach you the how-to’s of writing a piece of fiction, whether you’re wanting to write a short story or a novel.
The basics of fiction are the same for short stories as they are for novels: character, plot, point of view, description, dialogue, setting/pacing, voice, theme. So, by taking Fiction I, you’d be grounding yourself in what you need to build either type of piece.
I’ll let you in on a secret though: if you call our office, we’re going to nudge you ever so gently towards writing short stories first. Why? A few reasons.
One, it’s easier to learn the beginning/middle/end of the storytelling process working on something short than on something long. Novels have so many moving parts—multiple characters, long spans of time, often more than one location, sub-plots and story threads—and at the beginning, it’s enough to just understand the basic building blocks of making a story.
Two, it’s more…doable to craft something relatively short than it is to generate several hundred interesting, transporting, meaningful pages.
And three, there’s something very motivating about finishing something. Spoiler alert: novels take years to finish. But short stories take…well, less time than that. And, where it can be daunting, or even discouraging to go years without feeling the satisfaction of typing the words ‘The End’, think how energizing the opposite would be.
Now, don’t get me wrong. Writing a short story is not easy. Imagine the kind of skill, restraint, deftness it takes to bake the perfect cupcake. Writing ‘the perfect’ short story flexes those same muscles. But still, you’d probably have an easier time baking 12 perfect cupcakes for the school bake sale than a multi-layered wedding cake with frosting and filling and fondant ON YOUR OWN WEDDING DAY. Which is kind of what writing a novel is like.
I know, I know, you still want to write the Great Novel. But if you could craft a stand-alone short story around your novel-to-be’s main character, couldn’t that help you write that novel down the road? And build you as a writer in the process?
So, start with Fiction I. Learn your craft. Embrace the short story. Finish something. THEN take Novel II and tackle that big ole cake, with a confidence you’d never have had if you’d just jumped into the novel first.
When you’re ready for Novel II, you can take Novel II-Critique and get feedback on pages, or our new class Novel II-First Draft where you power-through an inaugural draft.
That’s the long and the short of it. But, of course, give us a call if you want to talk more.
Ask DanaWhat's the difference between Creative Writing 101 and Fiction Writing I?
This one comes in all the time. And we get it. When people think of ‘creative writing’, most think ‘fiction’.
Maybe it’s because that’s what ‘creative writing’ meant in grade school.
I remember being in 4th or 5th grade and having a creative writing ‘module’ in English class. And the focus was on making things up. It’s possible there was a flip-book involved or some version of a group story-writing experience, where the teacher (Mrs. Slain? Mr. Terban?) gave us a premise and everyone added their bit. But whatever it was, it was about spinning stories from our imagination.
At Gotham, when we say ‘creative writing’, we mean something…broader.
Creative Writing 101 introduces what storytelling is whether you’re telling a true story or letting your imagination fly. The class uses lecture, discussion, and weekly exercises to teach stuff that’s common to all stories, like story structure and character. But it also sharpens powers of imagination, observation, description, so newer writers (or vets wanting to shake things up) learn to look at the world through a writer’s eyes and mine what they see for story ideas. And it lets you wade into the writing waters slowly, so you build confidence: no big projects, just a chance to try it all out and see where the heat is.
Fiction I teaches the how to’s of tapping into your imagination and writing short stories or maybe, down the road, a novel. It breaks this one particular kind of writing into its fundamental parts—plot, character, dialogue, point of view, etc.—using lecture, discussion, examples, and writing exercises. Plus you get the chance to work on a story or two of your own design and get feedback on it from the instructor and the group. And give your peers feedback, too.
CR101 = general storytelling, lasts 6 weeks, weekly writing but no major project.
Fiction I = specific, lasts 10 weeks, weekly writing AND yes major project.
Which is right for you? Give us a call and we can talk it through!
Dana Miller is Gotham's Dean of Students and Director of One-on-One Services. | 2019-04-19T09:16:24Z | https://www.writingclasses.com/classes/faq/ask-dana |
"Amos." Encyclopedia of World Biography. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
Amos (ā´məs), prophetic book of the Bible. The majority of its oracles are chronologically earlier than those of the Bible's other prophetic books. His activity is dated c.760 BC The prophet was a shepherd of Tekoa in the southern kingdom of Judah, but he preached in the northern kingdom of Israel under Jeroboam II (c.786–746 BC). Israel was at the peak of its political power but was ridden with social injustices. Amos preached especially against hypocritical worship, oppression of the poor, and immorality. Not surprisingly, he was ordered to cease his preaching. The book falls into three parts: God's judgment on various neighboring Gentile nations climaxing with oracles against Judah and Israel, an indictment of Israel, and visions of destruction. The final oracle, an oracle of salvation, is usually regarded as an addition since it presupposes the destruction prophesied in the rest of the book and the restoration of the Jewish state after the exile in the 6th cent. BC The chief thought of Amos is that worship of God necessarily entails protection of the poor and the weak in society. Not even God's people can hope to escape the wrath of God if the social responsibilities that go with election are neglected.
See studies by J. L. Mays (1969) and H. W. Wolff (1977); F. I. Andersen, Amos (1989).
"Amos." The Columbia Encyclopedia, 6th ed.. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
Amos (8th cent. BCE). A prophet of the northern kingdom. The biblical book of his prophecy is considered to be the earliest of the prophetic books.
"Amos." The Concise Oxford Dictionary of World Religions. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
Amos (active c.750 bc) Old Testament prophet. He was named as the author of the Book of Amos, the third of the 12 books of the Minor Prophets.
"Amos." World Encyclopedia. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
Amos a Hebrew minor prophet (c.760 bc), a shepherd of Tekoa, near Jerusalem; also, a book of the Bible containing his prophecies.
"Amos." The Oxford Dictionary of Phrase and Fable. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
"Amos." Oxford Dictionary of Rhymes. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
"AMOS." The Oxford Dictionary of Abbreviations. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
AMOS (fl. eighth century bce) is considered the first classical prophet, the first whose words are preserved in writing, the biblical Book of Amos. Whereas other books of the Hebrew Bible such as Samuel and Kings contain numerous indirect prose reports of earlier prophets' activities, the books of the classical prophets, beginning with Amos, focus on the prophets' words, usually recorded in poetic form.
As a rule, the early prophets addressed a specific person, often the king himself, while the classical prophets addressed a wide audience. Hence they were not merely God's messengers but also speakers, or orators. The call for justice, which earlier had been directed primarily toward the king (by Nathan to David, by Elijah to Ahab) was now directed toward the rulers and the social elite and was in the form of a public address. It has been suggested that the development of this prophetic oratorical style is connected with the Assyrians' use of propaganda (see Rabshakeh's speech in 2 Kings 18:28–35 [citations herein follow the English version]).
As the superscription to the Book of Amos (1:1) reveals, Amos prophesied during the reign of Jeroboam II (787/6–747/6 bce). The superscription also states that he was active "two years before the earthquake" (see also Zec. 14:5), which, by means of the archaeological evidence at Hazor, has been dated to 760 bce. Jeroboam's forty-year reign was a period of political stability, military success, and economic prosperity. The biblical historiographer (2 Kgs. 14:23–29; cf. 2 Kgs. 13:24–25) reports on Jeroboam's territorial expansions and the strength of his kingdom.
Nevertheless, this period of prosperity had apparently created severe social tensions. Although the social elite, who prospered, were content, the people of the land, the small farmers, suffered greatly from the upper classes' pursuit of luxury (for the social structure, see 2 Kings 24:14). It may be that the sudden increase in the standard of living resulted in greater taxation, which led to further oppression of the poor, who then became even poorer (see Am. 1:6–7a, 3:9, 4:1–2, 5:11, 6:4–6, 8:4–6).
The social inequities and oppression of the time precipitated Amos's protest and call for justice. The prophet's concern, however, was not merely social injustice but religious practice as well. Amos saw the religious practices of the elite as mirroring their perpetuation of social injustice, as indicated in his accusation in 2:7–8, and he labels the religious behavior of the leaders meaningless (4:4ff., 5:4–6, 5:21–27, 8:10).
The question arises: what does Amos's sharp criticism of the cult and its ritual mean? Does he intend to deny the efficacy of cultic worship? Is he opposed to the cult of specific shrines, such as Bethel and Gilgal? Is he calling for another type of worship (cf. 5:16)? In responding to these questions, scholars have intensively investigated Amos's social background. Who was he? The superscription refers to him as one of the noqdim, "shepherds" (sg. noqed ), and this remark is echoed (though in another term, boqer ) in 7:14. But in the Bible noqed does not refer to a simple shepherd; Mesha, king of Moab, bore the same title (2 Kgs. 3:4). Attention has been called to a Ugaritic text in which nqd is parallel to khn ("priest"), which may suggest that Amos himself was from a priestly family.
Amos definitely does not repudiate the cult, but calls for his audience to approach God. In his vision in 9:1, Amos reports that "I saw my Lord standing by the altar" (JPS). That is, God revealed himself to the prophet in the cultic center that is God's house. Amos's repeated reproach, "yet you did not return to Me" (Am. 4:6, 4:8, 4:10, 4:11) and his demand to "seek Me" (5:4, 5:14), which has a cultic connotation (cf. 1 Sm. 9:9), may be understood as a call for purification of the worship. It can also be argued that Amos felt that the cultic centers of Bethel and Gilgal should cease to function as God's temples because their worshipers had demonstrated their insincerity through their pursuit of luxury and pleasure. Thus, Amos does not call for totally abstract worship and does not oppose the cult in principle. He harshly criticizes, however, the shrines that legitimate social oppression and thus the existence of religious hypocrisy.
Furthermore, the leaders toward whom Amos directs his criticism seem to be devoted worshipers (8:5). One may assume that the political and economic success of the state was taken by the ruling class as a sign of God's protection of Israel. In essence, the cult that assured its worshipers of the stability of their way of life served as religious protection for the social elite. Amos attacks this self-serving belief, pointing out that daily deeds and social justice are inseparable from the cult and, in fact, dominate God's demands of his worshipers.
Amos attacks as well the common belief that God's function is merely to save and protect his people. There was an expectation that there would be a sign, by means of revelation, of God's victories over Israel's enemies. Amos rejects this and argues that "the day of the Lord is darkness, and not light" (Am. 5:18–20); the day will be one of punishment, not salvation. Introducing the idea of God's punishment, he connects it with social crimes and the corruption of ritual. Amos is rooted in the sacred traditions of Israel (e.g., Am. 2:9–10, 3:1, 4:10, 4:11, 5:25, 9:7), and mentions them as proof of God's past and continuing involvement with Israel; but he emphasizes that this involvement is only in response to Israel's social and moral behavior.
In his autobiographical account, Amos mentions his occupation as a dresser of sycamore trees (7:14). This is a trade that required travel, especially since Tekoa, Amos's hometown (located about 8 miles [12.9 km] south of Jerusalem), is in an area where the sycamore does not grow (cf. 1 Kgs. 10:27). Amos's travels may shed light on his broad education and deep knowledge of world affairs (see 1:2–2:16), as well as his contacts with the northern kingdom of Israel. It has also been suggested that Amos's Tekoa was somewhere in the north, which might explain his prophetic activity there; however, no evidence of a northern Tekoa has been found.
Sociologically, one must realize that many prophets (e.g., Amos, Micah, Jeremiah) came from the periphery to preach against urban centers. Villages and small towns preserved a traditional, clear view of the world. Cities, such as Samaria, were centers (especially during Amos's time) of prosperity, new developments, and social change. Social research reveals that it is not unusual for a visitor from a traditional area to be incensed by the breaking of traditional conventions in the city. Thus the changes that defied his traditional views kindled in Amos the fire of criticism and the desire to punish the evildoers.
There have been many discussions of Amos's language. Although he was the first literary prophet, his style is well developed. Does this mean that Amos followed a specific literary tradition, and if so, which? This question should not be of great concern to the modern reader, since in antiquity there was not a significant difference between an oral address and a written speech. Both genres were designed stylistically to be heard, not read silently by an individual reader. Thus Amos did not start a new written tradition but continued a well-developed tradition of oratory.
An analysis of Amos's style reveals impressive literary variations. He employs the conventional prophetic patterns of speech, such as "Thus says the Lord" (e.g., 1:3, 1:6, 1:9, 1:11, etc.); the prophetic formula for a conclusion, "Says the Lord" (2:3, 2:16); and the prophetic verdict, "Therefore" (3:2). He uses specific conventions of the wisdom literature, for example, the formula 3 × 4 (repeated in chaps. 1–2), comparisons, and rhetorical questions (3:3–8), the latter two reflecting secular language. He also employs ritualistic language, such as the hymn (4:13, 5:8–9, 9:5–6) and the lament (e.g., 5:2; see also 5:16–18, 6:1). Amos reveals himself to be a great poet, a master of language with creative skills who knows how to use various modes of speech effectively. His objective is to appeal to his audience. Thus, for instance, in 3:3–6 and 3:8 he utilizes a series of rhetorical questions, a most effective device since its function is to emphasize, and it is stronger than a direct statement. Amos's use of figurative language enables him to describe the disaster he encounters in concrete terms; see, for example, his use of simile in 2:13 and 3:12.
The Book of Amos is divided into four main parts: (1) the superscription plus the chain of oracles against the nations, including Judah and Israel (1:1–2:16); (2) a series of speeches (chaps. 3–6); (3) the vision accounts (7:1–3, 7:4–6, 7:7–9; 8:1ff., 9:1ff.); and (4) a prophecy of salvation (9:11–15). It has been suggested that the first three visions are Amos's call and should be placed at the beginning of the book. In the vision (8:1ff.) of the basket of summer fruit (keluv qayits ), the word summer (qayits ) is a pun on the word for "destruction" (qets ), which symbolizes the end of Israel. This wordplay may shed light on the psychology of prophetic revelation, in which the viewing of an object of daily life is interpreted in a vision or dream as a symbol. The series of vision accounts is interrupted by a biographical account (7:10–17), which reports on the conflict between Amaziah, priest of Bethel, and Amos, in which the priest demands that Amos go to Judah. In response to the question of why this account was inserted among the visions, scholars have suggested that the conclusion of Amos's attack on Amaziah, "Israel shall surely go into exile away from its land" (7:17), corresponds to the vision "The end has come upon my people Israel" (8:2) and that an editor, who some forty years later witnessed the exile of the priest of Bethel and his people by the Assyrians, inserted his account of this event as a sign of prophetic fulfillment.
Nineteenth-century scholarship assigned most of the material in the Book of Amos to Amos himself (except, perhaps, the prophecy of comfort at the end of the book). Current scholarship, however, is more skeptical and suggests a lengthy and complex redactional history. It has long been argued that the book's conclusion (9:11–15), a prophecy of comfort focusing on the house of David (and not on the northern kingdom or its rulers), reflects a later period. The prophecy against Judah in 2:4–5, which is foreign in its context, is also considered to be late. Recent scholarship has been attempting to organize the editorial layers in order according to the occurrence of political developments. Wolff has suggested that six stages of redaction took place, with the first three stages in the eighth century: the collection of the oracles in chapters 3–6 (the words of Amos himself); the incorporation of the oracles directed against the nations at the beginning of the book and the visions at the end of the book; and the insertion of the prose account of the Bethel episode. In the fourth stage, in the time of Josiah, the doxologies (hymns) were added, as well as an elaboration of Amos's critique of Bethel and the local cult corresponding to Josiah's reform (cf. 2 Kgs. 23:15). Later there was a fifth, Deuteronomistic, redaction, which occurred in the exilic period and added the oracles against Tyre (1:9–10), Edom (1:11–12), and Judah (2:4–5). Finally, there was a postexilic redaction that added themes of salvation and eschatology so that the book would conclude on a positive note. Another suggestion, by Coote, is that the Book of Amos is the product of three stages of redaction: (1) the words of judgment by Amos delivered against the ruling class; (2) the period of Judah's reform, which added oracles of reinterpretation concerning the possibility of repentance; and (3) another series of reinterpretations for Judahites who were in exile or who had returned to the homeland.
These theories of redactional history are nonetheless speculative, since they consider certain thematic developments or changes in the genre of prophetic speech to be indications of later accretions. They assume that changed historical conditions led to new theological interpretations. This notion of systematic change and reinterpretation may be challenged, however, in light of Amos's intention to appeal to his audience, which required stylistic and emphatic variety as well as sensitivity to the audience's mood. He may sometimes have called for repentance or perhaps delivered an oracle of salvation based upon his overall religious worldview. Still, this does not mean that Amos was the sole author of the entire book. There may have been specific insertions (e.g., 5:13), which, however, do not imply a systematic editorial process.
Coote, R. B. Amos among the Prophets. Philadelphia, 1981.
Kapelrud, Arvid S. Central Ideas in Amos. 2d ed. Oslo, 1961.
Mays, James Luther. Amos: A Commentary. Philadelphia, 1969.
Wolff, Hans Walter. Joel and Amos. Edited by Dean McBride and translated by Waldemar Janzen. Philadelphia, 1977.
Hasel, Gerhard F. Understanding the Book of Amos: Basic Issues in Current Interpretations. Grand Rapids, Mich., 1991.
Hayes, John Haralson. Amos, the Eighth-Century Prophet: His Times and His Preaching. Nashville, 1988.
Polley, Max E. Amos and the Davidic Empire: A Socio-historical Approach. New York, 1989.
Rosenbaum, Stanley Ned. Amos of Israel: A New Interpretation. [Louvain, Belgium] Macon, Ga., 1990.
Watts, John D. W. Vision and Prophecy in Amos. Macon, Ga., 1997.
"Amos." Encyclopedia of Religion. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
AMOS (Heb. עָמוֹס; eighth century b.c.e.), prophet in the northern kingdom of Israel. The Book of Amos is the third book of the 12 Minor Prophets according to the Hebrew order (between Joel and Obadiah) and the second according to the Septuagint (between Hosea and Micah). Amos is considered the earliest of the Latter Prophets and by some is considered the first of the writing prophets.
According to the superscription of the book, Amos was a herdsman (noqed) from Tekoa who prophesied concerning Israel in the days of *Uzziah, king of Judah, and *Jeroboam, son of Joash, king of Israel, "two years before the earthquake" (1:1). The title noqed is applied again in the Bible to *Mesha, king of Moab, who is said to have been a sheepmaster (ii Kings 3:4). Amos also attributes this employment to himself when he says that he was primarily not a prophet but a noqed (in the masoretic text boker (boqer; "cowherd"), it seems necessary to read the word noqed, with the help of the lxx) and a dresser of sycamore trees who was taken from following the flock to prophesy concerning Israel (7:14–15). The term rb nqdm is cited in the Ugaritic writings along with the title rb khnm, i.e., "chief priest" (C.H. Gordon, Ugaritic Text-Book, 62:54–55), where it is explained as one of the temple functionaries who was responsible for the flocks ("chief herdsman"). Some scholars therefore deduce that noqed, as connected with Amos, also has a sacral meaning and that even before becoming a prophet, Amos was directly concerned with the service at the Temple in Jerusalem (Haldar, Kapelrud, et al.). However, this supposition is far from certain.
Amos' birthplace, *Tekoa, was located to the south of Bethlehem near the Judean Desert, and was known for its wise men (ii Sam. 14:2–21). This has led to the conclusion that Amos' origin was in Judah. But it is striking that there is no hint of denigration of calf worship in his prophecies, despite the fact that he does not refrain from condemning cultic sins (2:7, 12). In his silence on the matter of the calves, he is similar to the northern prophets *Elijah and *Elisha. Furthermore, Tekoa of Judah is not a sycamore-growing locale; sycamores grew in the Shephelah. Therefore, there may be truth in the explanation first suggested by David Kimḥi and since adopted by several modern scholars, such as Graetz, Oort, and Schmidt, that Amos' Tekoa was in fact a northern city. A Galilean Tekoa is known from talmudic literature. The verse, "The Lord roars from Zion, and utters his voice from Jerusalem" (1:2), is a formulaic image (cf. Joel 4:16; Jer. 25:30). The mention of Zion in 6:1 is not decisive, since the prophecy is intended for the northern kingdom. The oracle on the restoration of the house of David (9:11 ff.) is doubtful and perhaps not to be attributed to Amos (see below), while the words of *Amaziah to Amos may not testify to the origin of the prophet, for Amaziah does not tell him to return to Judah, but rather: "… go, flee away into the land of Judah, and there eat bread.…" A priest of Beth-El could issue such an order even to a northern prophet, particularly during the period of Jeroboam ii and Uzziah, when peaceful relations between the two kingdoms flourished. Amos' prophetic activity took place within the northern kingdom only. There are several allusions in his prophecies to events concerning the northern kingdom and mention is made of Samaria (3:12; 4:1; 6:1; cf. 3:9), and the northern shrine cities, with Beth-El at their head (3:14; 4:4; 5:5–6; 8:14; cf. 9:1). It appears that Samaria, and especially the sanctuary of Beth-El, were actually the scenes of his activity, as is confirmed by the narrative on his encounter with Amaziah (7:10–17).
His prophetic activity began two years before the earthquake (1:1) and continued for some time afterward. This earthquake, which occurred during the reign of Uzziah, is mentioned again in Zechariah 14:5. Impressions of it were recorded by a number of prophets who were active during that period, including Amos himself (see below). Also reflected in Amos are the great political and military changes that took place during the 41-year reign of Jeroboam son of Joash (ii Kings 14:23); they provide the chronological framework of the prophet's career.
The earliest of Amos' oracles are the "prophecy against the nations," at the beginning of the book (1:2–2:6), and the prophecy of visions (7:1–9; 8:1–3). Both precede the earthquake, impressions of which are not yet recognized therein (except for 1:2, where a formulaic usage serves as the superscription for the first prophecy). The situation reflected in the "prophecy against the nations" is that of the early years of Jeroboam's reign, before Transjordan was returned to Israelite sway. In this instance the prophet cries out against the injustices of Israel's neighbors, reminding them of their acts of violence and oppression, particularly against Israel. In the prophecy of visions he even refers to Jacob as "so small" (7:2, 5), an attribute that would hardly be appropriate after Jeroboam's extensive gains in Syria. Some claimed that the oracle of visions was Amos' inauguration prophecy (Wellhausen, Budde, et al.). There is nothing in its form or content, however, to justify this claim, though the prophecy does belong to an early stage of Amos' career.
In contrast, the moral reprimands (2:7–6:14; 8:4–14) belong to his later prophecies and reflect the later period of Jeroboam's reign, when *Damascus and *Hamath were already under the hegemony of Israel. The conquest of Transjordan is alluded to in these reprimands (6:13), "the kine of Bashan" who are said to dwell on Mount Samaria (4:1), and Israel's territory is described as stretching from Lebo-Hamath to the Brook of the Arabah (6:14; cf. 3:12). Life in Samaria is characterized by luxury, complacency, and frolic (3:12, 15; 5:23; 6:1, 4–6; 8:10). The inflictions of hunger, locust, and drought are mentioned as part of the past (4:6–9; cf. 8:10). Even the earthquake is recalled in these reprimands as a foregone matter (4:11), while the shocking experiences that came in its wake serve to perceive the impending catastrophe (2:13–15; 3:14–15; 4:3; 6:9 ff.). Still another event alluded to in the moral rebukes, and serving to fix their upper chronological limits, is the solar eclipse, which, according to the Assyrian eponym lists, took place in Sivan 763 b.c.e. This event also serves the prophet as a fitting figure of the punishment to come (8:9).
Thus, although the prophecies of Amos that survived and were collected in the book bearing his name are few, they range over a relatively long period. Variations of character and diction among them lend support to the conclusion that Amos' prophetic output was far greater than what has been preserved in his book.
In the narrative section 7:10–17, a conflict between Amos and Amaziah, the priest, is recorded. Amaziah, who apparently had no authority to punish the prophet, complains about him to Jeroboam, the king: "Amos has conspired against you in the midst of the house of Israel" (7:10). Since there is no royal response the king deemed the matter unimportant. The priest himself tries to drive Amos out of Beth-El by derision (7:12–13), to which Amos responds with emphatic pride about his mission (7:14–15). He ends with a fearful prediction of Amaziah's own future and a renewed pronouncement of Israel's exile (7:16–17). Even in his response Amos says nothing about the king, reinforcing the impression that the quarrel was between him and the priest. Nor are there any further details on the progress or resolution of this clash. This excerpt may pertain only to an extraordinary and provocative event, which did not necessarily occur at the end of Amos' career.
1. The Book of Amos falls into four divisions, in each of which all or most of the prophecies are of one kind: a prophecy against the nations (1:2–2:6), prophecies of the punishment of Israel (2:7–6:14), "stories" about the life experiences of the prophet (7:1–9:6), and a prophecy of comfort for Israel (9:7–15). The remaining prophetic books of the Bible are built upon the same four categories, but they are not necessarily arranged in the same order and not every one has left prophecies in all four categories. The editors of the Book of Amos chose the above-mentioned order so that the "prophecy against the nations" opens the book, and the prophecy of consolation brings it to a close. The beginning and end divisions each contain only a single unit, since the editors did not find any more than that, whereas the remaining divisions have clusters of prophecies that could be considered as small scrolls in their own right.
The classification of the prophecies was not a priori but rather as viewed in retrospect by the editors. There are prophecies that could have been classified in a category other than the one into which they are now placed. The editors, however, found a justification for such placement. The first prophecy (1:2–2:6), for instance, is not really an oracle against the nations, since it concludes with Judah and Israel; but since its greater part deals with the neighbors of Israel, the editors could view it as a prophecy against the nations as well. The larger part of the third division does not contain actual stories but visions spoken by the prophet in the first person. From the point of view of their content they could be considered among the judgment prophecies. In the Book of Jeremiah similar visions are in fact included among the judgment prophecies (cf. Jer. 1:11–14; 24:1–3). However, since they are stamped with an autobiographic and narrative form, they could serve in the hands of the editors as a narrative division. One such fragment has already been established among these visions, the incident in the sanctuary of Beth-El (7:10–17), which heightens the narrative character of the entire division through its biographic style. At the same time, a small group of rebukes, similar to those in division two, has been found here (8:4–14). Yet the editors could not allow themselves to transfer it; neither was it significant enough to alter the character of this division as a whole. Similar instances are to be found elsewhere in the Prophets, where the editors did not smooth over inconsistencies for the sake of absolute uniformity.
3. Verses of a unique type are found in the following places in the Book of Amos: 4:13; 5:8–9; 8:8; 9:5–6. Except where the verses interrupt the continuity (5:8–9), they fit fairly well into the context. Yet, they are distinct in content, language, and literary form. Their subject is words of praise to God and the description of his power as revealed in nature. Since scholars apprehended their specific character as cosmic hymns to God, the term "doxologies" has been applied to these verses. The distinctiveness of these verses in the Book of Amos has caused many scholars to claim that these are later additions (Wellhausen, Nowack, Stade, Driver, Sellin, et al.). Various suppositions have been expressed concerning their function; for example, that they served as conclusions to chapters that were read as cultic liturgy (Weiser, et al.), or conclusions to prophetic collections that were absorbed into the Book of Amos (Fohrer, et al.). After the hymnic character of these verses had been noted, the supposition was raised that these are fragments of one hymn that were scattered throughout the Book of Amos, and some attempts have even been made to reconstruct that hymn in its entirety (Budde, Horst, et al.). On the other hand, there were scholars who never denied the authenticity of these verses, and even after their hymnic quality was determined, assumed that the prophet expressed himself here by means of a formulaic style (Robinson, Hammerschaimb, Botterweck, et al.). There were also scholars who attempted to maintain both assumptions at once, i.e., that these verses are both authentic and fragments of a hymn written by Amos (Kaufmann), or of a hymn which Amos interlaced with his own words (Watts, similarly Farr).
Even though these verses are set in a hymnic die, they differ in the Bible, and some of the praises to God contained in them have no example elsewhere in the Bible. Apparently this hymnic style is not that of psalms. In other words, in contradiction to the psalmodic hymns, these did not serve as prayers, but as mere literary clichés. Hymnic passages which do not belong to the psalmodic genre are also found in the Book of Hosea (12:6, and in a slightly different tone 13:4–5 (in lxx there are additional verses nonexistent in the Masoretic Text)) and intertwined with the speeches of the Book of Job (5:9–16; 9:4–10 (the closest to the hymnic verses of Amos); 12:7–25; 26:6–13), and to a certain degree similar verses are found in the words of Deutero-lsaiah (Isa. 40:22; 42:5; 44:24; 45:18, et al.). But then Amos' verses probably reflect an early phase of this literary type. The fitting of most of these verses in their context makes it not impossible that they are of the prophet's pen and that Amos availed himself of them to conclude some of his oracles, with the exception of one instance where the verses were not inserted in their proper place (Amos 5:8–9). Furthermore, in the descriptions of the trembling of the earth, its rising and sinking "as the river of Egypt," and the pouring out of the sea over the face of the earth (5:8; 8:8; 9:5–6), one may hear an echo of the earthquake, whose impression is recorded in the other prophecies of Amos as well (see above).
4. In the first prophecy of the book (1:2–2:6) various scholars denied the authenticity of the sections concerning the Philistines (1:6–8), Tyre (1:9–10), Edom (1:11–12), and Judah (2:4–5). However, their claims are not decisive, and the opinion of the commentators who consider these sections an integral part of the body of the prophecy should be preferred. Doubts have also been raised concerning Amos 6:2, which mentions the destruction of Calneh, Greater Hamath, and Philistine Gath – cities which were conquered by *Tiglath-Pileseriii and *Sargon many years after the reign of Jeroboam. But it is possible that the verse refers to earlier catastrophes that overwhelmed these cities. The statement in 1:5 – "the people of Aram shall go into exile to Kir" – appears to correspond too faithfully to reality according to ii Kings 16:9, so that the mentioning of Kir in one of these two passages seemed suspect. In addition, it is not customary for Amos to mention by name the place to which a nation will be exiled. However, the mention of Kir in another passage as the provenance of the Arameans (9:7) is an argument in favor of the authorities in the prophecy of exile, which is comparable to the threat in other books that Israel will return to Egypt (Deut. 28:68; Hos. 8:13).
The prophecy of comfort at the end of the book has also been taken to be late. Indeed, it does contain late expansions (see below). Perhaps in the course of time, some late idioms have found their way into the words of Amos, even in places where there is no reason to deny the authenticity of the passage in general. Of this type seem to be the references to the deities Siccuth, Chiun, and Kokhav (star god) in 5:26, and Ashimah of Samaria in 8:14. Siccuth (Succoth-Benoth) and Ashimah are mentioned in ii Kings 17:30 as deities which were worshipped by the men of Babylon and the men of Hamath who were settled in Samaria after the exile of Israel. However, there are some who think that the cult of these deities had gained a foothold in Israel, even prior to the exile of the northern tribes. Possibly, a few Deuteronomic idioms also became attached to various places in the text of Amos. Such is the idiom "I will set my eyes upon them for evil and not for good" (9:4), to which Jeremiah 21:10; 24:6; 39:16, et al., can be compared. There are those who find Deuteronomic impressions in the section on Judah (2:4–5) as well. But even if this assumption were certain, it would still not be sufficient to invalidate the reliability of the core of this section.
The "prophecy against the nations" (Amos 1:2–2:6) begins with a formulaic call (1:2) and contains a series of sections in a stereotyped structure, the subject of which is the neighbors of Israel, concluding with Judah and Israel themselves. To them all, the prophet promises exile and destruction. The utterances to Judah and Israel serve as an apex of this prophecy; hence it appears that this is actually not a prophecy against the nations, though in the main it does speak against Israel's neighbors. Many scholars believe that its conclusion coincides with the end of chapter two (2:16). However, all that is said after 2:6 is already stamped with the mark of the moral reproofs of the second division, and it is doubtful whether it constitutes a suitable continuation to the first prophecy. Probably the section on Israel (2:6), which lacks the typical conclusion, "So I will send a fire… and it shall devour the strongholds of…" has not been preserved in its entirety, but this prophecy was cut short at the end, and the editors then attached to it the scroll of reproofs to Israel. Thus the section on Israel, and thereby all of the "prophecy against the nations," was stitched to the moral reproofs of the second division. This is one of Amos' earliest prophecies; the period of time reflected in it is the beginning of Jeroboam's reign, before Transjordan was recovered by Israel (see above).
This division is made up exclusively of prophecies of reproof. The first is 2:7–16, the first part of which is probably lost, for it lacks a formal opening (see above). It is divided into three segments: a description of the moral and cultic corruption (7–8), the past grace of God to Israel (9–12), and a description of the impending catastrophe (13–16). 3:1–15 opens with the call "Hear this word." It is divided as follows: a statement about the relation of the election of Israel and the greater responsibility placed upon it (1–2), a proverb on the connection between cause and effect and on the significance of the prophetic word (3–8), descriptions of catastrophes and reminders of sins (9–12), and a statement on the day of punishment and the destruction of Israel for its transgressions (13–15). The prophecy 4:1–13 again begins with the call "Hear this word." It is divided into four segments: a description of the corruption and punishment of the "kine of Bashan which are on the mountain of Samaria" (1–3), a denunciation of the worship in the temples (4–5), a series of afflictions that came upon Israel but were not sufficient to return the people to God (6–11), and a call to the people to prepare to meet their God, concluding with hymnic verse (12–13). The prophecy 5:1–17 also opens with "Hear this word" and is divided into the following segments: a lament on the downfall of Israel (1–2) and a description of calamity (3); an accusation against the worship in temples and a warning of exile and destruction (4–6); a description of the moral corruption and its attendant punishment (7, 10–13), in which two hymnic verses are inserted (8–9); a call to repentance (14–15) and a depiction of mourning as a result of the coming catastrophe (16–17).
The prophecy 5:18–27 opens with the call "Ah!" (Heb. Hoi). It is divided into three segments: a description of the terrors of the Day of the Lord (18–20), a denunciation of the worship in the temples and a call to repentance (21–25), and a promise of exile to Israel (26–27). The following prophecy, 6:1–14, also begins with the exclamation "Ah!" and is divided into four segments: a call to Israel not to be tranquil about its future, since it is no better than other kingdoms that were also destroyed (1–2); a description of the serene and luxurious life and a warning of exile (3–7); God's oath to bring destruction upon Israel and descriptions of calamities (8–11); and a reproof on the moral corruption and a warning of catastrophe (12–14).
The prophecy of visions (7:1–9; 8:1–3) is divided into two pairs of sections, which are of a similar structure. All the sections begin with the words "Thus has the Lord God shown unto me, and behold…," a specific vision being mentioned in each one. In the first two sections the prophet sees visions of disasters – locusts (7:1–3) and drought (4–6). He begs for mercy until God repents the evil decree and cancels it. In the last two sections the prophet sees symbolic visions: "The Lord stands upon a wall made by a plumbline, with a plumbline in his hand" (7–9) and "a basket of summer fruit," that is, figs that ripened late (8:1–3). These two visions are explained to him as symbols of the destruction of Israel, and the prophet does not even attempt to void the decision. Both conclude with poetic sentences depicting the destruction. This prophecy belongs to the two years at the beginning of Amos' activity, before the earthquake (cf. above). The opinion of Sellin, Rost, and others that this prophecy should be fixed at the end of Amos' work does not stand to reason.
A fragment of a story on an incident that occurred to Amos at the temple of Beth-El (7:10–17) has been inserted into the midst of the prophecy of visions. According to the story, the priest of Beth-El complained to Jeroboam about Amos and even attributed to the prophet intentions of rebellion against the king, quoting from his words: "Jeroboam shall die by the sword, and Israel shall surely be exiled away from his land" (11). Throughout all of Amos' prophecies Jeroboam is mentioned by name only at the end of the third section of the prophecy of visions (7:9). This was judged a sufficient reason to insert the narrative at this point, thereby separating the two last sections of the prophecy of visions. Also attached to the prophecy of visions is a group of prophetic sayings whose content is close to the prophecies of the second division (8:4–14). It comprises two or three fragments: a prophecy divided into two links, or two pieces that have been joined together – a description of the moral corruption, God's oath not to forget the deeds of Israel, with a hymnic verse (4–8), and a description of the terrors of the Day of the Lord (9–10); and a piece consisting of sayings concerning the future hunger and thirst for the words of God (11–14).
Chapter 9, verses 1–6 is a vision of the destruction of Israel. Similar to the prophecy of visions, this unit is also related in the first person, which caused many scholars to believe that it is a direct continuation and climax of the preceding visions. However, it is more likely that it is a self-contained literary unit. At the same time it is possible that the editors found this vision in the continuation of the scroll of "stories" that contains the prophecy of visions, with the fragments inserted in, and attached to it. The literary structure of this vision differs from that of the former visionary prophecy. At the beginning of this unit the prophet remarks that he saw the Lord standing beside the altar and ordering the execution of the catastrophe. There is no exchange of words between the prophet and the Lord, and from the opening the vision immediately proceeds to depict the catastrophe. The work of destruction begins with Beth-El, and from there it spreads out enveloping the entire people, without leaving them any place of refuge. The vision is concluded by two hymnic verses.
This is a single prophecy of comfort to Israel, divided into four segments (9:7–15): in the eyes of God, Israel is not considered to be more important than other nations (9:7); therefore, God is about to destroy the sinning kingdom, but it will not be completely destroyed – He will scatter Israel among all the nations, and the sinners in its midst who were indifferent to the coming calamity will perish (8–10); afterward God will raise up the fallen tabernacle of David, and His people will inherit the remnants of Edom and other nations (11–12); Israel will return to its land and rebuild it, without being exiled from it again (13–15). Thus, the first two segments essentially express a message of calamity, whereas the last two, a message of salvation. Most scholars are of the opinion that the last two segments are not of Amos, whereas a minority views them as authentic. The opinion of the former appears to be the more plausible. However, the editors of the Book of Amos found this prophecy in its expanded form, i.e., when both last segments were already contained in it and attributed to Amos. Consequently, they took it to be a prophecy of comfort and placed it as a division on its own. Even though the last two segments seem to be later expansions of the words of Amos, it does not imply that he was only a prophet of woe and did not compose prophecies of comfort. Among the extant prophecies in the book bearing his name, however, there is no prophecy of comfort except this one.
Amos testifies that he "was taken from following the flock" to prophesy to Israel (7:15). Nevertheless, one cannot conceive of him as a common person, whose power lies in spiritual inspiration and insight alone. His writings also demonstrate qualities of education and erudition. His polished and highly artistic style could not be attained without literary training, since such a style serves as an obvious indication of the creativity of a man of letters. Amos is well acquainted with the life of the social elite, has a clear perception of all the military and political occurrences on Israel's perimeter (1:3–2:3; 4:10; 5:27; 6:13–14, et al.), and displays an outlook that encompasses even the fates of nations throughout the Near East (1:3–5; 6:2; 9:7, et al.). Moreover, among his compositions are found a few prophecies explicitly molded in an autobiographic form (see above), as are to be found also in other prophets, and they suffice to verify that Amos, similar to the rest of the Latter Prophets, was also a writer. His other prophecies even though not of an explicit autobiographical mold, are first and foremost literary creations, which he himself, as an artist and poet, shaped. It cannot be told for certain whence this prophet, who was taken from following the flock, received his erudition and literary training. It could have been in his city, Tekoa, which was known for its wise men (cf. above). He could also have attained this stage later on in life.
Amos' prophetic creation is undoubtedly rooted in literary tradition and his compact and superior style may prove that others preceded him in crystallizing words of prophecy in writing. A few formulaic traits are already discernible in his language. Amos surely did not invent these, but received them ready-made. It is even possible that in some places prophetic words prior to those of Amos have found their way into the books in our possession, but the names of their authors are lost. Amos, however, is the first whose name has been preserved on prophetic writings that were collected in a special book and whose prophetic personality transpires from this book.
The major part of his message is devoted to promises of catastrophe to befall Israel, expressed in several ways. Often the terrors of the earthquake serve him to make the coming catastrophe perceptible (2:13–16; 3:14–15; 4:3; 6:11; 9:1). In other places he depicts scenes of siege, the conquering of a city, and the despoiling of palaces (3:9–11; 4:2–3; 6:8). He also promises Israel the tragedy of exile (5:5, 27; 6:7; 9:9). Amos is the first to express the threat of exile in the Bible, just as he is the first to use explicitly in this connection the Hebrew verb galah. Apparently, in this instance his words reflect the Assyrian system, i.e., to uproot and transfer nations from their homelands. In portraying the impending calamity, Amos avails himself of the concept of the *Day of the Lord. This concept primarily denoted a day of salvation for Israel and stringent judgment upon its enemies. This is its significance in the words of several prophets as well as in the passage of consolation appended at the end of the Book of Amos (9:11). Even Amos himself probably fashioned his "prophecy against the nations" after the model of the Day of the Lord oracles (1:3–2:3), though he tacked on to it words of punishment to Judah and Israel. At the same time, Amos reverses the meaning of the Day of the Lord, conceiving it as a day of calamity and judgment upon Israel itself. His usage of this popular concept in reversed fashion is clearly indicated in several verses (see 5:18, 20; also 8:3, 9–10). From the latter passages it can be inferred that in other connections also, when Amos cries out a lamentation and depicts scenes of mourning, a multitude of corpses, and silence everywhere (5:1–2, 15–17; 6:9–10), it is possibly the horrible image of the Day of the Lord that hovers before his eyes.
These various expressions of the message of catastrophe sometimes contradict each other on certain points. Yet, they should not be measured by principles of harsh logic, for the prophet himself undoubtedly did not mean to express his visions in formal, systematic concepts. The poetic images served him only as a means to portray the terror of the impending crisis. Similarly, he often describes the calamity as decided and absolute, allowing no living remnant to survive (see especially 9:2–4). But on the other hand, he speaks of exiling the people from the country, and sometimes assumes that a remnant will be preserved (3:12; 5:3, 15). Furthermore, those who are destined to die are only the sinners who do not believe that evil will befall them (9:10). Contradictions of this nature can be found even within the same prophecy: from Israel will be preserved remnants (5:3), but even so the people are liable to burn in a fire which no one will be able to extinguish (5:6); they will be exiled from their land (6:7), but even so God will raise up against them a nation who will oppress them from Lebo-Hamath to the Brook of the Arabah (6:14). Thus in the first prophecy to all the nations enumerated there the prophet promises burning by fire and destruction, but to a few of those he adds a promise of exile (1:5, 15). Real contradictions exist in these words for those who conceive of them in the framework of contemplative and methodical thought. But in the agitated images of a prophet their purpose is only to complement and strengthen each other. Likewise, the prophet will often describe the catastrophe as inevitable, as a predetermined decree of fate, but he also calls for repentance, thereby pointing the way to life. This occurs even in the midst of the depictions of catastrophe (5:4–6, 14–15). Hence, in the depictions of the decreed catastrophe, he does not exactly "mean" what he says. His words are rooted in a despair of repentance, or their true meaning is that of a threat only.
The promises of doom are explained by Amos, as well as by other prophets, as the result of the people's social and moral corruption: robbery of the poor, extortion of judgments, cheating in business, acts of plunder and violence by the ruling elite (2:7–8; 3:9–10; 4:1; 5:7, 10–12, 15; 6:4–6). At the same time he denounces the life of luxury and enjoyment (3:12, 15; 4:1; 5:11; 6:4–6; 8:3), and here too he is a partner in the prophetic ideal of simple and innocent life (Isa. 2:12–17; 3:16–23; Hos. 8:14; 13:5–6; Zeph. 3:11–12, et al.). The comforts and great happiness in the lives of the rulers evoke hostility in Amos, for the additional reason that they indicate apparent security and disbelief in the impending calamity (4:1–2; 6:3–7; 9:10). Therefore, he mocks the happiness of the people for their military conquests, which, according to his outlook, will turn to nought (6:13–14). He also defies the worship in the temples, which accompany an abundance of sacrifices, rapturous assemblies, and shouts of joy (4:4–5; 5:5, 21, 23). The people do not sense that all these exhibitions of abundance and pomp will not erase the decree of destruction of the places of worship (5:5; 7:9; 9:1). Rescue will come by seeking the Lord, which is the seeking of the good and is intertwined with a moral and social purification (5:4–6, 14–15, 24). In this connection, the prophet does not hesitate even to state that the Lord despises the cult practiced in His honor in the temples (5:21–23). Furthermore, he claims that even in the desert, Israel did not worship the Lord with sacrifices and offerings (5:25). This claim reflects the view of the early Pentateuchal sources (je), according to which Israel made some sacrifices before they left Egypt (Ex. 12:21–27) and when they were encamped by Mount Sinai (Ex. 3:12; 17:15; 18:12; 24:4–8; 32:5–6), but no mention is made of their sacrifices along the journey from Sinai to Canaan. Similarly Jeremiah asserts that when God brought Israel out of Egypt he neither spoke to Israel nor commanded them concerning burnt offerings and sacrifices (Jer. 2:22–23).
Although Amos appears to invalidate the worship in the temples, he does not do it because of the cult as such, but only to accentuate the significance of social ethics. Cultic acts are not important enough to him when they are bound with moral corruption and oppression of the poor (2:7–8). The demand to remove the noise of songs and the melody of harps serves him as an introduction to the positive demand: "and let justice roll down like waters, and righteousness like an everflowing stream" (5:23–24). Similarly, the call to refrain from coming to the temples is related by him to the call to seek the Lord in order to be saved from the catastrophe and to live (5:5–6). Therefore, one should not attribute to Amos a decisive invalidation of the value of the cult (as, e.g., Weiser tended to do), for this invalidation is decreed by him not for its own sake, but rather serves as a kind of rhetorical-polemic means to a greater emphasis on the value of ethics. However, the very perception that the people's fate is determined solely by its social and moral perfection, found in Amos its first exponent in biblical literature. Afterward, it recurs in various degrees of accentuation in the books of some of the great prophets who succeeded him. But Amos and the other prophets were hardly conscious of the uniqueness of this notion, in which an exceedingly revolutionary idea is hidden. To them it looked like a fundamental principle of the ancient belief in yhwh, in whose name they spoke to the people and by whose authority they made ethical demands. Consequently, it also would not be accurate to say (as did, e.g., Cramer), that in fact Amos did not introduce any new religious idea. The unique innovation of Amos (and of the prophets after him) was in a new apprehension of the inner significance of the Yahwistic belief with its ancient tradition. But this innovation was hardly perceptible to its exponents.
Many scholars assert that Amos is also superior to his contemporaries in his perception of God, for he emphasizes the power of yhwh over the fates of many nations besides Israel (9:7; cf. 6:1). The people of Israel are no more important to yhwh than are the Ethiopians (9:7); their election from among all the families of the earth only burdens them with a greater moral responsibility (3:2). Amos' prophecies were one of the turning points in moving Yahwistic religion in the direction of monotheism. Although this view was challenged by such outstanding scholars as *Albright and *Kaufmann, our increased knowledge of ancient Israelite religion indicates that the road to monotheism was a long one, and that Amos was a significant signpost on that road.
commentaries: J. Wellhausen, Die kleinen Propheten (18932); W.R. Harper (icc, Eng., 1905); S.R. Driver (Eng., 19152); W. Nowack (Ger., 19223); E. Sellin (Ger., 19292, 3); T.H. Robinson (Ger., 19542); N.H. Snaith (Eng., 1956); E. Hammershaimb (Danish, 19582); R.S. Cripps (Eng., 19603); A. Weiser (Ger., 19645); J.L. Mays (Eng., 1969); H.W. Wolf (Ger., 1969, incl. bibl., 139–44). add. bibliography: Idem, Joel and Amos (Hermeneia; 1977); F. Andersen and D.N. Friedman, Amos (ab; 1989); S.M. Paul, Amos: A Commentary (Hermeneia; 1991); G. Jeremias, Amos: A Commentary (1998). selected bibliography: H. Schmidt, in: bzaw, 34 (1920), 158–71; K. Budde, in: jbl, 43 (1924), 46–131; 44 (1925), 63–122; A. Weiser, Die Profetie des Amos (1929); K. Cramer, Amos-Versuch einer theologischen Interpretation (1930); L. Koehler, in: Theologische Rundschau, 4 (1932), 195–213; R. Gordis, in: htr, 33 (1940), 239–51; J. Morgenstern, Amos Studies (1941) = huca, 11 (1936), 19–140; 12–13 (1937–38), 1–53; 15 (1940), 59–305); idem, in: Tribute… Leo Baeck (1954), 106–26; idem, in: huca, 32 (1961), 295–350; H.H. Rowley, in: Festschrift… O. Eissfeldt (1947), 191–8; E. Wuerthwein, in: zaw, 62 (1950), 10–52; A. Neher, Amos. Contribution à l'étude du Prophétisme (1950); M. Bič, in: vt, 1 (1951), 293–6; V. Maag, Text, Wortschatz und Begriffswelt des Buches Amos (1951); J.P. Hyatt, in: zaw, 68 (1956), 17–24; S. Jozaki, in: Kwansei Gakuin University Annual Studies, 4 (1956), 25–100 (Eng.); J.D.W. Watts, Vision and Prophecy in Amos (1958); G. Botterweck, in: bz, 2 (1958), 161–76; Y. Kaufmann, Toledot, 3 (1960), 56–92; A.H.J. Gunneweg, in: ztk, 57 (1960), 1–16; M.J. Dahood, in: Biblica, 42 (1961), 359–66; A.S. Kapelrud, Central Ideas in Amos (19612); idem, in: vt Supplement, 15 (1966), 193–206; S. Terrien, in: Essays… A. Muelenburg (1962), 108–15; G. Farr, in: vt, 12 (1962), 312–24; H. Gese, ibid., 417–38; H. Reventlow, Das Amt des Propheten bei Amos (1962); S. Cohen, in: huca, 32 (1962), 175–8; 36 (1965), 153–60; R. Fey, Amos und Jesaja (1963); H.W. Wolf, Amos' geistige Heimat (1964); M. Weiss, in: Tarbiz, 34 (1965), 107–28, 303–18; W. Schmidt, in: zaw, 77 (1965), 168–92; H. Gottlieb, in: vt, 17 (1967), 430–63; S. Segert, in: Festschrift…W. Baumgartner (1967), 279–83; M. Haran, in: vt, 17 (1967), 266–97; idem, in: iej, 18 (1968), 201–12; idem, in: Tarbiz, 39 (1970) 126–36. on the "doxologies": K. Budde, in: jbl, 44 (1925), 106–8; T.H. Gaster, in: Journal of Manchester Egyptian and Oriental Society, 19 (1935), 23–26; G.R. Driver, in: jts, 4 (1953), 208–12; J.D.W. Watts, in: jnes, 15 (1956), 33–39; F. Horst, Gottes Recht (1961), 155–66; G. Farr, in: vt, 12 (1962), 321–4; W. Brueggemann, ibid., 15 (1965), 1–15; J.L. Grenshaw, in: zaw, 79 (1967), 42–52. add. bibliography: R.F. Melugin, in: Currents in Research, 6 (1998), 65–101; I. Jaruzelska, Amos and the Officialdom in the Kingdom: The Socio-Economic Position of the Officials in the Light of the Biblical, the Epigraphic and Archaeological Evidence (1998); M.D. Carroll Rodas, Amos-the Prophet and his Oracles: Research on the Book of Amos (2002).
"Amos." Encyclopaedia Judaica. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>.
Douglas is Amos, an aging baseball coach confined most reluctantly to a nursing home. He's disturbed by recent suspicious events there, his concern causing him to take on Montgomery, the staunch head nurse. Well-acted drama produced by Douglas's son Peter, offering an echo of “One Flew Over the Cuckoo's Nest,” which Dad starred in on Broadway and son Michael helped produced as a movie classic. 100m/C VHS . Kirk Douglas, Elizabeth Montgomery, Dorothy McGuire, Noriyuki “Pat” Morita, James Sloyan, Ray Walston; D: Michael Tuchner; M: Georges Delerue.
"Amos." VideoHound's Golden Movie Retriever. . Encyclopedia.com. 8 Apr. 2019 <https://www.encyclopedia.com>. | 2019-04-25T14:09:47Z | https://www.encyclopedia.com/philosophy-and-religion/bible/old-testament/amos |
An example display device includes an active portion having a plurality of display electrodes, an inactive portion, a plurality of source lines disposed at least partially in the active portion, and a plurality of routing traces. The routing traces include a first routing trace, at least a first portion thereof being disposed in a first metal layer, parallel to a first source line of the plurality of source lines and in the active portion. The routing traces further include a second routing trace, a first portion thereof disposed parallel to the first routing trace in the first metal layer and in the active portion, a second portion of the second routing trace disposed in a second metal layer in the inactive portion and crossing the first routing trace, the second routing trace coupled to a first display electrode of the plurality of display electrodes through a first via.
Embodiments of disclosure generally relate to capacitive sensing and, more particularly, routing conductors in an integrated display device and sensing device.
Techniques for routing conductors in an integrated display device and sensing device are described. In an embodiment, an input device includes a capacitive sensing device integrated with a display device. The input device further includes a plurality of sensor electrodes of the capacitive sensing device, each of the plurality of sensor electrodes comprising one or more common electrodes of the display device. The input device further includes a plurality of source lines disposed at least partially in an active portion of the display device. The input device further includes a plurality of routing traces. The plurality of routing traces includes a first routing trace, at least a first portion of the first routing trace being disposed in a first metal layer, parallel to a first source line of the plurality of source lines and in the active portion of the display device. The plurality of routing traces further includes a second routing trace, a first portion of the second routing trace disposed parallel to the first routing trace in the first metal layer and in the active portion of the display, a second portion of the second routing trace disposed in a second metal layer in an inactive portion of the display device and crossing the first routing trace, the second routing trace coupled to a first sensor electrode of the plurality of sensor electrodes through a first via.
In another embodiment, a display device includes an active portion having a plurality of display electrodes, an inactive portion, a plurality of source lines disposed at least partially in the active portion, and a plurality of routing traces. The plurality of routing traces includes a first routing trace, at least a first portion of the first routing trace being disposed in a first metal layer, parallel to a first source line of the plurality of source lines and in the active portion. The plurality of routing traces further includes a second routing trace, a first portion of the second routing trace disposed parallel to the first routing trace in the first metal layer and in the active portion, a second portion of the second routing trace disposed in a second metal layer in the inactive portion and crossing the first routing trace, the second routing trace coupled to a first display electrode of the plurality of display electrodes through a first via.
In another embodiment, a processing system for a capacitive sensing device and display device includes source drivers configured for driving a plurality of source lines disposed at least partially in an active portion of the display device. The processing system further includes sensor circuitry configured to be coupled to a plurality of sensor electrodes of the capacitive sensing device through a plurality of routing traces, each of the plurality of sensor electrodes comprising one or more common electrodes of the display device. The plurality of routing traces includes a first routing trace, at least a first portion of the first routing trace being disposed in a first metal layer, parallel to a first source line of the plurality of source lines and in the active portion of the display device. The plurality of routing traces further includes a second routing trace, a first portion of the second routing trace disposed parallel to the first routing trace in the first metal layer and in the active portion of the display, a second portion of the second routing trace disposed in a second metal layer in an inactive portion of the display device and crossing the first routing trace, the second routing trace coupled to a first sensor electrode of the plurality of sensor electrodes through a first via.
FIG. 1 is a block diagram of an exemplary input device, according to one embodiment described herein.
FIG. 2 is a block diagram depicting a capacitive sensing device of the input device of FIG. 1 according to some embodiments.
FIG. 3 is an exploded view of a display device according to an embodiment.
FIG. 4 is a block diagram depicting display circuitry of the display device of FIG. 3 according to an embodiment.
FIG. 5 is a schematic cross-section of a portion of a display stack according to an embodiment.
FIG. 6 is a top-view showing a portion of the display device of FIG. 3 according to an embodiment.
FIG. 7 is a top-view showing a portion of the display device of FIG. 3 according to another embodiment.
FIG. 1 is a block diagram of an exemplary input device 100, in accordance with embodiments of the invention. The input device 100 may be configured to provide input to an electronic system (not shown). As used in this document, the term “electronic system” (or “electronic device”) broadly refers to any system capable of electronically processing information. Some non-limiting examples of electronic systems include personal computers of all sizes and shapes, such as desktop computers, laptop computers, netbook computers, tablets, web browsers, e-book readers, and personal digital assistants (PDAs). Additional example electronic systems include composite input devices, such as physical keyboards that include input device 100 and separate joysticks or key switches. Further example electronic systems include peripherals such as data input devices (including remote controls and mice), and data output devices (including display screens and printers). Other examples include remote terminals, kiosks, and video game machines (e.g., video game consoles, portable gaming devices, and the like). Other examples include communication devices (including cellular phones, such as smart phones), and media devices (including recorders, editors, and players such as televisions, set-top boxes, music players, digital photo frames, and digital cameras). Additionally, the electronic system could be a host or a slave to the input device.
FIG. 2 is a block diagram depicting a capacitive sensing device 200 of the input device 100 according to some embodiments. For clarity of illustration and description, FIG. 2 shows the sensing elements of the capacitive sensing device 200 in a matrix of rectangles and does not show various components, such as various interconnects between the sensing elements and the processing system 110. An electrode pattern 250 comprises a plurality of sensor electrodes 260 disposed in a rectangular matrix with a grid electrode 270 disposed therebetween. The sensor electrodes 260 are arranged in J rows and K columns, where J and K are positive integers, although one of J and K may be zero. It is contemplated that the electrode pattern 250 may comprise other patterns of the sensor electrodes 260, such as polar arrays, repeating patterns, non-repeating patterns, non-uniform arrays a single row or column, or other suitable arrangement. Further, the sensor electrodes 260 may be any shape, such as circular, rectangular, diamond, star, square, noncovex, convex, nonconcave concave, etc. Further, the sensor electrodes 260 may be sub-divided into a plurality of distinct sub-electrodes. The grid electrode 270 include be divided into a plurality of electrodes. In the example of FIG. 2, the electrode pattern 250 includes a plurality of grid electrodes 270-1 through 270-N, where N is a positive integer. The grid electrodes 270-1 through 270-N can be electrically coupled to each other or can be electrically isolated from each other.
The sensor electrodes 260 are typically ohmically isolated from one another. Additionally, where a sensor electrode 260 includes multiple sub-electrodes, the sub-electrodes may be ohmically isolated from each other. Furthermore, in one embodiment, the sensor electrodes 260 may be ohmically isolated from the grid electrode 270 that is between the sensor electrodes 260. In one example, the grid electrode 270 may surround one or more of the sensor electrodes 260, which are disposed in windows 216 of the grid electrode 270. The grid electrode 270 may be used as a shield or to carry a guarding signal for use when performing capacitive sensing with the sensor electrodes 260. Alternatively or additionally, the grid electrode 270 may be used as sensor electrode when performing capacitive sensing. Furthermore, the grid electrode 270 may be co-planar with the sensor electrodes 260, but this is not a requirement. For instance, the grid electrode 270 may be located on a different substrate or on a different side of the same substrate as the sensor electrodes 260. The grid electrode 270 is optional and in some embodiments, the grid electrode 270 is not present. In another embodiment, the sensor electrodes 260 can overlap portions of the grid electrode 270. The portions of overlap occur in regions where the sensor electrodes 260 and the grid electrode 270 are insulated from each other (e.g., using different layers or jumpers). The sensor electrodes 260, the grid electrode 270, or both can be disposed within the sensing region 120. The electrode pattern 250 is coupled to the processing system 110 through routing traces (discussed below).
The processing system 110 can include a front end 208 having sensor circuitry 204. The sensor circuitry 204 operates the electrode pattern 250 to receive resulting signals from sensor electrodes using a capacitive sensing signal having a sensing frequency. The processing system 110 can include a processing module 220 configured to determine capacitive measurements from the resulting signals. The processing module 220 can include processor circuitry, such as a digital signal processor (DSP), microprocessor, or the like. The processing module 220 can include software and/or firmware configured for execution by processor circuitry to implement various functions, such as determining object position from the resulting signals. Alternatively, some or all of the functions of the processor module 220 can be implemented entirely in hardware (e.g., using integrated circuitry). The processing module 220 can track changes in capacitive measurements to detect input object(s) in the sensing region 120. The processing system 110 can include other modular configurations, and the functions performed by the front end 208 and the processing module 220 can, in general, be performed by one or more modules or circuits in the processing system 110. The processing system 110 can include other modules and circuits, and can perform other functions as described in some embodiments below.
The processing system 110 can operate in absolute capacitive sensing mode or transcapacitive sensing mode. In absolute capacitive sensing mode, receiver(s) in the sensor circuitry 204 measure voltage, current, or charge on sensor electrode(s) 260 in the electrode pattern 250 while the sensor electrode(s) 260 are modulated with absolute capacitive sensing signals to generate the resulting signals. The processing module 220 generates absolute capacitive measurements from the resulting signals. The processing module 220 can track changes in absolute capacitive measurements to detect input object(s) in the sensing region 120.
In transcapacitive sensing mode, some electrodes 260 can be transmitter electrodes, while other electrodes 260 can be receiver electrodes. Alternatively, the grid electrode 270 can include transmitter electrode(s) and the sensor electrodes 260 can include receiver electrodes. The sensor circuitry 204 drives one or more transmitter electrodes with the capacitive sensing signal (also referred to as a transmitter signal or modulated signal in the transcapacitive sensing mode). Receiver(s) in the sensor circuitry 204 measure voltage, current, or charge on one or more receiver electrodes to generate the resulting signals. The resulting signals comprise the effects of the capacitive sensing signal and input object(s) in the sensing region 120. The processing module 220 generates transcapacitive measurements from the resulting signals. The processing module 220 can track changes in transcapacitive measurements to detect input object(s) in the sensing region 120.
In some embodiments, the processing system 110 “scans” the electrode pattern 250 to determine capacitive measurements. In the transcapacitive sensing mode, the processing system 110 can operate the electrode pattern 250 such that one transmitter electrode transmits at one time, or multiple transmitter electrodes transmit at the same time. Where multiple transmitter electrodes transmit simultaneously, these multiple transmitter electrodes may transmit the same transmitter signal and effectively produce a larger transmitter electrode, or these multiple transmitter electrodes may transmit different transmitter signals. For example, multiple transmitter electrodes may transmit different transmitter signals according to one or more coding schemes that enable their combined effects on the resulting signals of the receiver electrodes to be independently determined. In the absolute capacitive sensing mode, the processing system 110 can receiving resulting signals from one sensor electrode 260 at a time, or from a plurality of sensor electrodes 260 at a time.
In either sensing mode, the processing system 110 can use the resulting signals to determine capacitive measurements at the capacitive pixels. A set of measurements from the capacitive pixels form a “capacitive image” (also “capacitive frame”) representative of the capacitive measurements at the pixels. The processing system 110 can acquire multiple capacitive images over multiple time periods, and can determine differences between capacitive images to derive information about input in the sensing region 120. For example, the processing system 110 can use successive capacitive images acquired over successive periods of time to track the motion(s) of one or more input objects entering, exiting, and within the sensing region 120.
The baseline capacitance of the input device 100 is the capacitive image or capacitive profile associated with no input object in the sensing region 120. The baseline capacitance changes with the environment and operating conditions, and the processing system 110 can estimate the baseline capacitance in various ways. For example, in some embodiments, the processing system 110 takes “baseline images” or “baseline profiles” when no input object is determined to be in the sensing region 120, and uses those baseline images or baseline profiles as estimates of baseline capacitances. The processing module 220 can account for the baseline capacitance in the capacitive measurements and thus the capacitive measurements can be referred to as “delta capacitive measurements”. Thus, the term “capacitive measurements” as used herein encompasses delta-measurements with respect to a determined baseline.
In some touch screen embodiments, at least one of the sensor electrodes 260 comprise one or more display electrodes of a display device 280 used in updating a display of a display screen, such as one or more segments of a “Vcom” electrode (common electrodes), gate electrodes, source electrodes, anode electrode and/or cathode electrode. These display electrodes may be disposed on an appropriate display screen substrate. For example, the display electrodes may be disposed on a transparent substrate (a glass substrate, TFT glass, or any other transparent material) in some display screens (e.g., In Plane Switching (IPS) or Plane to Line Switching (PLS) Organic Light Emitting Diode (OLED)), on the bottom of the color filter glass of some display screens (e.g., Patterned Vertical Alignment (PVA) or Multi-domain Vertical Alignment (MVA)), over an emissive layer (OLED), etc. The display electrodes can also be referred to as “common electrodes,” since the display electrodes perform functions of display updating and capacitive sensing. In some embodiments, at least one of the grid electrodes 270 comprises one or more common electrodes. In various embodiments, each electrode of the sensor electrodes 260 and/or grid electrode 270 comprises one or more common electrodes. In other embodiments, at least two sensor electrodes of the sensor electrodes 260 or at least two electrodes of the grid electrode 270 may share at least one common electrode. Furthermore, in one embodiment, both the sensor electrodes 260 and the grid electrode 270 are disposed within a display stack on the display screen substrate. An example display stack is described below with respect to FIG. 3. However, in other embodiments, only the sensor electrodes 260 or the grid electrode 270 (but not both) are disposed within the display stack, while other sensor electrodes are outside of the display stack (e.g., disposed on an opposite side of a color filter glass).
In an embodiment, the processing system 110 comprises a single integrated controller, such as an application specific integrated circuit (ASIC), having the front end 208, the processing module 220, and any other module(s) and/or circuit(s). In another embodiment, the processing system 110 can include a plurality of integrated circuits, where the front end 208, the processing module 220, and any other module(s) and/or circuit(s) can be divided among the integrated circuits. For example, the front end 208 can be on one integrated circuit, and the processing module 220 and any other module(s) and/circuit(s) can be one or more other integrated circuits. In some embodiments, a first portion of the front end 208 can be on one integrated circuit and a second portion of the front end 208 can be on second integrated circuit. In such embodiments, at least one of the first and second integrated circuits comprises at least portions of other modules, such as a display driver module and/or a display driver module.
FIG. 3 is an exploded view of the display device 280 according to an embodiment. The capacitive sensing device 200 is integrated with the display device 280. The display device 280 generally includes a plurality of transparent substrates positioned over a first substrate, referred to herein as thin-film transistor (TFT) glass 302. An active element 304 is formed on the TFT glass 302. The active element 304 includes TFT layers (described below) that form display update circuitry configured to update a plurality of pixels. The TFT layers of the active element 304 can be electrically coupled to display electrodes, including pixel electrodes (not shown) and Vcom electrodes 306. In an embodiment, the Vcom electrodes 306 are disposed on the TFT glass 302. In the embodiment shown, the Vcom electrodes 306 are disposed on the top TFT layers of the active element 304. In some embodiments, the Vcom electrodes 306 are segmented into a plurality of common electrodes and used for both display updating and capacitive sensing. The Vcom electrodes 306 can also include electrodes that are used only for display updating.
The display device 280 includes a second substrate, referred to herein as color filter glass 312, a lens 318, an optional polarizer 316, and an optional anti-shatter film 314. A layer of display material 308 (e.g., liquid crystal) is disposed between the color filter glass 312 and the TFT glass 302. In an embodiment, layer(s) 310 between the color filter glass 312 and the display material 308 include one or more color filters and a black mask. A region between and including the color filter glass 312 and the TFT glass 302 is referred to herein as display stack 350.
In one embodiment, sensor electrodes of the capacitive sensing device 200 are disposed at least partially within the display stack 350. A first plurality of sensor electrodes (e.g., the sensor electrodes 260), which may be operated as receiver electrodes, can be disposed between the color filter glass 312 and the display material 322 (e.g., within layer(s) 310). Further, a second plurality of electrodes (e.g., the grid electrode 270 and/or sensor electrodes 260), which may be driven as transmitter electrodes, can be common electrodes of the Vcom electrodes 306. In other embodiments, a first plurality of sensor electrodes may be disposed outside of the display stack 280, such as on the color filter glass 312 outside of the display stack 280. In another embodiment, all electrodes (e.g., the sensor electrodes 260 and the grid electrode 270) are disposed within the display stack 350. In such an embodiment, a first plurality of electrodes may be operated as receiver electrodes and a second plurality of electrodes may be operated as transmitter electrodes. Further, in such embodiments, the sensor electrodes 260 may be disposed as a plurality of matrix electrodes and operated as either absolute capacitive sensing electrodes and/or as transmitter electrodes and receiver electrodes.
FIG. 4 is a block diagram depicting display circuitry 450 of the display device 280 according to an embodiment. The display circuitry 450 can be formed in the active element 304 of the display stack 350. The display circuitry 450 is coupled to source drivers 212 and gate selection circuitry 214. In an embodiment, as shown in FIG. 2, the source drivers 212 are part of display diver circuitry 210 in the front end 208 of the processing system 110. That is, the front end 208 of the processing system 110 can be configured to perform both display updating and capacitive sensing. In an embodiment, the display driver circuitry 210 can also include the gate selection circuitry 214. In other embodiments, the gate selection circuitry 214 can be located external to the processing system 110 (e.g., a gate-in-panel (GIP) type of display device).
Returning to FIG. 4, the source drivers 212 are coupled to source lines 408 of the display circuitry 450. The gate selection circuitry 214 is coupled to gate lines 406 of the display circuitry 450. The display circuitry 450 includes a plurality of pixels 404, each of which is coupled to one or more TFTs 402. A source of each TFT 402 is coupled to a respective source line. A gate of each TFT 402 is coupled to a respective gate line. A drain of each TFT 402 is coupled to a pixel electrode of a respective pixel 404. Each source line 408 drives TFTs in a column of pixels 404. Each gate line 406 drives TFTs in a row of pixels 404. The pixels 404 are used to display an image on a display screen. By coordinating the gate voltages provided by the gate selection circuitry 214 and the source voltages provided by the source drivers 212, the display driver circuitry 210 can set the pixels 404 and display an image on a display screen.
FIG. 5 is a schematic cross-section of a portion of the display stack 350 according to an embodiment. In the embodiment, the active element 304 on the TFT glass 320 includes a plurality of TFT layers 503. The TFT layers 503 include metal layers M1, M2, and M3, as well as layers 512 and 514. The metal layer M1 is also referred to as the “first metal layer,” the metal layer M2 is also referred to as the “second metal layer,” and the metal layer M3 is also referred to as the “third metal layer.” The display stack 350 includes an active portion 504 and an inactive portion 502. The active portion 504 includes the display circuitry 450. The inactive portion 502 is a region on the TFT glass 302 that does not include any TFTs, pixel electrodes, display material, etc. that forms the display circuitry 450. While three metal layers are shown in the example, in other embodiments, the TFT layers 503 can include only two metal layers.
The metal layer M3 can be patterned to form gate electrodes of TFTs 402 in the active portion 504. In addition, the metal layer M3 can be patterned to form capacitor electrodes in the active portion 504 (not shown). The layer 512 can include one or more dielectric layers electrically isolating the metal layer M2 from the metal layer M3. In addition, the layer 512 can include one or more semiconductor layers disposed between the metal layer M2 and the metal layer M3 in the active portion 504. The metal layer M2 can be patterned to form source and drain electrodes of TFTs 402 in the active portion 504. The layer 514 can include one or more layers of dielectric electrically isolating the metal layer M1 from the metal layer M2. The layer 514 can also include a transparent metal layer that can be formed into pixel electrodes. The drain of each TFT 402 is coupled to a respective pixel electrode. In some two-layer embodiments, the layers M1 and M2 are replaced by a single metal layer.
The metal layer M3 can be further patterned to form the gate lines 406 electrically coupled to the gate electrodes of the TFTs 402. The metal layer M2 can be further patterned to form the source lines 408 electrically coupled to the source electrodes of the TFTs 402. The source lines 408 can be partially disposed in the active portion 504 and partially disposed in the inactive portion 502. In an embodiment, the gate lines 406 can be partially disposed in the active portion 504 and partially disposed in the inactive portion 502. In other embodiments, the gate lines 406 can be entirely disposed in the active portion 504 (e.g., GIP displays).
The metal layer M1 can be patterned to form routing traces electrically coupled to Vcom electrodes 306. In the example shown, the Vcom electrodes 306 are electrically isolated from the metal layer M1 by a dielectric layer 516. Vias 516 can be formed in the dielectric layer 516 to electrically couple particular routing traces formed in the metal layer M1 with particular Vcom electrodes 306. The routing traces can be partially disposed in the active portion 504 and partially disposed in the inactive portion 502. In an embodiment, the metal layer M1 can also be patterned to form routing traces electrically coupled to other sensor electrodes, such as receiver electrodes. For example, the receiver electrodes can be disposed between the color filter glass 312 and the display material 308. The display stack 350 can include metal pillars or the like (not shown) that electrically couple routing traces patterned on the metal layer M1 and the receiver electrodes.
An integrated circuit 506 can be electrically and mechanically coupled to the TFT layers 304 in the inactive portion 502. The integrated circuit 506 can include the processing system 110. The integrated circuit 506 includes a plurality of pins 508 that are electrically and mechanically mounted to the TFT layers 304. In the example shown, the pins 508 of the integrated circuit 506 are electrically coupled to bond pads patterned on the metal layer M1. The bond pads can be electrically coupled to routing traces patterned on the layer M1. The bond pads can also be electrically coupled to the metal layer M2, the metal layer M3, or both through vias. For example, vias 522 can be formed through layer 514 to electrically couple bond pads on the metal layer M1 with conductors patterned on the metal layer M2, such as source lines. Vias 520 can be formed through layer 512 that, when combined with conductors in the metal layer M2 and vias 522, electrically couple bond pads on the metal layer M1 with conductors patterned on the metal layer M3, such as gate lines. In various embodiments described below, the metal layers M1, M2, and M3 within the inactive area can be patterned to include conductors to electrically couple routing traces to the integrated circuit 506 using non-parallel routes. In some embodiments, vias can extend between the metal layer M3 and the metal layer M1.
Notably, the routing traces electrically coupled to the Vcom electrodes 306 are hidden by a black mask. To prevent cross-talk and local misbalance of capacitance in the active portion 504 on a common layer, the routing traces cannot cross source lines in the active portion 504. In one implementation, the routing traces can be routed around the active portion 504 within a border of the display. In other implementations, however, the display does not include such a border. As such, within the active portion 504, the routing traces must be routed parallel to the source lines and in-between the source lines. The parallel routing traces and source lines can be extended from the active portion 504 for coupling to the integrated circuit 506 disposed in the inactive portion 502. However, the integrated circuit 506 would be required to include all the pins 508 for the parallel extension of the routing traces and the source lines on one side adjacent to the active area 504. This reduces flexibility in the layout of the processing system 110 within the integrated circuit 506. For example, the sensor circuitry 204 would need to be located among the source drivers 212, rather than in a separate area of the integrated circuit 506. The parallel extension of routing traces and source lines to the integrated circuit 506 results in inefficient use of implementation area within the integrated circuit 506. Accordingly, in embodiments, the metal layers of the TFT layers 304 in the inactive portion 502 are patterned to allow for flexibility in extending the routing traces from the active portion 504 to the integrated circuit 506. The metal layers of the TFT layers 304 in the inactive portion 502 can be patterned to provide non-parallel extension of the routing traces between the active portion 504 and the integrated circuit 506, including the crossing of routing traces on different metal layers.
FIG. 6 is a top-view showing a portion of the display device 280 according to an embodiment. FIG. 6 shows a top-view of the TFT glass 302 including both the active portion 504 and the inactive portion 502. The integrated circuit 506 is mounted within the inactive portion 502. The source lines 408 are disposed at least partially in the active portion 504. In the example, a source line 408A (also referred to as a “first source line”) is patterned on the metal layer M2 and extends partially in the active portion 504 and partially in the inactive portion 502. The source line 408A is electrically coupled to a pin 508B of the integrated circuit 506 through a via 522. The source line 408A is disposed perpendicular to a gate line 406A patterned on the metal layer M3. The source line 408A is coupled to a source electrode of a TFT 620A, and the gate line is coupled to a gate electrode of the TFT 620A.
A routing trace 608B (also referred to as the “first routing trace”) is patterned in the metal layer M1. The routing trace 608B includes a first portion 622 disposed in the the active portion 504 parallel to the source line 408A. The first portion 622 of the routing trace 608B extends into the inactive portion 502. The routing trace 608B includes a second portion 628 disposed in the inactive portion 502 and perpendicular to the first portion 622. In the example shown, the second portion 628 of the routing ttrace 608B is disposed below the integrated circuit 506. The routing trace 608B can be coupled to a common electrode 614B of the Vcom layer 306 (also referred to as a “first sensor electrode”) through a via 5246. The routing trace 608B can be coupled to a pin 508C of the integrated circuit 506 through a bond pad 604.
A routing trace 608A (also referred to as the “second routing trace”) is patterned in the metal layer M1 and the metal layer M2. The routing trace 608A includes a first portion 624 disposed in the active portion 504 parallel to the first portion 622 of the routing trace 608B. The first portion 624 of the routing trace 608A extends into the inactive portion 502. The first portion 624 of the routing trace 608A is patterned in the metal layer M1. The routing trace 608A includes a second portion 626 disposed in the inactive portion 502 perpendicular to the first portion 624. The second portion 626 is patterned in the metal layer M2. The second portion 626 is electrically coupled to the first portion 624 through a via 522A. In the example shown, the second portion 626 of the routing trace 608A is disposed below the integrated circuit 506. The routing trace 608A can be coupled to a common electrode 614A of the Vcom layer 306 (also referred to as a “second sensor electrode”) through a via 524A. The routing trace 608A can be coupled to a pin 508A of the integrated circuit 506 through a via 522 (and corresponding bond pad on M1). Notably, the routing trace 608B crosses the routing trace 608A within a crossing region 602. In general, one or more crossing regions 602 can be disposed in the inactive portion 502. In the example shown, the crossing region 602 is disposed beneath the integrated circuit 506.
As can be understood from the example of FIG. 6, the source lines 408 can extend parallel to each other between the active portion 504 and the inactive portion 502. The source lines 408 can be coupled to pins 508 of the integrated circuit 506 along the side of the integrated circuit 506 adjacent to the active portion 504. The source drivers 212 can be located along this same side of the integrated circuit 506. The sensor circuitry 204 can be located in other areas of the integrated circuit 506. The routing traces 608 can extend parallel to the source lines 408 within the active portion 504. Within the inactive portion 502, however, the routing traces 608 can be routed in non-parallel configurations in order to reach pins associated with the sensor circuitry 204. The non-parallel routes can be implemented using one or more layers of the TFT layers 304 within the inactive portion 502. Further, multiple metal layers of the TFT layers 304 can be used to implement crossing of routing traces on different metal layers.
The source lines 408, gate lines 406, and the routing traces 608 can be formed using different configurations of the metal layers in the TFT layers 304. In an embodiment, the source lines 408 can be disposed on the metal layer M1, rather than the metal layer M2 as described in the example above. In an embodiment, the source lines 408 can be disposed on the metal layer M3. In an embodiment, the gate lines 406 can be disposed on the metal layer M2, rather than the metal layer M3 as described in the example above. If the gate lines 406 are disposed on the metal layer M2, then the source lines can be disposed on either the metal layer M1 or the metal layer M3. In an embodiment, the gate lines 406 are disposed on the metal layer M3 as described in the example above. The source lines 408 can then be disposed on either the metal layer M1 or the metal layer M2.
In the embodiment shown in FIG. 6, one routing trace 608A includes portions on the metal layer M1 and the metal layer M2, while another routing trace 608B includes portions on the metal layer M1. Other configurations are possible. In an embodiment, a routing trace 608 can include a portion on the metal layer M1, another portion on the metal layer M2, and another portion on the metal layer M3. Vias can electrically couple portions of routing traces on the layer M3 with portions of the routing traces on the layer M2.
FIG. 7 is a top-view showing a portion of the display device 280 according to another embodiment. Elements of FIG. 7 that are the same or similar to those of FIG. 6 are described in detail above. In some embodiments, the metal layer M1 is patterned to include “dummy” traces. The dummy traces are not used for routing signals to electrodes. To avoid charge build-up and display artifacts, the dummy traces cannot be left electrically floating. To prevent display artifacts, the dummy traces can be actively driven to Vcom during display and with a guard signal during capacitive sensing. In order to receive the guard signal, the dummy traces can be electrically coupled to the integrated circuit 506. The dummy traces have the same limitation as the routing traces coupled to the Vcom electrodes. That is, the dummy traces cannot cross the source lines on a common layer within the active portion 504.
In the embodiment of FIG. 7, a dummy trace 706 is disposed on the metal layer M1. Although only one dummy trace 706 is shown, the display stack 350 can include a plurality of dummy traces 706. The dummy trace 706 includes a first portion in the active area 504 parallel to the source line 408A. The dummy trace 706 includes a second portion in the inactive area 502 perpendicular to the first portion. The dummy trace 706 is electrically coupled to a pin 508D of the integrated circuit 506 through a bond pad 704. The dummy trace 706 crosses the second portion 626 of the routing trace 608A in a crossing region 702. In the embodiment shown, the cross region 702 is beneath the integrated circuit 506.
In the example shown, the dummy trace 706 includes portions disposed on the layer M1. In other examples, the dummy trace 706 can include a portion disposed on the layer M1 in the active portion 504 and another portion disposed on the layer M2 within the inactive portion 502. In another example, the dummy trace 706 can include a portion disposed on the layer M1 in the active portion 504, another portion disposed on the layer M2 within the inactive portion 502, and another portion disposed on the layer M3 in the inactive portion 502. In general, the dummy traces 706 can be routed similarly to the routing traces 608. The processing system 110 of the integrated circuit 506 can drive the dummy traces 706 with a guard signal during capacitive sensing, and can drive the dummy traces 706 with Vcom during display updating.
The embodiments and examples set forth herein were presented in order to best explain the embodiments in accordance with the present technology and its particular application and to thereby enable those skilled in the art to make and use the invention. However, those skilled in the art will recognize that the foregoing description and examples have been presented for the purposes of illustration and example only. The description as set forth is not intended to be exhaustive or to limit the invention to the precise form disclosed.
a first bond pad disposed on one of the first metal layer, the second metal layer, and a third metal layer of the substrate, and coupled to the second portion to the second routing trace through a third via in the inactive portion.
2. The input device of claim 1, wherein the plurality of source lines is disposed in the first metal layer.
3. The input device of claim 1, wherein the plurality of source lines is disposed in the second metal layer.
4. The input device of claim 1, wherein the plurality of source lines is disposed in the third metal layer.
5. The input device of claim 1, further comprising a plurality of gate lines disposed in the second metal layer.
6. The input device of claim 5, wherein the plurality of source lines is disposed in one of the first metal layer or the third metal layer.
7. The input device of claim 1, further comprising a plurality of gate lines disposed in the third metal layer.
8. The input device of claim 7, wherein the plurality of source lines is disposed in one of the first metal layer or the second metal layer.
9. The input device of claim 1, wherein the first routing trace and the second routing trace are coupled to an integrated circuit, the integrated circuit is coupled to a first surface of the substrate via the first bond pad, and wherein the second portion of the second routing trace is located beneath the integrated circuit between the first surface and a second surface of the substrate.
10. The input device of claim 1, wherein the first routing trace is coupled to a second sensor electrode of the plurality of sensor electrodes through a fourth via.
11. The input device of claim 1, wherein at least one routing trace of the plurality of routing traces is coupled to an integrated circuit, wherein the integrated circuit is configured to drive the at least one routing trace with a guard signal.
12. The input device of claim 1, wherein each of the sensor electrodes and each of the plurality of routing traces is coupled to a respective pin of a plurality of pins of an integrated circuit.
wherein a first bond pad of the plurality of bond pads is coupled to the second portion of the second routing trace through a third via in the inactive portion.
14. The display device of claim 13, wherein the plurality of source lines is disposed in one of the first metal layer, the second metal layer or a third metal layer of the metal layers.
15. The display device of claim 13, further comprising a plurality of gate lines disposed in one of the second metal layer or a third metal layer of the metal layers.
16. The display device of claim 13, wherein the first routing trace and the second routing trace are coupled to an integrated circuit, the integrated circuit is coupled to a first surface of the substrate via the plurality of bond pads, and wherein the second portion of the second routing trace is located beneath the integrated circuit between the first surface and a second surface of the substrate.
17. The display device of claim 13, wherein the first routing trace is coupled to a second sensor electrode of the plurality of sensor electrodes through a fourth via.
18. The display device of claim 13, wherein at least one routing trace of the plurality of routing traces is coupled to an integrated circuit, wherein the integrated circuit is configured to drive the at least one routing trace with a guard signal.
19. The display device of claim 13, wherein each of the display electrodes and each of the plurality of routing traces is coupled to a respective pin of a plurality of pins of an integrated circuit.
a second routing trace, a first portion of the second routing trace disposed parallel to the first routing trace in the first metal layer and in the active portion of the display device, a second portion of the second routing trace disposed in a second metal layer of the substrate in an inactive portion of the display device, crossing the first routing trace, and coupled to the first portion through a first via the second routing trace coupled to a first sensor electrode of the plurality of sensor electrodes through a second via, the second portion of the second routing trace is coupled to a first bond pad through a third via in the inactive portion, wherein the first bond pad is disposed on one of the first metal layer, the second metal layer, and a third metal layer of the substrate.
21. The processing system of claim 20, wherein the plurality of source lines is disposed in one of the first metal layer, the second metal layer, or the third metal layer.
22. The processing system of claim 20, further comprising gate selection circuitry coupled to a plurality of gate lines disposed in one of the second metal layer or the third metal layer.
23. The processing system of claim 20, wherein the first routing trace is coupled to a second sensor electrode of the plurality of sensor electrodes through a fourth via.
24. The input device of claim 1 further comprising a second bond pad disposed on one of the first metal layer, the second metal layer, and the third meta layer, and coupled to the first routing trace through a fourth via in the inactive portion.
Gary L. Barrett et al. "Projected Capacitive Touch Technology", "Touch Technology Information Display", www.informationaldisplay.org <http://www.informationaldisplay.org>, Mar. 2010 vol. 26 No. 3, pp. 16-21.
International Application No. PCT/US2016/066888, International Search Report and Written Opinion, dated Apr. 3, 2017, Consists of 14 pages.
International Search Report and Written Opinion, dated Dec. 12, 2014 PCT/US2014055934, Consists of 12 pages.
Japanese Patent Application No. P2014-529868, Office Action dated Nov. 24, 2015, 9 pages.
Ken Gilleo. "The Circuit Centennial", Apr. 28, 2003, Total of 7 pages.
Quantum Research Application Note An -KD01. "Qmatrix Panel Design Guidelines", Oct. 10, 2002. 4 Pages.
Quantum Research Group. "Qmatrix Panel Design Guidelines", Oct. 10, 2002. 4 Pages.
Tsz-Kin Ho et al. "32.3: Simple Single-Layer Multi-Touch Projected Capacitive Touch Panel", SID 2009 Digest, pp. 447-450. | 2019-04-24T07:05:07Z | https://patents.google.com/patent/US10067587B2/en |
Hoffman, William F. was born 7 March 1979, is male, registered as Florida Democratic Party, residing at 125 Se 32Nd St, Cape Coral, Florida 33904. Florida voter ID number 100321670. His telephone number is 1-941-376-1275. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2017 voter list: WILLIAM F. HOFFMAN, 4420 MEADOW CREEK CIR, SARASOTA, FL 34233 Florida Democratic Party.
31 December 2013 voter list: WILLIAM F. HOFFMAN, 3311 MAIDEN LN, SARASOTA, FL 34231 Florida Democratic Party.
31 May 2012 voter list: WILLIAM F. HOFFMAN, 4822 CADILLAC WAY, SARASOTA, FL 34231 Florida Democratic Party.
Hoffman, William F. was born 22 April 1965, is male, registered as Florida Democratic Party, residing at 5596 Se Sailfish Way, Stuart, Florida 34997. Florida voter ID number 105895036. The voter lists a mailing address and probably prefers you use it: 52 East Ave West Haven CT 06516. This is the most recent information, from the Florida voter list as of 30 April 2014.
Hoffman, William F. was born 31 August 1937, is male, registered as Florida Democratic Party, residing at 5596 Se Sailfish Way, Stuart, Florida 34997. Florida voter ID number 105908794. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM FRANCIS was born 18 July 1947, is male, registered as Florida Democratic Party, residing at 1050 Starkey Rd, #2103, Largo, Florida 33771. Florida voter ID number 106635611. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM FRANCIS was born 5 August 1963, is male, registered as No Party Affiliation, residing at 1240 Bayshore Dr, Fort Pierce, Florida 34949. Florida voter ID number 108198855. His telephone number is 1-772-708-1848. This is the most recent information, from the Florida voter list as of 31 March 2019.
28 February 2017 voter list: WILLIAM F. HOFFMAN, 1151 BINNEY DR, APT B, FORT PIERCE, FL 34949 No Party Affiliation.
Hoffman, William Francis was born 3 July 1964, is male, registered as Republican Party of Florida, residing at 320 Seabreeze Dr, Indialantic, Florida 32903. Florida voter ID number 100994272. His telephone number is 1-321-508-2806. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Francis was born 5 September 1940, is male, registered as Republican Party of Florida, residing at 701 Pine St, Melbourne Beach, Florida 32951. Florida voter ID number 100992603. His telephone number is 1-321-751-1677. The voter lists a mailing address and probably prefers you use it: 5005 N Wickham Rd Ste 102 Melbourne FL 32940-0000. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2013 voter list: William Hoffman, 407 Hibiscus Trl, Melbourne Beach, FL 32951 Republican Party of Florida.
HOFFMAN, WILLIAM FRANKLIN was born 29 May 1931, is male, residing at 8512 Saw Mill Run, Pensacola, Florida 32514. Florida voter ID number 104149659. This is the most recent information, from the Florida voter list as of 31 October 2015.
HOFFMAN, WILLIAM FRANKLIN was born 9 July 1952, is male, registered as Republican Party of Florida, residing at 13210 Royal George Ave, Odessa, Florida 33556. Florida voter ID number 114653629. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM FRANTZ was born 19 August 1951, is male, registered as Florida Democratic Party, residing at 4785 Riverwood Cir, Sarasota, Florida 34231. Florida voter ID number 100203030. His telephone number is 921-6524 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Fredoline was born 10 December 1948, is male, registered as No Party Affiliation, residing at 8633 Brittania Dr, Fort Myers, Florida 33912. Florida voter ID number 119551083. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Fredric was born 18 May 1995, is male, registered as No Party Affiliation, residing at 260 W Mcintyre St, Key Biscayne, Florida 33149. Florida voter ID number 119047463. His telephone number is 1-305-608-2043. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: WILLIAM FREDRIC HOFFMAN, 759 BASIN ST, APT 239, TALLAHASSEE, FL 32304 No Party Affiliation.
31 August 2016 voter list: William Fredric Hoffman, 260 W Mcintyre ST, Key Biscayne, FL 33149 No Party Affiliation.
HOFFMAN, WILLIAM FREDRICK was born 17 March 1936, is male, registered as Florida Democratic Party, residing at 109 Ramblewood Dr, Palm Coast, Florida 32164. Florida voter ID number 102781966. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Gregory was born 25 December 1998, is male, registered as Republican Party of Florida, residing at 5465 White Ave, Port Charlotte, Florida 33981. Florida voter ID number 123537429. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM H. was born 24 November 1930, is male, registered as Republican Party of Florida, residing at 8063 Se 171St Mcalpin St, The Villages, Florida 32162. Florida voter ID number 105720791. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William H. was born 3 April 1934, is male, registered as Florida Democratic Party, residing at 4068 Turkey Creek Ct, St Augustine, Florida 32086-5852. Florida voter ID number 107976978. This is the most recent information, from the Florida voter list as of 30 June 2015.
31 May 2013 voter list: William H. Hoffman, 4068 Turkey Creek Ct, St Augustine, FL 32086 Florida Democratic Party.
Hoffman, William H. was born 19 May 1939, is male, registered as No Party Affiliation, residing at 9708 Foxglove Cir, Fort Myers, Florida 33919. Florida voter ID number 111644414. His telephone number is 482-5332 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Henry was born 1 June 1951, is male, registered as Florida Democratic Party, residing at 103 E Ohio St, Florahome, Florida 32140. Florida voter ID number 107491849. His telephone number is 1-386-659-2643. The voter lists a mailing address and probably prefers you use it: PO BOX 173 Florahome FL 32140-0173. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Henry was born 5 October 1951, is male, registered as No Party Affiliation, residing at 942 Chelsea Ave, Sebastian, Florida 32958. Florida voter ID number 123437014. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM HOWARD was born 17 September 1930, is male, registered as Republican Party of Florida, residing at 1530 Eastbrook Dr, Sarasota, Florida 34231. Florida voter ID number 118886951. This is the most recent information, from the Florida voter list as of 31 May 2012.
HOFFMAN, WILLIAM J. was born 10 January 1962, is male, registered as Republican Party of Florida, residing at 7612 Donald Ross Rd W, Sarasota, Florida 34240. Florida voter ID number 100334897. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM J. was born 28 June 1938, is male, registered as Republican Party of Florida, residing at 7612 Donald Ross Rd W, Sarasota, Florida 34240. Florida voter ID number 100308643. His telephone number is 377-9339 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM J. was born 11 August 1962, is male, registered as Florida Democratic Party, residing at 1810 High Ridge Rd, Lake Worth, Florida 33461. Florida voter ID number 125132927. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM J. was born 27 October 1931, is male, registered as Republican Party of Florida, residing at 9499 Millbank Dr, Apt 2726, Sarasota, Florida 34238. Florida voter ID number 100377102. This is the most recent information, from the Florida voter list as of 30 April 2017.
HOFFMAN, WILLIAM J. was born 25 November 1924, is male, registered as No Party Affiliation, residing at 17140 Se 79Th Mclawren Ter, The Villages, Florida 32162. Florida voter ID number 105753995. This is the most recent information, from the Florida voter list as of 31 March 2014.
Hoffman, William J. was born 13 March 1943, is male, registered as No Party Affiliation, residing at 2338 Nw 119Th Ave, Gainesville, Florida 32609-4007. Florida voter ID number 100553042. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William James was born 20 January 1967, is male, registered as Republican Party of Florida, residing at 1332 Tralee Bay Ave, Melbourne, Florida 32940. Florida voter ID number 119297115. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 August 2014 voter list: William James Hoffman, 1133 Tralee Bay Ave, Melbourne, FL 32940 Republican Party of Florida.
HOFFMAN, WILLIAM JOSEPH was born 10 August 1982, is male, registered as No Party Affiliation, residing at 2611 Winter Park Rd, Winter Park, Florida 32789. Florida voter ID number 118822649. The voter lists a mailing address and probably prefers you use it: 201 ALBERT WAY APT 2405 PRINCETON NJ 08540-3222 UNITED STATES. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2015 voter list: WILLIAM JOSEPH HOFFMAN, 460 FAIRFAX AVE, WINTER PARK, FL 32789 No Party Affiliation.
30 June 2014 voter list: WILLIAM JOSEPH HOFFMAN, 4351 ANSON LN, APT 204, ORLANDO, FL 32814 No Party Affiliation.
Hoffman, William Joseph was born 8 May 1972, is male, registered as Florida Democratic Party, residing at 1734 Wofford Ave, Jacksonville, Florida 32218. Florida voter ID number 103404356. This is the most recent information, from the Florida voter list as of 31 March 2015.
Hoffman, William Justin was born 6 July 1983, is male, registered as Republican Party of Florida, residing at 2655 Se Carroll St, Stuart, Florida 34997. Florida voter ID number 105908612. This is the most recent information, from the Florida voter list as of 30 April 2018.
Hoffman, William Karl was born 14 September 1958, is male, registered as Republican Party of Florida, residing at 3445 E Riverside Dr, Fort Myers, Florida 33916. Florida voter ID number 111402445. His telephone number is 1-239-464-2437. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: William Karl Hoffman, 1771 Many Rd, NORTH FORT MYERS, FL 33903 Republican Party of Florida.
31 August 2014 voter list: WILLIAM KARL HOFFMAN, 2528 THIRD ST, FORT MYERS, FL 33901 Republican Party of Florida.
HOFFMAN, WILLIAM KEVIN was born 17 February 1957, is male, registered as Republican Party of Florida, residing at 564 Gran Paseo Dr, Orlando, Florida 32825. Florida voter ID number 124587957. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Kirk was born 6 July 1993, is male, registered as Florida Democratic Party, residing at 11109 Lake Lanier Dr, Riverview, Florida 33569-2933. Florida voter ID number 122117713. His telephone number is 1-518-774-3592. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM LEVI was born 28 January 1981, is male, registered as No Party Affiliation, residing at 1955 Bonneville Dr, Orlando, Florida 32826. Florida voter ID number 115106203. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2016 voter list: WILLIAM LEVI HOFFMAN, 8025 CRANDAL CT, ORLANDO, FL 32822 No Party Affiliation.
HOFFMAN, WILLIAM M. was born 26 August 1929, is male, residing at 1144 Ne 10Th St, Ocala, Florida 34470. Florida voter ID number 105592885. This is the most recent information, from the Florida voter list as of 30 November 2014.
Hoffman, William M. was born 13 June 1938, is male, registered as Republican Party of Florida, residing at 120 Nw 53Rd St, Deerfield Beach, Florida 33064-2322. Florida voter ID number 101535513. His telephone number is 1-954-698-9870. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM MARION was born 13 November 1948, is male, registered as Republican Party of Florida, residing at 1063 Bulkhead Rd, Apt 6085, Grn Cv Spgs, Florida 32043. Florida voter ID number 121155871. His telephone number is 1-513-503-4858. His email address is HOFFMAN.WM@GMAIL.COM. The voter lists a mailing address and probably prefers you use it: 411 WALNUT STREET PMB 6085 GREEN COVE SPRINGS FL 32043. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2018 voter list: WILLIAM MARION HOFFMAN, 1 CLAY COUNTY, GRN CV SPGS, FL 32043 Republican Party of Florida.
Hoffman, William Marshall was born 15 January 1982, is male, registered as No Party Affiliation, residing at 4502 Philadelphia Cir, Kissimmee, Florida 34746. Florida voter ID number 124675965. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Michael was born 12 June 1951, is male, registered as Republican Party of Florida, residing at 125 Michigan Ave, Indialantic, Florida 32903-3115. Florida voter ID number 101018441. His telephone number is 1-321-733-0303. This is the most recent information, from the Florida voter list as of 31 March 2019.
28 February 2017 voter list: William Michael Hoffman, 535 4Th Ave, Satellite Beach, FL 329375210 Republican Party of Florida.
30 April 2016 voter list: William Michael Hoffman, 125 Michigan Ave, Indialantic, FL 32903 Republican Party of Florida.
HOFFMAN, William Nelson was born 26 August 1958, is male, registered as Republican Party of Florida, residing at 1295 Old Dixie Hwy, Titusville, Florida 32796. Florida voter ID number 101031130. His telephone number is 1-321-267-1190. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM O. was born 2 December 1961, is male, registered as No Party Affiliation, residing at 7109 Wpa Rd, Brooksville, Florida 34601. Florida voter ID number 104430398. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM P. was born 27 May 1928, is male, registered as Republican Party of Florida, residing at 3121 Sw 137Th Loop, Ocala, Florida 34473. Florida voter ID number 123206953. This is the most recent information, from the Florida voter list as of 30 April 2016.
HOFFMAN, WILLIAM P. was born 31 August 1922, is male, registered as Republican Party of Florida, residing at 9027 Se 72Nd Ave, Ocala, Florida 34472-9202. Florida voter ID number 105541447. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2015 voter list: WILLIAM P. HOFFMAN, 4480 SW 46TH ST, OCALA, FL 34474 Republican Party of Florida.
Hoffman, William P. was born 1 November 1963, is male, registered as No Party Affiliation, residing at 9459 Pine Lilly Ct, Navarre, Florida 32566. Florida voter ID number 107590393. The voter lists a mailing address and probably prefers you use it: 1042 Cherryknoll Ct Independence KY 41051-8010. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Patrick was born 18 September 1967, is male, registered as Republican Party of Florida, residing at 1207 Sw 36Th St, Cape Coral, Florida 33914. Florida voter ID number 119307834. His telephone number is 1-239-699-7660. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: WILLIAM PATRICK HOFFMAN, 928 SE 24TH AVE, CAPE CORAL, FL 33990 Republican Party of Florida.
HOFFMAN, WILLIAM PAUL was born 6 August 1957, is male, registered as Republican Party of Florida, residing at 2355 Sunnyview Dr, Oviedo, Florida 32765-8838. Florida voter ID number 107770131. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM PETER was born 9 October 1947, is male, registered as Florida Democratic Party, residing at 8865 10Th St N, St Petersburg, Florida 33702. Florida voter ID number 107111782. This is the most recent information, from the Florida voter list as of 31 May 2012.
Hoffman, William Phillip was born 5 July 1946, is male, registered as No Party Affiliation, residing at 1617 Meadowbrook St, Lake Placid, Florida 33852. Florida voter ID number 121795700. His telephone number is 1-863-633-9254. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM PREWITT was born 6 July 1959, is male, registered as Republican Party of Florida, residing at 118 Okeechobee W, Santa Rosa Beach, Florida 32459. Florida voter ID number 126069296. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM R. was born 18 July 1937, is male, registered as Florida Democratic Party, residing at 617 Tamiami Trl N, Lot 127, Venice, Florida 34285. Florida voter ID number 100179797. His telephone number is 488-5768 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William R. was born 12 May 1969, is male, registered as Republican Party of Florida, residing at 1319 Gulf Stream Cir, Apt 303, Brandon, Florida 33511. Florida voter ID number 110994471. The voter lists a mailing address and probably prefers you use it: Hall Apt 87 Uppper Leeson Street Dublin 4 IRELAND. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2016 voter list: William R. Hoffman, 1319 Gulf Stream Cir, APT 303, Brandon, FL 335112837 Republican Party of Florida.
Hoffman, William R. was born 20 July 1932, is female, registered as Republican Party of Florida, residing at 897 S Hickory Ridge Ln, Avon Park, Florida 33825. Florida voter ID number 104568939. Her telephone number is 1-863-453-3584. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William R. was born 11 August 1964, is male, registered as Republican Party of Florida, residing at 1626 N 29Th Ave, Hollywood, Florida 33020-2943. Florida voter ID number 101964518. His telephone number is 1-954-349-9995. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2015 voter list: William R. Hoffman, 1626 N 29th Ave, Hollywood, FL 33020 Republican Party of Florida.
HOFFMAN, WILLIAM RAYMOND was born 15 September 1976, is male, registered as No Party Affiliation, residing at 4371 Deskin Ln, The Villages, Florida 32163-4322. Florida voter ID number 109493585. This is the most recent information, from the Florida voter list as of 31 October 2017.
30 June 2017 voter list: William Raymond Hoffman, 13010 SW 79Th St, Miami, FL 33183 No Party Affiliation.
Hoffman, William Rex was born 14 June 1967, is male, registered as Republican Party of Florida, residing at 2330 Eslinger Rd, New Smyrna Beach, Florida 32168. Florida voter ID number 108477614. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2018 voter list: William Rex Hoffman, 1720 Umbrella Tree DR, Edgewater, FL 32132 Republican Party of Florida.
Hoffman, William Rhett was born 18 February 1969, is male, registered as No Party Affiliation, residing at 10661 Grayson St, Jacksonville, Florida 32220. Florida voter ID number 103267103. His telephone number is 1-904-630-6666. extension 4. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM RICHARD was born 23 March 1970, is male, registered as No Party Affiliation, residing at 5885 66Th St N, St Petersburg, Florida 33709. Florida voter ID number 115885608. This is the most recent information, from the Florida voter list as of 31 May 2012.
HOFFMAN, WILLIAM ROBERT was born 5 March 2000, registered as Florida Democratic Party, residing at 733 Timberwilde Ave, Winter Springs, Florida 32708. Florida voter ID number 125649223. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Robert was born 26 February 1955, is male, registered as Republican Party of Florida, residing at 3604 Belair Ln, Naples, Florida 34103. Florida voter ID number 102944314. His telephone number is 1-239-272-5418. His email address is willhoff55@aol.com. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2016 voter list: William R. Hoffman, 3604 BELAIR LN, Naples, FL 34103 Republican Party of Florida.
Hoffman, William Robert was born 15 August 1953, is male, registered as Republican Party of Florida, residing at 825 Grandin Ave, Sebastian, Florida 32958. Florida voter ID number 102526006. His email address is WHOFFMAN51@GMAIL.COM. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2018 voter list: William Robert Hoffman, 700 SE 6TH Ave, APT 203, Deerfield Beach, FL 334414803 Republican Party of Florida.
31 March 2015 voter list: William Robert Hoffman, 700 SE 6TH Ave, APT 203, Deerfield Beach, FL 33441 Republican Party of Florida.
22 October 2014 voter list: William Robert Hoffman, 470 NW 44Th Ter, APT 101, Deerfield Beach, FL 33442 Republican Party of Florida.
31 December 2013 voter list: William Robert Hoffman, 1431 S Ocean BLVD, Apt 62, Laud By The Sea, FL 330627302 Republican Party of Florida.
31 May 2012 voter list: William Robert Hoffman, 4900 Bayview DR, 12, Ft Lauderdale, FL 33308 Republican Party of Florida.
HOFFMAN, WILLIAM RUSSELL was born 15 November 1966, is male, registered as No Party Affiliation, residing at 420 Riverside Dr, Tarpon Springs, Florida 34689. Florida voter ID number 107017404. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2013 voter list: WILLIAM RUSSELL HOFFMAN, 80 FOXFIRE LN, OLDSMAR, FL 346772015 No Party Affiliation.
31 May 2012 voter list: WILLIAM RUSSELL HOFFMAN, 1916 DOVER CT, OLDSMAR, FL 34677 No Party Affiliation.
Hoffman, William Russell was born 1 April 1943, is male, registered as Republican Party of Florida, residing at 15811 Prentiss Pointe Cir, #101, Fort Myers, Florida 33908. Florida voter ID number 120566550. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2016 voter list: William R. Hoffman, 15811 Prentiss Pointe Cir, #101, Fort Myers, FL 33908 Republican Party of Florida.
Hoffman, William Ryan was born 14 July 1999, is male, registered as Florida Democratic Party, residing at 4586 Sw Long Bay Dr, Palm City, Florida 34990. Florida voter ID number 122817245. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM S. was born 20 April 1944, is male, registered as Florida Democratic Party, residing at 5 Glens Dr E, Boynton Beach, Florida 33436. Florida voter ID number 126002223. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WILLIAM S. was born 26 October 1933, is male, registered as Republican Party of Florida, residing at 2629 Aloma Ave, Winter Park, Florida 32792. Florida voter ID number 113068988. This is the most recent information, from the Florida voter list as of 31 May 2012.
Hoffman, William S. was born 1 July 1949, is male, registered as Florida Democratic Party, residing at 4070 Ne 15Th Ter, Oakland Park, Florida 33334-4647. Florida voter ID number 101349092. His telephone number is 1-954-561-1642. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2015 voter list: William S. Hoffman, 4070 NE 15th Ter, Oakland Park, FL 333340000 Florida Democratic Party.
Hoffman, William Stroh was born 3 April 1955, is male, registered as No Party Affiliation, residing at 400 Ocean Rd, Apt 175, Indian River Shores, Florida 32963. Florida voter ID number 124677521. His telephone number is 1-404-754-1441. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Terry was born 1 November 1951, is male, registered as Florida Democratic Party, residing at 4766 Longbow Dr, Titusville, Florida 32796. Florida voter ID number 121643533. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2018 voter list: William Terry Hoffman, 3167 Finsterwald Dr, Titusville, FL 32780 Florida Democratic Party.
Hoffman, William Timothy was born 15 March 1959, is male, registered as No Party Affiliation, residing at 2824 16Th St W, Bradenton, Florida 34205-6336. Florida voter ID number 105498727. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 August 2017 voter list: William Timothy Hoffman, 2824 16th St W, Bradenton, FL 34205 No Party Affiliation.
HOFFMAN, WILLIAM TRUFANT was born 3 October 1942, is male, registered as Republican Party of Florida, residing at 1527 Marsh Rabbit Way, Fleming Island, Florida 32003. Florida voter ID number 105386340. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2017 voter list: William Trufant Hoffman, 3070 Harbor DR, St Augustine, FL 32084 Republican Party of Florida.
31 October 2016 voter list: William Trufant Hoffman, 57 Comares Ave, St Augustine, FL 32080 Republican Party of Florida.
30 June 2015 voter list: WILLIAM TRUFANT HOFFMAN, 57 COMARES AVE, SAINT AUGUSTINE, FL 32080 Republican Party of Florida.
31 May 2015 voter list: William Trufant Hoffman, 10 Prawn ST, St Augustine, FL 32084 Republican Party of Florida.
31 March 2015 voter list: William T. Hoffman, 800 Scallop Dr, #A26, Cape Canaveral, FL 32920 Republican Party of Florida.
HOFFMAN, WILLIAM TY was born 18 August 1964, is male, registered as Florida Democratic Party, residing at 157 Yacht Club Way, Hypoluxo, Florida 33462. Florida voter ID number 111756199. This is the most recent information, from the Florida voter list as of 31 May 2012.
Hoffman, William V. was born 23 July 1933, is male, registered as Republican Party of Florida, residing at 944 Chula Ct, Lady Lake, Florida 32159. Florida voter ID number 104895361. The voter lists a mailing address and probably prefers you use it: 1555 Lexington Dr Lynchburg VA 24503. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William W. was born 19 August 1928, is male, registered as Republican Party of Florida, residing at 800 Lake Port Blvd, Apt C-201, Leesburg, Florida 34748. Florida voter ID number 104948965. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Wilkins was born 20 March 1955, is male, registered as No Party Affiliation, residing at 10550 Holloway Dr, Lot 12, Leesburg, Florida 34788. Florida voter ID number 125847059. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, William Woodstock was born 17 July 1999, is male, registered as Republican Party of Florida, residing at 7550 Se Eagle Ave, Hobe Sound, Florida 33455. Florida voter ID number 124949585. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Willie L. was born 1 March 1932, is male, registered as Florida Democratic Party, residing at 6680 Bennett Creek Dr, Apt 426, Jacksonville, Florida 32216. Florida voter ID number 103866421. This is the most recent information, from the Florida voter list as of 30 April 2014.
31 May 2013 voter list: Willie L. Hoffman, 1824 Maracaibo Rd, Jacksonville, FL 322115020 Florida Democratic Party.
Hoffman, Willis O. was born 21 January 1953, is male, registered as Republican Party of Florida, residing at 70 Saturn Cir, Kissimmee, Florida 34746. Florida voter ID number 103772832. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2015 voter list: Willis O. Hoffman, 4648 S Orange Blossom TRL, Kissimmee, FL 34746 Republican Party of Florida.
31 March 2014 voter list: Willis O. Hoffman, 617 Mayan PL, Kissimmee, FL 34758 Republican Party of Florida.
31 May 2012 voter list: Willis O. Hoffman, 49 Dream LN, St. Cloud, FL 34769 Republican Party of Florida.
Hoffman, Wilma E. was born 5 February 1932, is female, registered as Republican Party of Florida, residing at 842 N Man O War Dr, Inverness, Florida 34453. Florida voter ID number 102720990. This is the most recent information, from the Florida voter list as of 31 July 2014.
Hoffman, Wilma R. was born 4 October 1933, is female, registered as Florida Democratic Party, residing at 1990 Ne 198Th Ter, Miami, Florida 33179. Florida voter ID number 108988920. Her telephone number is 932-6162 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Wilson Anthony was born 6 September 1966, is male, registered as Florida Democratic Party, residing at 2905 Sw Carmel Pl, Palm City, Florida 34990. Florida voter ID number 105873550. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Wilson Paul was born 29 February 1948, is male, registered as Republican Party of Florida, residing at 6860 Se Lillian Ct, Stuart, Florida 34997. Florida voter ID number 105889915. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: Wilson Paul Hoffman, 8832 SE Duncan St, Hobe Sound, FL 33455 Republican Party of Florida.
Hoffman, Wyatt John was born 29 July 1997, is male, registered as No Party Affiliation, residing at 450 Caviar Dr, Ft Walton Bch, Florida 32548-6942. Florida voter ID number 122618031. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Wyatt Larrdon was born 17 January 1995, is male, registered as Florida Democratic Party, residing at 3500 Beacon Dr, Port Charlotte, Florida 33980. Florida voter ID number 123096927. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, WYATT NICHOLAS was born 12 May 1994, registered as Florida Democratic Party, residing at 859 W Brevard St, Apt 2, Tallahassee, Florida 32304. Florida voter ID number 122059055. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2016 voter list: Wyatt Nicholas Hoffman, 5505 8Th Avenue DR W, Bradenton, FL 34209 Florida Democratic Party.
Hoffman, Yael Simone was born 5 August 1976, is female, registered as Florida Democratic Party, residing at 5530 Nw 44Th St, Apt 313, Lauderhill, Florida 33319-9131. Florida voter ID number 102201338. Her telephone number is 1-954-324-5889. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2015 voter list: Yael Simone Hoffman, 5530 NW 44th St, APT 313, Lauderhill, FL 33319 Florida Democratic Party.
HOFFMAN, YAFFA was born 18 March 1959, registered as No Party Affiliation, residing at 2305 Sterling Creek Pkwy, Oviedo, Florida 32766. Florida voter ID number 119651957. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2018 voter list: YAFFA HOFFMAN, 2305 STERLING CREEK PKY, OVIEDO, FL 32766 No Party Affiliation.
Hoffman, Yaro Eugene was born 29 August 1946, is male, registered as Republican Party of Florida, residing at 11204 Inglewood Dr, Gibsonton, Florida 33534. Florida voter ID number 111234411. This is the most recent information, from the Florida voter list as of 31 May 2012.
HOFFMAN, YULA JOANN was born 18 August 1950, is female, registered as Republican Party of Florida, residing at 1053 Ne 31St Ter, Ocala, Florida 34470. Florida voter ID number 105784299. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Yvonne was born 27 September 1937, is female, registered as Florida Democratic Party, residing at 2230 N Cypress Bend Dr, Apt 201, Pompano Beach, Florida 33069-4496. Florida voter ID number 101482516. Her telephone number is 1-954-979-3258. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2015 voter list: Yvonne Hoffman, 2230 N Cypress Bend Dr, APT 201, Pompano Beach, FL 330690000 Florida Democratic Party.
Hoffman, Yvonne Denise was born 6 November 1960, is female, registered as Republican Party of Florida, residing at 3302 King Charles Cir, Seffner, Florida 33584-6114. Florida voter ID number 110721812. Her telephone number is 1-813-767-0187. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, ZACHARY BRANDON was born 28 March 2000, is male, registered as Republican Party of Florida, residing at 3125 Se Card Ter, Pt St Lucie, Florida 34984. Florida voter ID number 125513431. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Zachary James was born 1 March 1988, is male, registered as Republican Party of Florida, residing at 3026 Birmingham Dr, Navarre, Florida 32566. Florida voter ID number 114249179. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2018 voter list: Zachary James Hoffman, 9926 Ferrell Park Ln, Navarre, FL 32566 Republican Party of Florida.
31 May 2012 voter list: Zachary James Hoffman, 1517 Mariah WAY W, Ft Walton Bch, FL 32547 Republican Party of Florida.
HOFFMAN, ZACHARY JORDAN was born 15 September 1979, is male, registered as No Party Affiliation, residing at 1210 Moses Creek Ct, Oviedo, Florida 32765. Florida voter ID number 116829392. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, ZACHARY MAX was born 22 March 1997, is male, registered as Florida Democratic Party, residing at 1807 Belle Vue Way, Tallahassee, Florida 32304. Florida voter ID number 120801520. His telephone number is 1-321-693-9484. His email address is ZMH15C@MY.FSU.EDU. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2018 voter list: Zachary Max Hoffman, 444 S Rio Casa Dr, Indialantic, FL 32903 Florida Democratic Party.
31 July 2017 voter list: ZACHARY MAX HOFFMAN, 0 DEGRAFF HALL, RM 1112, TALLAHASSEE, FL 32306 Florida Democratic Party.
31 August 2016 voter list: ZACHARY MAX HOFFMAN, 0 DEGRAFF HALL, RM 1209, TALLAHASSEE, FL 32306 Florida Democratic Party.
31 December 2015 voter list: Zachary Max Hoffman, 444 S Rio Casa DR, Indialantic, FL 32903 Florida Democratic Party.
Hoffman, Zachary Miles was born 24 March 1993, is male, registered as No Party Affiliation, residing at 8115 S Tropical Trl, Merritt Island, Florida 32952. Florida voter ID number 118297915. The voter lists a mailing address and probably prefers you use it: 224 E 8Th St Apt 757 Cincinnati OH 45202-2159. This is the most recent information, from the Florida voter list as of 30 April 2018.
Hoffman, Zachary Paul was born 2 March 1998, registered as Republican Party of Florida, residing at 1107 Islamorada Ln, Tampa, Florida 33606. Florida voter ID number 126098671. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoffman, Zachary Paul was born 7 June 1976, is male, registered as Republican Party of Florida, residing at 1230 Ne 23Rd Ct, Pompano Beach, Florida 33064-5540. Florida voter ID number 102496134. His telephone number is 1-954-650-0503. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2015 voter list: Zachary Paul Hoffman, 1230 NE 23rd Ct, Pompano Beach, FL 33064 Republican Party of Florida.
Hoffman, Zachary Paul was born 15 November 1978, is male, registered as No Party Affiliation, residing at 220 Highland Dr, Deltona, Florida 32738. Florida voter ID number 108494793. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOFFMAN, ZACHARY RICHARD was born 9 July 1987, is male, registered as Republican Party of Florida, residing at 1450 Meeting Pl, #113, Orlando, Florida 32814. Florida voter ID number 118869247. This is the most recent information, from the Florida voter list as of 30 November 2016.
Hoffman, Zachary Robert was born 14 October 1998, is male, registered as No Party Affiliation, residing at 690 Falls Creek Dr, West Melbourne, Florida 32904. Florida voter ID number 122459949. This is the most recent information, from the Florida voter list as of 31 March 2019. | 2019-04-21T10:55:36Z | https://flvoters.com/pages/h107965.html |
In the '30s the covert government (military) sought invisibility technology. Scientists were called upon to develop a technology which could make objects invisible, such as airplanes or ships. Some of the greatest brains were recruited: Einstein, Tesla, Von Neumann (mathematician). It appeared hardly likely though that human technology was advanced enough to achieve the 'cloaking' phenomenon required. In fact at that time this was the case and it was the Zeta aliens who provided the final details for a system to create invisibility.
Today we have the stealth technology which is claimed to be radar invisibility but in fact is light invisibility. Airplanes, in particular, can be cloaked. Cloaking is quite an apt word since the stealth technology is not five-sense invisibility. Invisibility is created by using powerful electromagnetic fields to curve space around the object. Light thus bends around the object and the object cannot be seen.
The military and scientists set up the battleship U.S. Eldridge with an electromagnetic system: Tesla coils, etc. but aided by the Zetas. What the covert government didn't know was that the Zetas were merely exploiting them for their own ends. The aliens provided a hidden technology which would create a wormhole, a rift or tear in spacetime.
Little known to the humans the experiment had to be conducted in August, 1943 as organized and influenced by the Zetas. This was due to magnetic cycles that occur every 20 years in which a magnetic peak allowed easier transit across certain dimensional bands of frequencies. For example, the electrical overtone (one pole of the electrical/magnetic vortex) of D3 (dimensional band) connects with that of the magnetic base tone of D4, creating a magnetic window.
These particular Zetas are the Zeta-Grey Rigelians from the star system Rigel in Orion. Zeta-Dracos motivated the government to create the experiment in 1983.
The ship was temporarily teleported to a future time, to 1983, another magnetic peak.
The Zetas had succeeded in creating a wormhole (a vortex interconnecting dimensions and times) as part of their plan for expanding their implant grid system and also creating spacetime pathways to the phantom matrix (a separated, walled-off astral realm; a slow-acting black hole, the abode of the dark forces).
The magnitude of this mystery of the meaning of the Holy Grail might be measured in terms of the exhaustive research so many investigators and scholars have conducted, and the time invested, to find an answer to this age-old question. This planet and its civilisations seem but to be fated with insolvable puzzles and paradoxes. Why is this we may ask? Why would there be endless unsolved conflicts in matters of historical knowledge. Could it be that the inevitable falsifications go much deeper than previously thought possible, and that there are lies of a far-reaching nature.
The following is a discursive summary of the more familiar Holy Grail accounts and interpretations. It is generally assumed that the Holy Grail relates to Jesus; the Grail being the cup that Jesus and his disciples drank from at the Last Supper; also the cup which caught Jesus's blood on the cross. The Grail was said to possess healing abilities for the sick or wounded. It was also claimed to bring enlightenment and to perpetuate youthfulness. Some stories tell of angels bringing the cup from heaven and been given to sacred or Round-Table Knights.
Generally the Holy Grail appears to be a secret in some way related to Jesus. But why is there so much power and intensity behind this quest for the Grail? The word 'Grail' is used in families and lineages, such as 'Grail Kings' or 'Grail family', but the association of Grail and cup is apparently a late development. Thus 'Grail' is a word which appears to have been associated with Holy lineages. Also information relates Grail to purity, etc.; this would make sense when we pay attention to the DNA aspect.
The Holy Grail poems, the romances, have come under considerable scrutiny from investigators but how far have they aided or handicapped the quest?
It has also been suggested that the Grail is an experience of some kind, in particular, mystical and transformational, and that the stone is an alchemical symbol for the pineal gland, and the search for the Grail meant opening this gland. Some think the Grail was thrown into the Chalice Well in Glastonbury; others believing it will never be found as it lies in the ocean of the past.
The Holy Grail has been associated with 1) Jesus's bloodline, and the Templars were appointed guardians of this bloodline (see book: The Holy Blood and the Holy Grail by M. Baigent, R. Leigh, and H. Lincoln), and 2) the receptacle or vessel (the womb of the Magdalene) which received or contained Jesus's blood. Thus the Holy Grail symbolised both Jesus's blood line and the Magdalene from whose womb the bloodline issued.
The authors of The Holy Blood and the Holy Grail have established a bloodline from Jesus, which has continued to the present day with a symbolic connection to the womb, or 'vessel' from which the lineage emerged. The essential ingredient here is the DNA of Jesus. What is so special about this DNA and why does it relate to the Holy Grail?
The experiential aspect of the Grail alluded to above, links with the Kabala. This gives us our lead and cue to uncover the real origin of the Grail. The Kabala is a system of spiritual evolvement and conscious unfoldment and can be traced back to and associated with Jewish mysticism. However, it will be found in fact to extend to our earliest imaginable antiquity; long before the so-called origins within Jewish mysticism.
Firstly the Kabala originated with the Kathara grid. The Kathara is a blueprint structure underlying all of creation and its parts. In its natural and original condition it contains 12 interconnected spheres—not the 'mutated' 10 or 11 as depicted in the Kabala—and is referred to as the Divine Blueprint. Its size is roughly proportional to its creations, from particles to time matrices (galaxy sectors but extend into inner and higher space). Thus the Kathara grid exists in inner and higher space. This is also the framework for the DNA and acts like a template. The template accrues frequency patterns as the individual experiences life, and consciousness evolves/ascends. The current DNA of all life is heavily mutated in the higher-strand interconnections, hence the discovery that 90% of the DNA is interons; 'blank' areas, or so-called junk DNA. These biological strands have lost their connection to the higher electromagnetic strands, totalling 12 double strands for the human, and corresponding to the 12-dimensional frequency bands of the Kathara grid.
Our planet Earth has a direct connection to one of these lower-dimensional spheres. This means Earth has a convenient access system to the portals of the Universal Templar Complex and therefore to the territories of the time matrix. Invader ETs (or the Dark forces) apparently have been striving to gain access to this major Inner Earth portal for hundreds of millions of years.
This is the quest for the Holy Grail; the Holy Grail being the Universal Templar Complex. To capture this Kathara grid territory would enable the fallen angelics, as they are called, to control the time matrix and all life within it. They have the technology to manipulate this blueprint ('DNA') of the Universal Templar Complex and artificially reformat its codes to match their mutated DNAs and time matrix.
If the public could adjust their perspective of what constitutes normality in our society, or in other words, to reset their zero, the degree of evolutionary deviation this planet is exhibiting could be conceived, and moreover a commensurate explanation for this extreme negativity would then be more readily accepted.
We see that everything which brings more freedom or independence with energy is forbidden on this planet, but also that this confiscation of rights must be manipulated covertly so that its existence escapes the programmed and deceived public. Even theoretical physics is not free to develop in any direction. For example, one would think most school children would know that our Moon is an astronomy enigma. But how many adults do? Could this be because there have been theories by, for instance, Russian scientists that suggest strongly that the Moon is artificial and was brought into orbit billions of years ago by advanced extraterrestrials? Even NASA has data which supports this and the whole subject is riddled with mysteries (to be covered in a future article). If people began to realise their ET connections in ancient history the world would be a very different place.
We witness the endless ways of manipulation by the controlling powers; the energy, medical, and psychological fields being particularly targeted. Through deceptive pretext of intelligent education man is subtly made naive and closed-minded by means of a structuralisation of consciousness into limitations within a thought-control context, rather than expanding consciousness, creating greater freedom of thought; and finally by cunningly programming man to enslave himself.
It has been established beyond all reasonable doubt that the Moon is not what it appears; that it is not just another satellite orbiting a planet, Earth, but an entity which has thrown the minds of some of the greatest thinkers and scientific brains into a quandary and bewilderment unprecedented in the history of astronomy. Why haven't you heard about this? Another government cover-up? How could Moon mysteries have anything to do with government secrecy, and moreover could it relate to the suppression of the space programme?
The first academic enigma must surely be that the Moon is apparently in its wrong orbit for its size. However, this would presumably be based on its assumed density. Technical reports claim a density of 3.3 for the Moon compared with 5.5 for Earth. Astronomy data indicates that the internal regions of the Moon are less dense than the outer, giving rise to the inevitable but outrageous speculation that it could be hollow.
Possibly the strongest evidence for it to be a 'hollow object' comes from the fact that when meteors strike the Moon, the latter rings like a bell.
Two Soviet scientists, Vasin and Shcherbokov, have spent much of their careers examining the facts compiled on lunar phenomena. Their conclusion is that the Moon is artificial, possibly a hollowed-out planet, and that it was steered from some distant region of the galaxy into a circular orbit around our planet (hence the extraordinary mystery of rock and Moon-dust age variations). They claim that intellectual life has existed in the Moon for eons.
In 1968 as Apollo 8 moved into orbit around the Moon, the astronauts spotted a colossal extraterrestrial object, which then had disappeared on the next orbit. Photographs were taken, of course, but not released to the public. Almost every Moon mission involved encounters with UFOs or UFO sightings, not to mention the discovery of many bases on the Moon's surface.
Was the space programme cut because further encounters with UFOs might blow the government cover-up? Even more important than this, allowing the public to increase their interest in the subject of extraterrestrials would eventually lead to a worldwide awakening of the human race's true heritage, the causes of our downfall, the falsification of our history, and ultimately the disclosure and eradication of the control mechanism.
We see that the Moon mysteries are intimately bound up with extraterrestrial sightings and involvement, in particular, the conclusion of the two Russian scientists that the Moon is artificial and hollow. Is this a favourable omen for the human race or a harbinger of something more ominous. Why was the Moon directed to retain continuously a dark side? A side of the Moon we never see. Also police records referring to increased crime during the full Moon are commonplace. A study of ET material of which literature today abounds, strongly indicates that the nature of the Moon has a sinister purpose and plays a role in manipulating man's evolution.
this film is in nine parts, on youtube, watch for parallel lines in part five.
The sceptical reader might now realise how thorough the cover-up is, that such clear evidence of non-human activity is being ignored and not given to the public. The media is set up to invalidate all such paranormal events, particularly anything to do with ETs. The crop circle when properly confronted can be recognised as our clearest physical evidence for the presence of extraterrestrials.
We can now ask whether the genuine forms are communicating through geometric intelligence? This is much more a nonlinear intuitive right-brain phenomenon of which the average human is relatively disabled as a result of the gradual predominance of left-brain programming on this planet. Could our cells or DNA understand these geometric patterns, achieved by resonance of frequency patterns and transfer of information?
Crop circles are all related and move a frequency band around the planet that helps man to adjust to the new frequencies (the ascension-effects that the planet and civilisation are encountering) and form an intelligent grid-work around the planet. The geometry of the circles is a form of intelligence and the circles are made with sound. The crop formations subliminally speak to the collective consciousness and open doorways for energies. The glyphs contain huge amounts of information that the rational mind can't grasp. In fact one source states that England was the first country to receive them since this is where rationality and logic received its main contribution.
The reading of crop circles requires the right brain and thus encourages the over-logical mind to give way. They are expressions of consciousness of which the latter will expand through understanding them but more through feeling; not thinking. The circles speed up evolution and DNA and the frequency patterns from the circles are made up of waves which can be modulated. They are formed over vortices---these can be intersection points (nodes) of energy lines (such as ley lines). Humans have recognised that the formations appear on the nodes of magnetic lines. Note that some UFOs have been said to fly via these intersection vortices and that the covert government install their (mind control) antennas over them. Bruce Cathie, the author of the 'harmonic universe' books, discovered this grid system decades ago and was offered a permanent position with the secret government, but only to shut him up.
Crop circles are not created through mechanical or laser-like technologies. They are cast on the level of 'sub-atomic energy imprints' (that is, patterns underlying the atoms), and utilise the organic electromagnetic elements of the immediate environment, and particular geometry of the location, to achieve multidimensional manipulation. Some crop formations stimulate neurological and biological processes, others repress these processes. The language of these geometric forms operates at the level of geometric codes. Just as the 26 letters of the English language combine in countless different ways to create hundreds of thousands of meanings, so basic code units combine to form a universal language---they are present in all creations and are an inherent part of all blueprints of life and the universe. This is the language of biology, cells, DNA, and the elemental world. The intention is to imprint into the location fundamental frequency patterns (including code structures) to influence the population in specific ways.
The radius of influence is several thousands of miles for any one crop circle, and the formations are often related even though thousands of miles apart and link together to create greater wholes (of frequency patterns). The informational influence of the circles still exists long after the physical impression has disappeared. They are indelibly imprinted into the ground, air, and local biological forms.
Thus, as stated, crop circles are the first significant physical evidence of the extraterrestrial presence. However, the early ones and a percentage of them today are a form of mass-frequency-control device. But the good news is that the benevolent ETs began counteracting the harmful formations with other designs sometime ago and today there are now more beneficial formations than not. All forms are influencing us on subliminal levels continuously. The benevolent ETs found that the most successful method of cancelling the effects of these subliminal programming devices (negative crop circles) was to create positive formations around the world. Thus today there are significantly more positive ones than negative. The author collected 18 good images of formations and had them evaluated by an expert pendulum dowser (one who addresses the source, or highest self and corrects for interference from ETs, etc.).
In conclusion, the above information will not be welcomed by most crop-circle experts and certainly not the New-Age groups, who generally only see the positive side. Our evolution has been manipulated by mass biological and spiritual control devices, resulting in a condition hugely deviant from the evolutionary probabilities of the original (Divine) blueprint, exemplified by the incredible state of chaos, insanity and suffering in the world today. Most aspects of life on this planet are not as normal as people think. The global crop-circle network, barring benevolent intervention, is one of many effective subliminal technologies that are communicating frequency patterns to our DNA, and also codes within the structures of the planet, solar system, etc.
Could there such a thing as a Niburian Diodic Crystal or is it a “wild eyed conspiracy theory”? Could such crystals have been implanted in the Earth’s crystalline grid structure by ancient ET visitors? Do we need a multidimensional physics to understand what's going on?
In electronics, a diode is a two-terminal device (thermionic diodes may also have one or two ancillary terminals for a heater).
Diodes have two active electrodes between which the signal of interest may flow, and most are used for their unidirectional electric current property. The varicap diode is used as an electrically adjustable capacitor.
The unidirectionality most diodes exhibit is sometimes generically called the rectifying property. The most common function of a diode is to allow an electric current in one direction (called the forward biased condition) and to block the current in the opposite direction (the reverse biased condition). Thus, the diode can be thought of as an electronic version of a check valve.
Real diodes do not display such a perfect on-off directionality but have a more complex non-linear electrical characteristic, which depends on the particular type of diode technology. Diodes also have many other functions in which they are not designed to operate in this on-off manner.
A diode, or "rectifier," is any device through which electricity can flow in only one direction. The first diodes were crystals used as rectifiers in home radio kits. A weak radio signal was fed into the crystal through a very fine wire called a cat's whisker. The crystal removed the high frequency radio carrier signal, allowing the part of the signal with the audio information to come through loud and clear. The crystal was filled with impurities, making some sections more resistant to electrical flow than others. Using the radio required positioning the cat's whiskers over the right kind of impurity to get electricity to flow through the crystal to the output below it.
At the time, though, no one really understood about the impurities -- then in 1939 Russell Ohl accidentally discovered that it was the boundary between sections of different purity that made the crystal work.
A crystal diode is made of two different types of semiconductors right next to each other. One side is easy for electrons to travel through; one side is much tougher.
This boundary has turned out to be crucial for our daily lives. Diodes change the alternating current that comes from your wall outlet into the direct current that most appliances need. And transistors need two such boundaries to work.
Diode: Combination of a cold anode and a heated cathode, or the semiconductor equivalent, which incorporates a p–n junction. Either device allows the passage of direct current in one direction only, and so is commonly used in a rectifier to convert alternating current (AC) to direct current (DC).
Semiconductor diodes are made from silicon-based materials primarily used in electronic circuits to allow an electrical current to flow in one direction only. Silicon on its own is not useful and it is therefore doped (mixed) with other materials in order to achieve the desired physical and chemical properties. The impurity atoms occupy various positions in the silicon crystal. Two types of junctions are produced by doping: p-type and n-type.
Crystal diodes are used in pyroelectric fusion (hydrogen fusion)?
We have begun building the Mercury laser system as the first in a series of new generation diode-pumped solid-state lasers for inertial fusion research. Mercury will integrate three key technologies: diodes, crystals, and gas cooling, within a unique laser architecture that is scalable to kilojoule and megajoule energy levels for fusion energy applications. The primary near-term performance goals include 10% electrical efficiencies at 10 Hz and 100J with a 2–10 ns pulse length at 1.047 m wavelength. When completed, Mercury will allow rep-rated target experiments with multiple chambers for high energy density physics research.
Seismic P-waves travelling in a N–S direction through the inner core of the Earth are slightly faster than those travelling in the equatorial plane, and these results have been interpreted in terms of an anisotropic inner core with cylindrical symmetry aligned with the Earth's axis of rotation. In this letter it is shown that this interpretation places an important constraint on the crystal structure of the inner core, and in particular is inconsistent with a cubic crystal structure (BCC or FCC). These results therefore provide further evidence for the stability of the HCP phase of iron under the Earth's core conditions.
The inner core of the earth is a sphere with a radius of about 1,200 km, made mostly of iron, which has different mechanical and magnetic properties based on temperature.
MYSTERY: Elastic waves pass that through this core move faster parallel to the earth’s axis of rotation than they do parallel to the equator.
At the high temperatures that prevail in the core of the earth, these waves should pass at the same speed regardless of their direction.
“We found that the body-centered cubic structure of iron is the only structure that could correspond to the experimental observations,” says Börje Johansson, professor of condensed-matter theory at Uppsala University.
The "flight or fight" program is cleverly destructive. Theoretically all problems can be solved by communication, in particular, where conflict arises with people. A resolution reconciles the polarity, and unity consciousness is achieved. However, the implant kicks in when any conflict or counteraction is encountered causing an aggressive person to attack or "fight" (and thus increases the separation and polarity), and the passive person to withdraw or "take flight"--again preventing resolution.
Were such mysterious sites as Stonehenge in England, or Machu Picchu in Peru, or the Pyramids of the Sun and Moon near Mexico City, or the megalith temples of Malta, or the stone heads of Easter Island, or Serpent Mound in Ohio, or thousands upon thousands of other structures scattered across the globe, simply a matter of chance arrangement or design? Have the modern theories, whatever they may be, fallen far short of explaining what really once was?
Is it true that these great monumental edifices were deliberately fixed into the geometric configuration of an "enchanted" energy landscape? And did they, altogether, create a gigantic intricate web-like pattern, the meaning and purpose of which has defied the most scholarly of modern archaeologists and historians to fully explain? What is the missing element that interlinks everything into a single fabric and weave, of which the prehistoric linear patterns among the silent structures are but the threads?
Is there a universal energy source, once known but lost to us today, which springs from the Earth? Was it distributed along the sacred lines and pathways, and broadcast out of the temples situated at the focal points? Is this is the mythic hidden power of magic and healing at one time shared by everyone, in a forgotten Golden Age in the distant past? How was such a system lost, and can it be understood and restored again today?
Several modern leading researchers in the fields of ancient mysteries and earth energies have gleaned from ancient sources what may be new answers to these questions regarding the true nature of the planet and its power systems, as well as how these have affected not only climatic and geologic changes in the Earth, but also significant physical-emotional-mental-spiritual transformations among peoples and nations.
By the early 1970s Cathie had accumulated facts supporting his contention that the recorded movements of UFOs conformed precisely to an intricate network of energy grid lines spanning the Earth, and which are an integral part of the structure of this planet. He theorizes that the UFOs position themselves directly above these global lines, tapping in on a natural energy source freely available at these co-ordinates. They then are free to conduct surveillance operations of the entire planet.
Cathie makes other claims, including the statement that scientists from a number of countries have already been conducting secret research for several decades using knowledge gained during the examination of crashed UFOs. He insists that governments have not only built similar craft but flown them. These clandestine experiments, based on the harnessing of gravitational energy, have served only to add to the increasing worldwide reports of UFO sightings by the general public.
"I was taken into a laboratory and interviewed by scientists and afterwards they admitted that they were working in 15 dimensions. They can do all the things that a UFO can do," revealed Cathie in a 1992 Radio Australia broadcast. "I think that we have already been on the moon before the moon landings and have gone into other dimensions," he said.
Cathie believes there are an infinite number of dimensions and that each is divisible by the same number as we are in now.
Knowledge of the global energy grid is being kept from the world, he claims. The revolutionary work of Nikola Tesla has also been quietly disregarded.
"Tesla himself was setting up a system for free world energy when he died, and this is the one regret. People at the top have suppressed it. The knowledge is so advanced there would be a financial collapse around the world," he maintains.
The basic grid structure was formed by a series of great circles interlocking at various points around the Earth’s surface. The nodal points of the two grids, when joined by series of small and great circles formed what I have loosely termed polar squares around the north and south geographic poles. It was when I carried out a geometric and mathematical analysis of these sections that I found a direct connection with light, gravity and mass equivalents in a harmonic sense. To do this, I had to convert all our normal systems of measurement into a single set of units, and also convert our time measure into one that would correlate with the grid. After much thought and a long period of trial and error, I finally discovered that angular measure in minute-of-arc values, and a time unit based on twenty-seven units for one revolution of the Earth, was the key to the unlocking of the grid secrets.
After that it was a long, slow process to learn how to relate the values being calculated, one to the other, in order to find a logical mathematical basis for the system.
Finally, after years of work, I discovered that I could formulate a series of harmonic unified equations which indicated that the whole of physical reality was in fact manifested by a complex pattern of interlocking wave-forms. I gradually found that the harmonic values could be applied to all branches of scientific research and atomic theory.
At first I was not very sure of the results I was getting, but as time went by, more and more interest was being shown by intelligence agents, government personnel and scientists in the work I was doing, and many requests started coming in for information. Help in my work was eventually offered from these quarters, but the catch was that I had to remain silent about my discoveries. This I refused to do; and I still continue to battle on, on my own. Once I realised the importance of the material in my possession, I considered it extremely dangerous for any small group of people to have complete control of it.
There is now circumstantial evidence to suggest that the megalithic infrastructure was used by the Atlantean civilization to stabilize the tectonic plate movements that caused Earthquakes and volcanic activity around the world. However the Atlanteans could not prevent a pole shift that eventually led to the destruction of Atlantis.
If you’re still not convinced that highly civilized cultures pre-dated our current civilization just have a look at the hieroglyphs that were found on the Egyptian temple wall at Abydos.
It doesn’t take much imagination to see from left to right a helicopter, a submarine, a UFO, and an airplane. Now what do we really know about the Egyptians? Let’s have a look in the next chapter at the most intriguing and mysterious construction every made by man, the Great Pyramid at the Giza plateau and see how scientist have started to unravel this enigma. Indications are that the Great Pyramid must not be attributed to the Egyptians but to the Atlanteans.
After glancing at the first graph above, the reader familiar with the Kabala (Cabala, Qabala) will immediately recognise the similarity to the Kathara grids. The Kabala has been defined as an esoteric, occult practical system for expanding and evolving consciousness. The Kabala has been described as a map of how the universe was formed and that it is a symbolic representation of the path of the Divine followed in the creation of the universe. Also it is a map of how the processes of Divinity manifest in each of us and thus giving a means for man to return to the Divinity by that path.
It places life in a context of exploration and is a means of approaching God directly. It is called the Tree of Life and reflects both the energies of the microcosm and macrocosm and how they exist within each of us. The Kabala has ten spheres, each a level of consciousness which resides in each of us. They are named the Holy Sephiroth. The cross bars are referred to as connecting paths and are twenty-two in number that are associated with the twenty-two letters of the Hebrew alphabet. The Kabala is said to have its origin in Jewish mysticism.
These spheres and connecting paths constitute thirty-two so-called paths of wisdom. Each sphere contains forces and abilities in each of us and gives a system of steps for awakening consciousness in man.
Now if the Kabala represents the path by which the universe and man was formed then if this is taken literally we are talking about a blueprint. In fact the original form of the Kabala is not symbolic but an actual representation of the Divine blueprint underlying all creation. It is representational, clearly, since the actual physics of the blueprint can't be contained in a two-dimensional diagram. An obvious conclusion is that the Kathara grid is the origin of the Kabala. The Kathara grid, is the Divine Blueprint or core template from which all creation springs, whether a thought, a particle, living organism, planet or universe, etc. The 10 spheres (sometimes 11) of the Kabala are apparently a distortion of the 12-dimensional Kathara grid. Note that to remove D12 (as in the Kabala) is, as an analogy, like removing the president of a company, the integrating entity.
The word 'Kathara' originates from KA which means Light, God expressed or transmitting; THA which means sound, infolding rather than expressing, and RA, one Spirit.
All knowledge and energy is contextual; what is observed or detected is in the context of who or what is observing or detecting; to evaluate a system properly the observer must be 'outside' the context of the system; if the observer is 'inside' the context of the system (as is scientific observation), only relative results will be obtained; and anything will self-prove relative to its own context.
The reason - infrared Tourmaline is the only one mineral to show permanent electricity on the earth and is also a natural (non-manufactured) source of negative ions and far infrared (FIR) rays.
Tourmaline belongs to the trigonal crystal system. The style of termination at the ends of crystals is asymmetrical, called hemimorphism. All hemimorphic crystals are piezoelectric, and are often pyroelectric as well.
Tourmaline is also pleochroic, which makes it appear darker from some angles than from others.
Tourmaline is distinguished by its three-sided prisms; no other common mineral has three sides.
Tourmaline has unusual electrical properties: Tourmaline crystals when warmed become positively charged at one end and negatively charged at the other.
Tourmaline is the only one mineral to show permanent electricity on the earth and is also a natural source of negative ions and far infrared (FIR) rays.
On its long journey from the middle of the earth up toward the sun, the tourmaline traveled along a rainbow collecting all the colors of the rainbow. This is why tourmaline came to be known as "the rainbow gemstone."
According to an ancient Egyptian legend, this is the result of the gemstone traveling along a rainbow from the Earth’s heart, up to the sun.
Due to the stones’ energetic conductivity and vast array of elements, they are thought to have powerful healing abilities and protect against many dangers.
Paraiba tourmaline’s spectacular color is due to the presence of a small amount of copper. There is also a surprisingly high content of gold in the stones. While the average gold content of the Earth’s crust is 0.007 parts per million, Paraiba tourmalines contain a remarkable 8.6 parts per million.
The pyroelectric properties exhibited by it make it a crystal of great importance to physicists.
Tourmaline belongs to the trigonal crystal system and occurs as long, slender to thick prismatic and columnar crystals that are usually triangular in cross-section. Interestingly, the style of termination at the ends of crystals is asymmetrical, called hemimorphism. Small slender prismatic crystals are common in a fine-grained granite called aplite, often forming radial daisy-like patterns. Tourmaline is distinguished by its three-sided prisms; no other common mineral has three sides. Prisms faces often have heavy vertical striations that produce a rounded triangular effect. Tourmaline is rarely perfectly euhedral.
All hemimorphic crystals are piezoelectric, and are often pyroelectric as well. Tourmaline crystals when warmed become positively charged at one end and negatively charged at the other. Due to this effect, tourmaline crystals in collections may attract unsightly coatings of dust when displayed under hot spotlights. Tourmaline's unusual electrical properties made it famous in the early 18th century. Brightly coloured Sri Lankan gem tourmalines were brought to Europe in great quantities by the Dutch East India Company to satisfy demand as curios and gems. At the time it was not realised that schorl and tourmaline were the same mineral.
On its long journey from the middle of the earth up toward the sun, the tourmaline traveled along a rainbow collecting all the colors of the rainbow. This is why tourmaline came to be known as "the rainbow gemstone." Tourmaline owes its rainbow coloration to trace impurities such as chromium (red), iron (dark blue, dark brown), lithium (green, pink), manganese (pink), schorl (black) and vanadium (green). Tourmaline belongs to the Trigonal crystal system with a Parallel and Elongated Striated Crystal habit.
Tourmaline is a complex crystalline silicate (cyclosilicate) containing aluminum, boron and other trace elements. Tourmaline is piezoelectric which means that heating, rubbing or pressurizing the crystal gives it an electric charge. It is also pleochroic, which makes it appear darker from some angles than from others. Tourmaline's pyroelectric quality was discovered in the early seventeenth century.
Most people consider tourmaline to be a single mineral. But in fact it is a group named for several different, but closely related minerals.
There are many unique properties of tourmalines. First, they are piezoelectric which means that when a crystal is heated or compressed (or vibrated) a different electrical charge will form at opposite ends of the crystal (an electrical potential). Conversely if an electrical potential is applied to the crystal, it will vibrate. Secondly they are pleochroic which means that the crystal will look darker in color when viewed down the long axis of the crystal than when viewed from the side. This property goes beyond the idea that the crystal is just thicker in that direction. Even equally dimensioned crystals will demonstrate this trait. This property can be used as an advantage by gem cutters who may wish to enhance a crystal's pale color or weaken a strongly colored crystal.
Tourmalines are piezoelectric, meaning they can generate electrical charges when heated, compressed or vibrated. They then become polarized crystalline magnets and can attract light objects.
Now, as a mineral, it has become a focus of research at universities and research centers worldwide.
It is also known to be helpful for improving circulation, relieving stress, increasing mental alertness and strengthening the immune system function.
Tourmaline’s special physical properties allow it to create a magnetic field (formation of anion), electrolysis water (activation of weak alkali materials and surfactant) and emit far infrared rays.
Tourmaline is the only mineral on earth that emits weak magnetic field permanently. Also, as a family of granite, it is found in the same earth layer as quartz, opal and garnet.
The electric or magnetic gems, tourmaline, amber, and loadstone, possess not only great scientific interest, but demonstrate the fact that a certain energy really does proceed from some of these fair, ornamental objects, an energy that produces a positive action from without upon the human body.
The ability of a mineral to conduct electricity is referred to as electroconductivity. This property is mostly characteristic of minerals with metallic bonding, such as gold, silver, and copper. Minerals with partial metallic bonding are semiconductors of electricity.
Most gem minerals lack metallic bonding and thus are nonconductors, with the exception of natural and synthetic blue diamonds that do conduct electricity.
Piezoelectricity, or pressure electricity, is found in minerals that have polar axes or lack a center of crystalline symmetry. The crystal axes have different properties at the opposite ends of the polar axis, and when pressure is exerted at these ends, electricity can flow creating opposite positive and negative ends. Quartz and tourmaline are piezoelectric. Pyroelectricity, or heat electricity, occurs in minerals with polar axes or lack the center of crystalline symmetry.
lizzie wrote: Could there such a thing as a Niburian Diodic Crystal or is it a “wild eyed conspiracy theory”? Could such crystals have been implanted in the Earth’s crystalline grid structure by ancient ET visitors? Do we need a multidimensional physics to understand what's going on?
Nothing is impossible. Our universe could be a tiny bubble in a glass tube in an extradimensional laboratory.
But i do think that the godly or universal blueprint just scales and adopts well to any possible siutation. Our observable nature does remarkable things on her own. In the end it seems to be about motion (or lack of) and vector of motion. Vector of motion as in orientation. The godly blueprints oreintation seems to be: Make the best out of it.
And so does any natural system. Our solar system makes the best out of what it got. Just as any other solar system, no matter how many planets are available or how they are build inside.
To be honest, most of the conspiracies are childs of our own wishes. Personally i d love to step through a stargate and leave it on a green, clean and peaceful planet. Someone else probably would like to jump onto an high-tec and spacetravelling planet. Or we just wish there would be an adventurous secret out there. Sometimes there is, but often not.
Mague said: Nothing is impossible. Our universe could be a tiny bubble in a glass tube in an extradimensional laboratory.
“Our Universe is a dream in the mind of Lord Brahma and we are his dream creatures”?
Mague said: Personally i d love to step through a stargate and leave it on a green, clean and peaceful planet.
LOL. Where is that stargate? People who wanted to live on a green, clean peaceful planet would be content to live in harmony with the Earth – to “make the best of it.” People who think they can do better than Nature could go to a high tech universe. There they could use their technological talents to create an artificial universe. Acquisitive people could go to a monopoly universe – a place where they could play games like monopoly – win one day; lose the next. (This could fulfill their need to be competitive in a beneficial way.) We are creating virtual reality situations so no one should take them personally (no need to go to war); just change the virtual reality. Then we could have the ego universe where everyone who wants to be “me first” could go. But I don’t think that universe would last very long.
Mague said: We cant gain any real knowledge; we just can grow into it. We always know what we need to know in our current position. Growth is motion and once we moved into a new position we know all about this new position beacuse we are there.
I see; so this “shift in positions” makes us believe that we have gained knowledge?
To not completely hijack the thread I’d like to mention that astronomical alignments, at least on the milky way scale, have always something to do with orbits I think sometimes some healthy and true egoism is useful. Potential earth changes are not our business. Earth will care for that. But our core self and its orbiting ego are our business. This is true always, but has probably priority in 2012. What’s your estimation? How many people will be able to align themselves in 2012?
Sorry, Mague. I completely missed this. Obviously my ego was focused on something else. This is the key issue – ego. Each of us has one; and each of us is responsible for its actions.
How many people will be able to align themselves in 2012? Probably only an infinitesimally small number of people has any idea of what's really involved. I think most of us have no idea of what is really involved; most of us are led to believe that it’s simply a question of correct meditation practices (the quick fix). More likely it’s all about dissolving the the size of our egos down to size.
The mere notion of the emperors sleeping makes it clear that they are expected to awake and to return one day; be it Quetzalcouatl (in the heart of the sea), Ogygian Kronos himself, or Arthur, ruler of the lower hemisphere.
Few scholars only, among them Franz Kampers and Robert Eisler, have recognized the awe-inspiring age of such traditions, and even they have been incapable of calling the much-expected “redeemer” and “kosmokrator” by his own name: Saturn.
Last edited by lizzie on Tue Jul 07, 2009 7:34 am, edited 3 times in total.
THE DEMOCRATIC NATURE OF ALL CREATION.
Deepak Ranade. The Speaking Tree, The Times of India, 26 March 2008.
The original undivided pluripotent being had the option of remaining unmanifest. Manifestation was one of the limitless options available to this source.
For awareness to experience itself, a state of duality had to be induced. It needed to cleave itself and induce a pseudo=dichotomy of perceiver and perceived. This process is similar to the process of a developing embryo. The single cell replicates itself rapidly and metamorphoses into this complex and differentiated multi-organ form. In reality, we all are just one cell that has differentiated itself into specified functional units. When I touch my hair it actually is the manifestation of a single cell touching another expression of itself and the same cell also has the capability to comprehend this 'touch' phenomenon.
All creation is an induced illusion of duality to enable the source to experience itself. The process of creation is in itself a gratifying experience. All artists, when they create a work of art, experience ecstacy on giving birth to a new idea, a new thought. The sheer joy of manifesting in such diversity may be the objective of this exercise by the source. He not only created multiple loci of consciousness but also ensured that His creation was made oblivious to the source of its origins.
Time and space were introduced as illusory media to ensure the delusion of separateness of creation. This being was programmed with the ability to discover his origins, and provided with the means to enjoy the rest of creation as well. Since the being was just a manifestation of the source, he also had all the attributes of the source. The resolve and ability to achieve anything he desires, the capacity to experience total bliss, and above all the freedom to exercise choice.
Selfless creation mandated that the being was given an illusion of being the 'doer'. The self-effacement of the source could be a precondition for nourishing the identiy of His creation. This illusion of being the doer and the centre of the universe manifests as ego. Ego served initially as a tool for self-preservation but as it crystalises further it totally envelops the consciousness and impedes realisation of its true nature.
The ego constantly reaffirms this illusionary duality. The more the ego hardens the farther it moves the being away from the knowledge of his true identity. It then embarks on a game wherein the being gets an illusion of having control and the ability to manipulate for its own happiness.
Awareness when focused outward gets entangled in a web of duality. Then there is no limit to its indulgence. This kaleidoscopic creation has a potent arsenal to engage this awareness into its diverse forms. Indulgence is addictive and it keeps drawing this awareness into its throes, distancing itself from its true identiy. Obsession with the materialistic world is actually as ludicrous as my hand being obsessed with my nose.
The ultimate objective is for consciousness to be able to perceive itself. This could be attained by various means and paths. This knowledge is already there within. The illusion is to look for it 'without'. All other knowledge is duality-based and may at best help in providing analogies. However, analogy is a cheap substitute for experience itself. Creation is like democracy. Made of the source, by the source and for the source. Self-awareness or un-perceiving is self-realisation.
The 'He' and 'His' etc, referred to here are Atman or Brahman. (Brahma is just another 'loci of consciousness'). The use of 'He' and 'His' etc are due to the shortcomings of the English language. Brahman is beyond classification, never mind gender.
"You are just the thought of a thought" - U.G. Krishnamurti.
Brahman is the thinker; Brahma is the thought and you are the thought of the thought.
Gray Cloud said: You are just the thought of a thought" - U.G. Krishnamurti.
I hate to rain on your parade, and I know that your aim is to put a variety of "interesting" and thought provoking items for our consideration.
This stuff reads like science fiction, and I think that it most probably is just that. Some of the details are not accurate, which to me, casts doubt on the credibility of the entire piece. When making extraordinary claims one must make sure all the i's are dotted and t's are crossed.
The military and scientists set up the battleship U.S. Eldridge with an electromagnetic system: Tesla coils, etc. but aided by the Zetas.
There never was a battleship named U.S. Eldridge. US Navy ships are designated as U.S.S. followed by the name of the ship. US Navy battleships of the 20th C (with one exception, BB-5, the "U.S.S. Kearsarge") were all designated, numbered, and named after states, from BB-1 the "U.S.S. Indiana" to the (never completed and cancelled) BB-71 the "U.S.S. Louisiana."
-How do they know it was transported to 1983?
-Shouldn't there have been reports from 1983 of a WW2 destroyer appearing in Philadelphia, or wherever?
-and if you were transported to the future how could you appear in the same place since that involves travel in space too? that is, 1943 Philadelphia was located many millions (probably billions) of miles away from 1983 Philadelphia...due to the motion of the Earth around the Sun, the Sun within the galaxy, the galaxy within the galactic cluster, etc, etc, etc.
-Also, as a note, in 1983 the U.S.S. Eldridge was serving in the Greek navy renamed as the "Leon." If these two ships had met in battle in 1983 and the "Leon" had destroyed the "Eldridge" would the "Leon" cease to exist? as it would have essentially destroyed itself. This of course, creates the possibility of a ridiculous paradox.
The aliens provided a hidden technology which would create a wormhole, a rift or tear in spacetime.
According to the EU there are no such things as wormholes or spacetime. Much has been written about this on these forums as well as in EU literature.
-So how could a supposed advanced alien civilization be dealing with a "not in line with reality" physics? The obvious explanation is that a human writer made up the story using what he perceived as scientific truth? that leads me to conclude that the story is all science fiction/fantasy. | 2019-04-25T22:26:06Z | http://www.thunderbolts.info/forum/phpBB3/viewtopic.php?p=23207 |
These are the Exif tags as defined in the Exif 2.3 standard.
IFD1 tags are not listed separately. All IFD0 tags may also be present in IFD1, according to the standard. The second part of the Exiv2 key of an IFD1 tag is Thumbnail (instead of Image), the other two parts of the key are the same as for IFD0 tags.
0x000b 11 Image Exif.Image.ProcessingSoftware Ascii The name and version of the software used to post-process the picture.
0x00fe 254 Image Exif.Image.NewSubfileType Long A general indication of the kind of data contained in this subfile.
0x00ff 255 Image Exif.Image.SubfileType Short A general indication of the kind of data contained in this subfile. This field is deprecated. The NewSubfileType field should be used instead.
0x0100 256 Image Exif.Image.ImageWidth Long The number of columns of image data, equal to the number of pixels per row. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0101 257 Image Exif.Image.ImageLength Long The number of rows of image data. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0102 258 Image Exif.Image.BitsPerSample Short The number of bits per image component. In this standard each component of the image is 8 bits, so the value for this tag is 8. See also <SamplesPerPixel>. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0103 259 Image Exif.Image.Compression Short The compression scheme used for the image data. When a primary image is JPEG compressed, this designation is not necessary and is omitted. When thumbnails use JPEG compression, this tag value is set to 6.
0x0106 262 Image Exif.Image.PhotometricInterpretation Short The pixel composition. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0107 263 Image Exif.Image.Thresholding Short For black and white TIFF files that represent shades of gray, the technique used to convert from gray to black and white pixels.
0x0108 264 Image Exif.Image.CellWidth Short The width of the dithering or halftoning matrix used to create a dithered or halftoned bilevel file.
0x0109 265 Image Exif.Image.CellLength Short The length of the dithering or halftoning matrix used to create a dithered or halftoned bilevel file.
0x010e 270 Image Exif.Image.ImageDescription Ascii A character string giving the title of the image. It may be a comment such as "1988 company picnic" or the like. Two-bytes character codes cannot be used. When a 2-bytes code is necessary, the Exif Private tag <UserComment> is to be used.
0x010f 271 Image Exif.Image.Make Ascii The manufacturer of the recording equipment. This is the manufacturer of the DSC, scanner, video digitizer or other equipment that generated the image. When the field is left blank, it is treated as unknown.
0x0110 272 Image Exif.Image.Model Ascii The model name or model number of the equipment. This is the model name or number of the DSC, scanner, video digitizer or other equipment that generated the image. When the field is left blank, it is treated as unknown.
0x0111 273 Image Exif.Image.StripOffsets Long For each strip, the byte offset of that strip. It is recommended that this be selected so the number of strip bytes does not exceed 64 Kbytes. With JPEG compressed data this designation is not needed and is omitted. See also <RowsPerStrip> and <StripByteCounts>.
0x0112 274 Image Exif.Image.Orientation Short The image orientation viewed in terms of rows and columns.
0x0115 277 Image Exif.Image.SamplesPerPixel Short The number of components per pixel. Since this standard applies to RGB and YCbCr images, the value set for this tag is 3. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0116 278 Image Exif.Image.RowsPerStrip Long The number of rows per strip. This is the number of rows in the image of one strip when an image is divided into strips. With JPEG compressed data this designation is not needed and is omitted. See also <StripOffsets> and <StripByteCounts>.
0x0117 279 Image Exif.Image.StripByteCounts Long The total number of bytes in each strip. With JPEG compressed data this designation is not needed and is omitted.
0x011a 282 Image Exif.Image.XResolution Rational The number of pixels per <ResolutionUnit> in the <ImageWidth> direction. When the image resolution is unknown, 72 [dpi] is designated.
0x011b 283 Image Exif.Image.YResolution Rational The number of pixels per <ResolutionUnit> in the <ImageLength> direction. The same value as <XResolution> is designated.
0x011c 284 Image Exif.Image.PlanarConfiguration Short Indicates whether pixel components are recorded in a chunky or planar format. In JPEG compressed files a JPEG marker is used instead of this tag. If this field does not exist, the TIFF default of 1 (chunky) is assumed.
0x0122 290 Image Exif.Image.GrayResponseUnit Short The precision of the information contained in the GrayResponseCurve.
0x0123 291 Image Exif.Image.GrayResponseCurve Short For grayscale data, the optical density of each possible pixel value.
0x0124 292 Image Exif.Image.T4Options Long T.4-encoding options.
0x0125 293 Image Exif.Image.T6Options Long T.6-encoding options.
0x0128 296 Image Exif.Image.ResolutionUnit Short The unit for measuring <XResolution> and <YResolution>. The same unit is used for both <XResolution> and <YResolution>. If the image resolution is unknown, 2 (inches) is designated.
0x0129 297 Image Exif.Image.PageNumber Short The page number of the page from which this image was scanned.
0x012d 301 Image Exif.Image.TransferFunction Short A transfer function for the image, described in tabular style. Normally this tag is not necessary, since color space is specified in the color space information tag (<ColorSpace>).
0x0131 305 Image Exif.Image.Software Ascii This tag records the name and version of the software or firmware of the camera or image input device used to generate the image. The detailed format is not specified, but it is recommended that the example shown below be followed. When the field is left blank, it is treated as unknown.
0x0132 306 Image Exif.Image.DateTime Ascii The date and time of image creation. In Exif standard, it is the date and time the file was changed.
0x013b 315 Image Exif.Image.Artist Ascii This tag records the name of the camera owner, photographer or image creator. The detailed format is not specified, but it is recommended that the information be written as in the example below for ease of Interoperability. When the field is left blank, it is treated as unknown. Ex.) "Camera owner, John Smith; Photographer, Michael Brown; Image creator, Ken James"
0x013c 316 Image Exif.Image.HostComputer Ascii This tag records information about the host computer used to generate the image.
0x013d 317 Image Exif.Image.Predictor Short A predictor is a mathematical operator that is applied to the image data before an encoding scheme is applied.
0x013e 318 Image Exif.Image.WhitePoint Rational The chromaticity of the white point of the image. Normally this tag is not necessary, since color space is specified in the colorspace information tag (<ColorSpace>).
0x013f 319 Image Exif.Image.PrimaryChromaticities Rational The chromaticity of the three primary colors of the image. Normally this tag is not necessary, since colorspace is specified in the colorspace information tag (<ColorSpace>).
0x0140 320 Image Exif.Image.ColorMap Short A color map for palette color images. This field defines a Red-Green-Blue color map (often called a lookup table) for palette-color images. In a palette-color image, a pixel value is used to index into an RGB lookup table.
0x0141 321 Image Exif.Image.HalftoneHints Short The purpose of the HalftoneHints field is to convey to the halftone function the range of gray levels within a colorimetrically-specified image that should retain tonal detail.
0x0142 322 Image Exif.Image.TileWidth Short The tile width in pixels. This is the number of columns in each tile.
0x0143 323 Image Exif.Image.TileLength Short The tile length (height) in pixels. This is the number of rows in each tile.
0x0144 324 Image Exif.Image.TileOffsets Short For each tile, the byte offset of that tile, as compressed and stored on disk. The offset is specified with respect to the beginning of the TIFF file. Note that this implies that each tile has a location independent of the locations of other tiles.
0x0145 325 Image Exif.Image.TileByteCounts Short For each tile, the number of (compressed) bytes in that tile. See TileOffsets for a description of how the byte counts are ordered.
0x014a 330 Image Exif.Image.SubIFDs Long Defined by Adobe Corporation to enable TIFF Trees within a TIFF file.
0x014c 332 Image Exif.Image.InkSet Short The set of inks used in a separated (PhotometricInterpretation=5) image.
0x014d 333 Image Exif.Image.InkNames Ascii The name of each ink used in a separated (PhotometricInterpretation=5) image.
0x014e 334 Image Exif.Image.NumberOfInks Short The number of inks. Usually equal to SamplesPerPixel, unless there are extra samples.
0x0150 336 Image Exif.Image.DotRange Byte The component values that correspond to a 0% dot and 100% dot.
0x0151 337 Image Exif.Image.TargetPrinter Ascii A description of the printing environment for which this separation is intended.
0x0152 338 Image Exif.Image.ExtraSamples Short Specifies that each pixel has m extra components whose interpretation is defined by one of the values listed below.
0x0153 339 Image Exif.Image.SampleFormat Short This field specifies how to interpret each data sample in a pixel.
0x0154 340 Image Exif.Image.SMinSampleValue Short This field specifies the minimum sample value.
0x0155 341 Image Exif.Image.SMaxSampleValue Short This field specifies the maximum sample value.
0x0157 343 Image Exif.Image.ClipPath Byte A TIFF ClipPath is intended to mirror the essentials of PostScript's path creation functionality.
0x0158 344 Image Exif.Image.XClipPathUnits SShort The number of units that span the width of the image, in terms of integer ClipPath coordinates.
0x0159 345 Image Exif.Image.YClipPathUnits SShort The number of units that span the height of the image, in terms of integer ClipPath coordinates.
0x015a 346 Image Exif.Image.Indexed Short Indexed images are images where the 'pixels' do not represent color values, but rather an index (usually 8-bit) into a separate color table, the ColorMap.
0x015b 347 Image Exif.Image.JPEGTables Undefined This optional tag may be used to encode the JPEG quantization and Huffman tables for subsequent use by the JPEG decompression process.
0x015f 351 Image Exif.Image.OPIProxy Short OPIProxy gives information concerning whether this image is a low-resolution proxy of a high-resolution image (Adobe OPI).
0x0201 513 Image Exif.Image.JPEGInterchangeFormat Long The offset to the start byte (SOI) of JPEG compressed thumbnail data. This is not used for primary image JPEG data.
0x0202 514 Image Exif.Image.JPEGInterchangeFormatLength Long The number of bytes of JPEG compressed thumbnail data. This is not used for primary image JPEG data. JPEG thumbnails are not divided but are recorded as a continuous JPEG bitstream from SOI to EOI. Appn and COM markers should not be recorded. Compressed thumbnails must be recorded in no more than 64 Kbytes, including all other data to be recorded in APP1.
0x0203 515 Image Exif.Image.JPEGRestartInterval Short This Field indicates the length of the restart interval used in the compressed image data.
0x0205 517 Image Exif.Image.JPEGLosslessPredictors Short This Field points to a list of lossless predictor-selection values, one per component.
0x0206 518 Image Exif.Image.JPEGPointTransforms Short This Field points to a list of point transform values, one per component.
0x0207 519 Image Exif.Image.JPEGQTables Long This Field points to a list of offsets to the quantization tables, one per component.
0x0208 520 Image Exif.Image.JPEGDCTables Long This Field points to a list of offsets to the DC Huffman tables or the lossless Huffman tables, one per component.
0x0209 521 Image Exif.Image.JPEGACTables Long This Field points to a list of offsets to the Huffman AC tables, one per component.
0x0211 529 Image Exif.Image.YCbCrCoefficients Rational The matrix coefficients for transformation from RGB to YCbCr image data. No default is given in TIFF; but here the value given in Appendix E, "Color Space Guidelines", is used as the default. The color space is declared in a color space information tag, with the default being the value that gives the optimal image characteristics Interoperability this condition.
0x0212 530 Image Exif.Image.YCbCrSubSampling Short The sampling ratio of chrominance components in relation to the luminance component. In JPEG compressed data a JPEG marker is used instead of this tag.
0x0213 531 Image Exif.Image.YCbCrPositioning Short The position of chrominance components in relation to the luminance component. This field is designated only for JPEG compressed data or uncompressed YCbCr data. The TIFF default is 1 (centered); but when Y:Cb:Cr = 4:2:2 it is recommended in this standard that 2 (co-sited) be used to record data, in order to improve the image quality when viewed on TV systems. When this field does not exist, the reader shall assume the TIFF default. In the case of Y:Cb:Cr = 4:2:0, the TIFF default (centered) is recommended. If the reader does not have the capability of supporting both kinds of <YCbCrPositioning>, it shall follow the TIFF default regardless of the value in this field. It is preferable that readers be able to support both centered and co-sited positioning.
0x0214 532 Image Exif.Image.ReferenceBlackWhite Rational The reference black point value and reference white point value. No defaults are given in TIFF, but the values below are given as defaults here. The color space is declared in a color space information tag, with the default being the value that gives the optimal image characteristics Interoperability these conditions.
0x800d 32781 Image Exif.Image.ImageID Ascii ImageID is the full pathname of the original, high-resolution image, or any other identifying string that uniquely identifies the original image (Adobe OPI).
0x8298 33432 Image Exif.Image.Copyright Ascii Copyright information. In this standard the tag is used to indicate both the photographer and editor copyrights. It is the copyright notice of the person or organization claiming rights to the image. The Interoperability copyright statement including date and rights should be written in this field; e.g., "Copyright, John Smith, 19xx. All rights reserved.". In this standard the field records both the photographer and editor copyrights, with each recorded in a separate part of the statement. When there is a clear distinction between the photographer and editor copyrights, these are to be written in the order of photographer followed by editor copyright, separated by NULL (in this case since the statement also ends with a NULL, there are two NULL codes). When only the photographer copyright is given, it is terminated by one NULL code. When only the editor copyright is given, the photographer copyright part consists of one space followed by a terminating NULL code, then the editor copyright is given. When the field is left blank, it is treated as unknown.
0x829a 33434 Image Exif.Image.ExposureTime Rational Exposure time, given in seconds.
0x829d 33437 Image Exif.Image.FNumber Rational The F number.
0x8769 34665 Image Exif.Image.ExifTag Long A pointer to the Exif IFD. Interoperability, Exif IFD has the same structure as that of the IFD specified in TIFF. ordinarily, however, it does not contain image data as in the case of TIFF.
0x8822 34850 Image Exif.Image.ExposureProgram Short The class of the program used by the camera to set exposure when the picture is taken.
0x8824 34852 Image Exif.Image.SpectralSensitivity Ascii Indicates the spectral sensitivity of each channel of the camera used.
0x8825 34853 Image Exif.Image.GPSTag Long A pointer to the GPS Info IFD. The Interoperability structure of the GPS Info IFD, like that of Exif IFD, has no image data.
0x8827 34855 Image Exif.Image.ISOSpeedRatings Short Indicates the ISO Speed and ISO Latitude of the camera or input device as specified in ISO 12232.
0x8828 34856 Image Exif.Image.OECF Undefined Indicates the Opto-Electric Conversion Function (OECF) specified in ISO 14524.
0x8829 34857 Image Exif.Image.Interlace Short Indicates the field number of multifield images.
0x882a 34858 Image Exif.Image.TimeZoneOffset SShort This optional tag encodes the time zone of the camera clock (relative to Greenwich Mean Time) used to create the DataTimeOriginal tag-value when the picture was taken. It may also contain the time zone offset of the clock used to create the DateTime tag-value when the image was modified.
0x882b 34859 Image Exif.Image.SelfTimerMode Short Number of seconds image capture was delayed from button press.
0x9003 36867 Image Exif.Image.DateTimeOriginal Ascii The date and time when the original image data was generated.
0x9102 37122 Image Exif.Image.CompressedBitsPerPixel Rational Specific to compressed data; states the compressed bits per pixel.
0x9201 37377 Image Exif.Image.ShutterSpeedValue SRational Shutter speed.
0x9202 37378 Image Exif.Image.ApertureValue Rational The lens aperture.
0x9203 37379 Image Exif.Image.BrightnessValue SRational The value of brightness.
0x9204 37380 Image Exif.Image.ExposureBiasValue SRational The exposure bias.
0x9205 37381 Image Exif.Image.MaxApertureValue Rational The smallest F number of the lens.
0x9206 37382 Image Exif.Image.SubjectDistance SRational The distance to the subject, given in meters.
0x9207 37383 Image Exif.Image.MeteringMode Short The metering mode.
0x9208 37384 Image Exif.Image.LightSource Short The kind of light source.
0x9209 37385 Image Exif.Image.Flash Short Indicates the status of flash when the image was shot.
0x920a 37386 Image Exif.Image.FocalLength Rational The actual focal length of the lens, in mm.
0x920b 37387 Image Exif.Image.FlashEnergy Rational Amount of flash energy (BCPS).
0x920c 37388 Image Exif.Image.SpatialFrequencyResponse Undefined SFR of the camera.
0x920d 37389 Image Exif.Image.Noise Undefined Noise measurement values.
0x920e 37390 Image Exif.Image.FocalPlaneXResolution Rational Number of pixels per FocalPlaneResolutionUnit (37392) in ImageWidth direction for main image.
0x920f 37391 Image Exif.Image.FocalPlaneYResolution Rational Number of pixels per FocalPlaneResolutionUnit (37392) in ImageLength direction for main image.
0x9210 37392 Image Exif.Image.FocalPlaneResolutionUnit Short Unit of measurement for FocalPlaneXResolution(37390) and FocalPlaneYResolution(37391).
0x9211 37393 Image Exif.Image.ImageNumber Long Number assigned to an image, e.g., in a chained image burst.
0x9212 37394 Image Exif.Image.SecurityClassification Ascii Security classification assigned to the image.
0x9213 37395 Image Exif.Image.ImageHistory Ascii Record of what has been done to the image.
0x9214 37396 Image Exif.Image.SubjectLocation Short Indicates the location and area of the main subject in the overall scene.
0x9215 37397 Image Exif.Image.ExposureIndex Rational Encodes the camera exposure index setting when image was captured.
0x9217 37399 Image Exif.Image.SensingMethod Short Type of image sensor.
0xc4a5 50341 Image Exif.Image.PrintImageMatching Undefined Print Image Matching, description needed.
0xc612 50706 Image Exif.Image.DNGVersion Byte This tag encodes the DNG four-tier version number. For files compliant with version 1.1.0.0 of the DNG specification, this tag should contain the bytes: 1, 1, 0, 0.
0xc613 50707 Image Exif.Image.DNGBackwardVersion Byte This tag specifies the oldest version of the Digital Negative specification for which a file is compatible. Readers shouldnot attempt to read a file if this tag specifies a version number that is higher than the version number of the specification the reader was based on. In addition to checking the version tags, readers should, for all tags, check the types, counts, and values, to verify it is able to correctly read the file.
0xc614 50708 Image Exif.Image.UniqueCameraModel Ascii Defines a unique, non-localized name for the camera model that created the image in the raw file. This name should include the manufacturer's name to avoid conflicts, and should not be localized, even if the camera name itself is localized for different markets (see LocalizedCameraModel). This string may be used by reader software to index into per-model preferences and replacement profiles.
0xc615 50709 Image Exif.Image.LocalizedCameraModel Byte Similar to the UniqueCameraModel field, except the name can be localized for different markets to match the localization of the camera name.
0xc616 50710 Image Exif.Image.CFAPlaneColor Byte Provides a mapping between the values in the CFAPattern tag and the plane numbers in LinearRaw space. This is a required tag for non-RGB CFA images.
0xc617 50711 Image Exif.Image.CFALayout Short Describes the spatial layout of the CFA.
0xc618 50712 Image Exif.Image.LinearizationTable Short Describes a lookup table that maps stored values into linear values. This tag is typically used to increase compression ratios by storing the raw data in a non-linear, more visually uniform space with fewer total encoding levels. If SamplesPerPixel is not equal to one, this single table applies to all the samples for each pixel.
0xc619 50713 Image Exif.Image.BlackLevelRepeatDim Short Specifies repeat pattern size for the BlackLevel tag.
0xc61a 50714 Image Exif.Image.BlackLevel Rational Specifies the zero light (a.k.a. thermal black or black current) encoding level, as a repeating pattern. The origin of this pattern is the top-left corner of the ActiveArea rectangle. The values are stored in row-column-sample scan order.
0xc61b 50715 Image Exif.Image.BlackLevelDeltaH SRational If the zero light encoding level is a function of the image column, BlackLevelDeltaH specifies the difference between the zero light encoding level for each column and the baseline zero light encoding level. If SamplesPerPixel is not equal to one, this single table applies to all the samples for each pixel.
0xc61c 50716 Image Exif.Image.BlackLevelDeltaV SRational If the zero light encoding level is a function of the image row, this tag specifies the difference between the zero light encoding level for each row and the baseline zero light encoding level. If SamplesPerPixel is not equal to one, this single table applies to all the samples for each pixel.
0xc61d 50717 Image Exif.Image.WhiteLevel Short This tag specifies the fully saturated encoding level for the raw sample values. Saturation is caused either by the sensor itself becoming highly non-linear in response, or by the camera's analog to digital converter clipping.
0xc61e 50718 Image Exif.Image.DefaultScale Rational DefaultScale is required for cameras with non-square pixels. It specifies the default scale factors for each direction to convert the image to square pixels. Typically these factors are selected to approximately preserve total pixel count. For CFA images that use CFALayout equal to 2, 3, 4, or 5, such as the Fujifilm SuperCCD, these two values should usually differ by a factor of 2.0.
0xc61f 50719 Image Exif.Image.DefaultCropOrigin Short Raw images often store extra pixels around the edges of the final image. These extra pixels help prevent interpolation artifacts near the edges of the final image. DefaultCropOrigin specifies the origin of the final image area, in raw image coordinates (i.e., before the DefaultScale has been applied), relative to the top-left corner of the ActiveArea rectangle.
0xc620 50720 Image Exif.Image.DefaultCropSize Short Raw images often store extra pixels around the edges of the final image. These extra pixels help prevent interpolation artifacts near the edges of the final image. DefaultCropSize specifies the size of the final image area, in raw image coordinates (i.e., before the DefaultScale has been applied).
0xc621 50721 Image Exif.Image.ColorMatrix1 SRational ColorMatrix1 defines a transformation matrix that converts XYZ values to reference camera native color space values, under the first calibration illuminant. The matrix values are stored in row scan order. The ColorMatrix1 tag is required for all non-monochrome DNG files.
0xc622 50722 Image Exif.Image.ColorMatrix2 SRational ColorMatrix2 defines a transformation matrix that converts XYZ values to reference camera native color space values, under the second calibration illuminant. The matrix values are stored in row scan order.
0xc623 50723 Image Exif.Image.CameraCalibration1 SRational CameraCalibration1 defines a calibration matrix that transforms reference camera native space values to individual camera native space values under the first calibration illuminant. The matrix is stored in row scan order. This matrix is stored separately from the matrix specified by the ColorMatrix1 tag to allow raw converters to swap in replacement color matrices based on UniqueCameraModel tag, while still taking advantage of any per-individual camera calibration performed by the camera manufacturer.
0xc624 50724 Image Exif.Image.CameraCalibration2 SRational CameraCalibration2 defines a calibration matrix that transforms reference camera native space values to individual camera native space values under the second calibration illuminant. The matrix is stored in row scan order. This matrix is stored separately from the matrix specified by the ColorMatrix2 tag to allow raw converters to swap in replacement color matrices based on UniqueCameraModel tag, while still taking advantage of any per-individual camera calibration performed by the camera manufacturer.
0xc625 50725 Image Exif.Image.ReductionMatrix1 SRational ReductionMatrix1 defines a dimensionality reduction matrix for use as the first stage in converting color camera native space values to XYZ values, under the first calibration illuminant. This tag may only be used if ColorPlanes is greater than 3. The matrix is stored in row scan order.
0xc626 50726 Image Exif.Image.ReductionMatrix2 SRational ReductionMatrix2 defines a dimensionality reduction matrix for use as the first stage in converting color camera native space values to XYZ values, under the second calibration illuminant. This tag may only be used if ColorPlanes is greater than 3. The matrix is stored in row scan order.
0xc627 50727 Image Exif.Image.AnalogBalance Rational Normally the stored raw values are not white balanced, since any digital white balancing will reduce the dynamic range of the final image if the user decides to later adjust the white balance; however, if camera hardware is capable of white balancing the color channels before the signal is digitized, it can improve the dynamic range of the final image. AnalogBalance defines the gain, either analog (recommended) or digital (not recommended) that has been applied the stored raw values.
0xc628 50728 Image Exif.Image.AsShotNeutral Short Specifies the selected white balance at time of capture, encoded as the coordinates of a perfectly neutral color in linear reference space values. The inclusion of this tag precludes the inclusion of the AsShotWhiteXY tag.
0xc629 50729 Image Exif.Image.AsShotWhiteXY Rational Specifies the selected white balance at time of capture, encoded as x-y chromaticity coordinates. The inclusion of this tag precludes the inclusion of the AsShotNeutral tag.
0xc62a 50730 Image Exif.Image.BaselineExposure SRational Camera models vary in the trade-off they make between highlight headroom and shadow noise. Some leave a significant amount of highlight headroom during a normal exposure. This allows significant negative exposure compensation to be applied during raw conversion, but also means normal exposures will contain more shadow noise. Other models leave less headroom during normal exposures. This allows for less negative exposure compensation, but results in lower shadow noise for normal exposures. Because of these differences, a raw converter needs to vary the zero point of its exposure compensation control from model to model. BaselineExposure specifies by how much (in EV units) to move the zero point. Positive values result in brighter default results, while negative values result in darker default results.
0xc62b 50731 Image Exif.Image.BaselineNoise Rational Specifies the relative noise level of the camera model at a baseline ISO value of 100, compared to a reference camera model. Since noise levels tend to vary approximately with the square root of the ISO value, a raw converter can use this value, combined with the current ISO, to estimate the relative noise level of the current image.
0xc62c 50732 Image Exif.Image.BaselineSharpness Rational Specifies the relative amount of sharpening required for this camera model, compared to a reference camera model. Camera models vary in the strengths of their anti-aliasing filters. Cameras with weak or no filters require less sharpening than cameras with strong anti-aliasing filters.
0xc62d 50733 Image Exif.Image.BayerGreenSplit Long Only applies to CFA images using a Bayer pattern filter array. This tag specifies, in arbitrary units, how closely the values of the green pixels in the blue/green rows track the values of the green pixels in the red/green rows. A value of zero means the two kinds of green pixels track closely, while a non-zero value means they sometimes diverge. The useful range for this tag is from 0 (no divergence) to about 5000 (quite large divergence).
0xc62e 50734 Image Exif.Image.LinearResponseLimit Rational Some sensors have an unpredictable non-linearity in their response as they near the upper limit of their encoding range. This non-linearity results in color shifts in the highlight areas of the resulting image unless the raw converter compensates for this effect. LinearResponseLimit specifies the fraction of the encoding range above which the response may become significantly non-linear.
0xc62f 50735 Image Exif.Image.CameraSerialNumber Ascii CameraSerialNumber contains the serial number of the camera or camera body that captured the image.
0xc630 50736 Image Exif.Image.LensInfo Rational Contains information about the lens that captured the image. If the minimum f-stops are unknown, they should be encoded as 0/0.
0xc631 50737 Image Exif.Image.ChromaBlurRadius Rational ChromaBlurRadius provides a hint to the DNG reader about how much chroma blur should be applied to the image. If this tag is omitted, the reader will use its default amount of chroma blurring. Normally this tag is only included for non-CFA images, since the amount of chroma blur required for mosaic images is highly dependent on the de-mosaic algorithm, in which case the DNG reader's default value is likely optimized for its particular de-mosaic algorithm.
0xc632 50738 Image Exif.Image.AntiAliasStrength Rational Provides a hint to the DNG reader about how strong the camera's anti-alias filter is. A value of 0.0 means no anti-alias filter (i.e., the camera is prone to aliasing artifacts with some subjects), while a value of 1.0 means a strong anti-alias filter (i.e., the camera almost never has aliasing artifacts).
0xc633 50739 Image Exif.Image.ShadowScale SRational This tag is used by Adobe Camera Raw to control the sensitivity of its 'Shadows' slider.
0xc634 50740 Image Exif.Image.DNGPrivateData Byte Provides a way for camera manufacturers to store private data in the DNG file for use by their own raw converters, and to have that data preserved by programs that edit DNG files.
0xc635 50741 Image Exif.Image.MakerNoteSafety Short MakerNoteSafety lets the DNG reader know whether the EXIF MakerNote tag is safe to preserve along with the rest of the EXIF data. File browsers and other image management software processing an image with a preserved MakerNote should be aware that any thumbnail image embedded in the MakerNote may be stale, and may not reflect the current state of the full size image.
0xc65a 50778 Image Exif.Image.CalibrationIlluminant1 Short The illuminant used for the first set of color calibration tags (ColorMatrix1, CameraCalibration1, ReductionMatrix1). The legal values for this tag are the same as the legal values for the LightSource EXIF tag.
0xc65b 50779 Image Exif.Image.CalibrationIlluminant2 Short The illuminant used for an optional second set of color calibration tags (ColorMatrix2, CameraCalibration2, ReductionMatrix2). The legal values for this tag are the same as the legal values for the CalibrationIlluminant1 tag; however, if both are included, neither is allowed to have a value of 0 (unknown).
0xc65c 50780 Image Exif.Image.BestQualityScale Rational For some cameras, the best possible image quality is not achieved by preserving the total pixel count during conversion. For example, Fujifilm SuperCCD images have maximum detail when their total pixel count is doubled. This tag specifies the amount by which the values of the DefaultScale tag need to be multiplied to achieve the best quality image size.
0xc65d 50781 Image Exif.Image.RawDataUniqueID Byte This tag contains a 16-byte unique identifier for the raw image data in the DNG file. DNG readers can use this tag to recognize a particular raw image, even if the file's name or the metadata contained in the file has been changed. If a DNG writer creates such an identifier, it should do so using an algorithm that will ensure that it is very unlikely two different images will end up having the same identifier.
0xc68b 50827 Image Exif.Image.OriginalRawFileName Byte If the DNG file was converted from a non-DNG raw file, then this tag contains the file name of that original raw file.
0xc68c 50828 Image Exif.Image.OriginalRawFileData Undefined If the DNG file was converted from a non-DNG raw file, then this tag contains the compressed contents of that original raw file. The contents of this tag always use the big-endian byte order. The tag contains a sequence of data blocks. Future versions of the DNG specification may define additional data blocks, so DNG readers should ignore extra bytes when parsing this tag. DNG readers should also detect the case where data blocks are missing from the end of the sequence, and should assume a default value for all the missing blocks. There are no padding or alignment bytes between data blocks.
0xc68d 50829 Image Exif.Image.ActiveArea Short This rectangle defines the active (non-masked) pixels of the sensor. The order of the rectangle coordinates is: top, left, bottom, right.
0xc68e 50830 Image Exif.Image.MaskedAreas Short This tag contains a list of non-overlapping rectangle coordinates of fully masked pixels, which can be optionally used by DNG readers to measure the black encoding level. The order of each rectangle's coordinates is: top, left, bottom, right. If the raw image data has already had its black encoding level subtracted, then this tag should not be used, since the masked pixels are no longer useful.
0xc68f 50831 Image Exif.Image.AsShotICCProfile Undefined This tag contains an ICC profile that, in conjunction with the AsShotPreProfileMatrix tag, provides the camera manufacturer with a way to specify a default color rendering from camera color space coordinates (linear reference values) into the ICC profile connection space. The ICC profile connection space is an output referred colorimetric space, whereas the other color calibration tags in DNG specify a conversion into a scene referred colorimetric space. This means that the rendering in this profile should include any desired tone and gamut mapping needed to convert between scene referred values and output referred values.
0xc690 50832 Image Exif.Image.AsShotPreProfileMatrix SRational This tag is used in conjunction with the AsShotICCProfile tag. It specifies a matrix that should be applied to the camera color space coordinates before processing the values through the ICC profile specified in the AsShotICCProfile tag. The matrix is stored in the row scan order. If ColorPlanes is greater than three, then this matrix can (but is not required to) reduce the dimensionality of the color data down to three components, in which case the AsShotICCProfile should have three rather than ColorPlanes input components.
0xc691 50833 Image Exif.Image.CurrentICCProfile Undefined This tag is used in conjunction with the CurrentPreProfileMatrix tag. The CurrentICCProfile and CurrentPreProfileMatrix tags have the same purpose and usage as the AsShotICCProfile and AsShotPreProfileMatrix tag pair, except they are for use by raw file editors rather than camera manufacturers.
0xc692 50834 Image Exif.Image.CurrentPreProfileMatrix SRational This tag is used in conjunction with the CurrentICCProfile tag. The CurrentICCProfile and CurrentPreProfileMatrix tags have the same purpose and usage as the AsShotICCProfile and AsShotPreProfileMatrix tag pair, except they are for use by raw file editors rather than camera manufacturers.
0xc6bf 50879 Image Exif.Image.ColorimetricReference Short The DNG color model documents a transform between camera colors and CIE XYZ values. This tag describes the colorimetric reference for the CIE XYZ values. 0 = The XYZ values are scene-referred. 1 = The XYZ values are output-referred, using the ICC profile perceptual dynamic range. This tag allows output-referred data to be stored in DNG files and still processed correctly by DNG readers.
0xc6f3 50931 Image Exif.Image.CameraCalibrationSignature Byte A UTF-8 encoded string associated with the CameraCalibration1 and CameraCalibration2 tags. The CameraCalibration1 and CameraCalibration2 tags should only be used in the DNG color transform if the string stored in the CameraCalibrationSignature tag exactly matches the string stored in the ProfileCalibrationSignature tag for the selected camera profile.
0xc6f4 50932 Image Exif.Image.ProfileCalibrationSignature Byte A UTF-8 encoded string associated with the camera profile tags. The CameraCalibration1 and CameraCalibration2 tags should only be used in the DNG color transfer if the string stored in the CameraCalibrationSignature tag exactly matches the string stored in the ProfileCalibrationSignature tag for the selected camera profile.
0xc6f6 50934 Image Exif.Image.AsShotProfileName Byte A UTF-8 encoded string containing the name of the "as shot" camera profile, if any.
0xc6f7 50935 Image Exif.Image.NoiseReductionApplied Rational This tag indicates how much noise reduction has been applied to the raw data on a scale of 0.0 to 1.0. A 0.0 value indicates that no noise reduction has been applied. A 1.0 value indicates that the "ideal" amount of noise reduction has been applied, i.e. that the DNG reader should not apply additional noise reduction by default. A value of 0/0 indicates that this parameter is unknown.
0xc6f8 50936 Image Exif.Image.ProfileName Byte A UTF-8 encoded string containing the name of the camera profile. This tag is optional if there is only a single camera profile stored in the file but is required for all camera profiles if there is more than one camera profile stored in the file.
0xc6f9 50937 Image Exif.Image.ProfileHueSatMapDims Long This tag specifies the number of input samples in each dimension of the hue/saturation/value mapping tables. The data for these tables are stored in ProfileHueSatMapData1 and ProfileHueSatMapData2 tags. The most common case has ValueDivisions equal to 1, so only hue and saturation are used as inputs to the mapping table.
0xc6fa 50938 Image Exif.Image.ProfileHueSatMapData1 Float This tag contains the data for the first hue/saturation/value mapping table. Each entry of the table contains three 32-bit IEEE floating-point values. The first entry is hue shift in degrees; the second entry is saturation scale factor; and the third entry is a value scale factor. The table entries are stored in the tag in nested loop order, with the value divisions in the outer loop, the hue divisions in the middle loop, and the saturation divisions in the inner loop. All zero input saturation entries are required to have a value scale factor of 1.0.
0xc6fb 50939 Image Exif.Image.ProfileHueSatMapData2 Float This tag contains the data for the second hue/saturation/value mapping table. Each entry of the table contains three 32-bit IEEE floating-point values. The first entry is hue shift in degrees; the second entry is a saturation scale factor; and the third entry is a value scale factor. The table entries are stored in the tag in nested loop order, with the value divisions in the outer loop, the hue divisions in the middle loop, and the saturation divisions in the inner loop. All zero input saturation entries are required to have a value scale factor of 1.0.
0xc6fc 50940 Image Exif.Image.ProfileToneCurve Float This tag contains a default tone curve that can be applied while processing the image as a starting point for user adjustments. The curve is specified as a list of 32-bit IEEE floating-point value pairs in linear gamma. Each sample has an input value in the range of 0.0 to 1.0, and an output value in the range of 0.0 to 1.0. The first sample is required to be (0.0, 0.0), and the last sample is required to be (1.0, 1.0). Interpolated the curve using a cubic spline.
0xc6fd 50941 Image Exif.Image.ProfileEmbedPolicy Long This tag contains information about the usage rules for the associated camera profile.
0xc6fe 50942 Image Exif.Image.ProfileCopyright Byte A UTF-8 encoded string containing the copyright information for the camera profile. This string always should be preserved along with the other camera profile tags.
0xc714 50964 Image Exif.Image.ForwardMatrix1 SRational This tag defines a matrix that maps white balanced camera colors to XYZ D50 colors.
0xc715 50965 Image Exif.Image.ForwardMatrix2 SRational This tag defines a matrix that maps white balanced camera colors to XYZ D50 colors.
0xc716 50966 Image Exif.Image.PreviewApplicationName Byte A UTF-8 encoded string containing the name of the application that created the preview stored in the IFD.
0xc717 50967 Image Exif.Image.PreviewApplicationVersion Byte A UTF-8 encoded string containing the version number of the application that created the preview stored in the IFD.
0xc718 50968 Image Exif.Image.PreviewSettingsName Byte A UTF-8 encoded string containing the name of the conversion settings (for example, snapshot name) used for the preview stored in the IFD.
0xc719 50969 Image Exif.Image.PreviewSettingsDigest Byte A unique ID of the conversion settings (for example, MD5 digest) used to render the preview stored in the IFD.
0xc71a 50970 Image Exif.Image.PreviewColorSpace Long This tag specifies the color space in which the rendered preview in this IFD is stored. The default value for this tag is sRGB for color previews and Gray Gamma 2.2 for monochrome previews.
0xc71b 50971 Image Exif.Image.PreviewDateTime Ascii This tag is an ASCII string containing the name of the date/time at which the preview stored in the IFD was rendered. The date/time is encoded using ISO 8601 format.
0xc71c 50972 Image Exif.Image.RawImageDigest Undefined This tag is an MD5 digest of the raw image data. All pixels in the image are processed in row-scan order. Each pixel is zero padded to 16 or 32 bits deep (16-bit for data less than or equal to 16 bits deep, 32-bit otherwise). The data for each pixel is processed in little-endian byte order.
0xc71d 50973 Image Exif.Image.OriginalRawFileDigest Undefined This tag is an MD5 digest of the data stored in the OriginalRawFileData tag.
0xc71e 50974 Image Exif.Image.SubTileBlockSize Long Normally, the pixels within a tile are stored in simple row-scan order. This tag specifies that the pixels within a tile should be grouped first into rectangular blocks of the specified size. These blocks are stored in row-scan order. Within each block, the pixels are stored in row-scan order. The use of a non-default value for this tag requires setting the DNGBackwardVersion tag to at least 1.2.0.0.
0xc71f 50975 Image Exif.Image.RowInterleaveFactor Long This tag specifies that rows of the image are stored in interleaved order. The value of the tag specifies the number of interleaved fields. The use of a non-default value for this tag requires setting the DNGBackwardVersion tag to at least 1.2.0.0.
0xc725 50981 Image Exif.Image.ProfileLookTableDims Long This tag specifies the number of input samples in each dimension of a default "look" table. The data for this table is stored in the ProfileLookTableData tag.
0xc726 50982 Image Exif.Image.ProfileLookTableData Float This tag contains a default "look" table that can be applied while processing the image as a starting point for user adjustment. This table uses the same format as the tables stored in the ProfileHueSatMapData1 and ProfileHueSatMapData2 tags, and is applied in the same color space. However, it should be applied later in the processing pipe, after any exposure compensation and/or fill light stages, but before any tone curve stage. Each entry of the table contains three 32-bit IEEE floating-point values. The first entry is hue shift in degrees, the second entry is a saturation scale factor, and the third entry is a value scale factor. The table entries are stored in the tag in nested loop order, with the value divisions in the outer loop, the hue divisions in the middle loop, and the saturation divisions in the inner loop. All zero input saturation entries are required to have a value scale factor of 1.0.
0xc740 51008 Image Exif.Image.OpcodeList1 Undefined Specifies the list of opcodes that should be applied to the raw image, as read directly from the file.
0xc741 51009 Image Exif.Image.OpcodeList2 Undefined Specifies the list of opcodes that should be applied to the raw image, just after it has been mapped to linear reference values.
0xc74e 51022 Image Exif.Image.OpcodeList3 Undefined Specifies the list of opcodes that should be applied to the raw image, just after it has been demosaiced.
0xc761 51041 Image Exif.Image.NoiseProfile Double NoiseProfile describes the amount of noise in a raw image. Specifically, this tag models the amount of signal-dependent photon (shot) noise and signal-independent sensor readout noise, two common sources of noise in raw images. The model assumes that the noise is white and spatially independent, ignoring fixed pattern effects and other sources of noise (e.g., pixel response non-uniformity, spatially-dependent thermal effects, etc.).
0xc763 51043 Image Exif.Image.TimeCodes Byte The optional TimeCodes tag shall contain an ordered array of time codes. All time codes shall be 8 bytes long and in binary format. The tag may contain from 1 to 10 time codes. When the tag contains more than one time code, the first one shall be the default time code. This specification does not prescribe how to use multiple time codes. Each time code shall be as defined for the 8-byte time code structure in SMPTE 331M-2004, Section 8.3. See also SMPTE 12-1-2008 and SMPTE 309-1999.
0xc764 51044 Image Exif.Image.FrameRate SRational The optional FrameRate tag shall specify the video frame rate in number of image frames per second, expressed as a signed rational number. The numerator shall be non-negative and the denominator shall be positive. This field value is identical to the sample rate field in SMPTE 377-1-2009.
0xc772 51058 Image Exif.Image.TStop SRational The optional TStop tag shall specify the T-stop of the actual lens, expressed as an unsigned rational number. T-stop is also known as T-number or the photometric aperture of the lens. (F-number is the geometric aperture of the lens.) When the exact value is known, the T-stop shall be specified using a single number. Alternately, two numbers shall be used to indicate a T-stop range, in which case the first number shall be the minimum T-stop and the second number shall be the maximum T-stop.
0xc789 51081 Image Exif.Image.ReelName Ascii The optional ReelName tag shall specify a name for a sequence of images, where each image in the sequence has a unique image identifier (including but not limited to file name, frame number, date time, time code).
0xc7a1 51105 Image Exif.Image.CameraLabel Ascii The optional CameraLabel tag shall specify a text label for how the camera is used or assigned in this clip. This tag is similar to CameraLabel in XMP.
0x829a 33434 Photo Exif.Photo.ExposureTime Rational Exposure time, given in seconds (sec).
0x829d 33437 Photo Exif.Photo.FNumber Rational The F number.
0x8822 34850 Photo Exif.Photo.ExposureProgram Short The class of the program used by the camera to set exposure when the picture is taken.
0x8824 34852 Photo Exif.Photo.SpectralSensitivity Ascii Indicates the spectral sensitivity of each channel of the camera used. The tag value is an ASCII string compatible with the standard developed by the ASTM Technical Committee.
0x8827 34855 Photo Exif.Photo.ISOSpeedRatings Short Indicates the ISO Speed and ISO Latitude of the camera or input device as specified in ISO 12232.
0x8828 34856 Photo Exif.Photo.OECF Undefined Indicates the Opto-Electoric Conversion Function (OECF) specified in ISO 14524. <OECF> is the relationship between the camera optical input and the image values.
0x8830 34864 Photo Exif.Photo.SensitivityType Short The SensitivityType tag indicates which one of the parameters of ISO12232 is the PhotographicSensitivity tag. Although it is an optional tag, it should be recorded when a PhotographicSensitivity tag is recorded. Value = 4, 5, 6, or 7 may be used in case that the values of plural parameters are the same.
0x8831 34865 Photo Exif.Photo.StandardOutputSensitivity Long This tag indicates the standard output sensitivity value of a camera or input device defined in ISO 12232. When recording this tag, the PhotographicSensitivity and SensitivityType tags shall also be recorded.
0x8832 34866 Photo Exif.Photo.RecommendedExposureIndex Long This tag indicates the recommended exposure index value of a camera or input device defined in ISO 12232. When recording this tag, the PhotographicSensitivity and SensitivityType tags shall also be recorded.
0x8833 34867 Photo Exif.Photo.ISOSpeed Long This tag indicates the ISO speed value of a camera or input device that is defined in ISO 12232. When recording this tag, the PhotographicSensitivity and SensitivityType tags shall also be recorded.
0x8834 34868 Photo Exif.Photo.ISOSpeedLatitudeyyy Long This tag indicates the ISO speed latitude yyy value of a camera or input device that is defined in ISO 12232. However, this tag shall not be recorded without ISOSpeed and ISOSpeedLatitudezzz.
0x8835 34869 Photo Exif.Photo.ISOSpeedLatitudezzz Long This tag indicates the ISO speed latitude zzz value of a camera or input device that is defined in ISO 12232. However, this tag shall not be recorded without ISOSpeed and ISOSpeedLatitudeyyy.
0x9000 36864 Photo Exif.Photo.ExifVersion Undefined The version of this standard supported. Nonexistence of this field is taken to mean nonconformance to the standard.
0x9003 36867 Photo Exif.Photo.DateTimeOriginal Ascii The date and time when the original image data was generated. For a digital still camera the date and time the picture was taken are recorded.
0x9004 36868 Photo Exif.Photo.DateTimeDigitized Ascii The date and time when the image was stored as digital data.
0x9101 37121 Photo Exif.Photo.ComponentsConfiguration Undefined Information specific to compressed data. The channels of each component are arranged in order from the 1st component to the 4th. For uncompressed data the data arrangement is given in the <PhotometricInterpretation> tag. However, since <PhotometricInterpretation> can only express the order of Y, Cb and Cr, this tag is provided for cases when compressed data uses components other than Y, Cb, and Cr and to enable support of other sequences.
0x9102 37122 Photo Exif.Photo.CompressedBitsPerPixel Rational Information specific to compressed data. The compression mode used for a compressed image is indicated in unit bits per pixel.
0x9201 37377 Photo Exif.Photo.ShutterSpeedValue SRational Shutter speed. The unit is the APEX (Additive System of Photographic Exposure) setting.
0x9202 37378 Photo Exif.Photo.ApertureValue Rational The lens aperture. The unit is the APEX value.
0x9203 37379 Photo Exif.Photo.BrightnessValue SRational The value of brightness. The unit is the APEX value. Ordinarily it is given in the range of -99.99 to 99.99.
0x9204 37380 Photo Exif.Photo.ExposureBiasValue SRational The exposure bias. The units is the APEX value. Ordinarily it is given in the range of -99.99 to 99.99.
0x9205 37381 Photo Exif.Photo.MaxApertureValue Rational The smallest F number of the lens. The unit is the APEX value. Ordinarily it is given in the range of 00.00 to 99.99, but it is not limited to this range.
0x9206 37382 Photo Exif.Photo.SubjectDistance Rational The distance to the subject, given in meters.
0x9207 37383 Photo Exif.Photo.MeteringMode Short The metering mode.
0x9208 37384 Photo Exif.Photo.LightSource Short The kind of light source.
0x9209 37385 Photo Exif.Photo.Flash Short This tag is recorded when an image is taken using a strobe light (flash).
0x920a 37386 Photo Exif.Photo.FocalLength Rational The actual focal length of the lens, in mm. Conversion is not made to the focal length of a 35 mm film camera.
0x9214 37396 Photo Exif.Photo.SubjectArea Short This tag indicates the location and area of the main subject in the overall scene.
0x927c 37500 Photo Exif.Photo.MakerNote Undefined A tag for manufacturers of Exif writers to record any desired information. The contents are up to the manufacturer.
0x9286 37510 Photo Exif.Photo.UserComment Comment A tag for Exif users to write keywords or comments on the image besides those in <ImageDescription>, and without the character code limitations of the <ImageDescription> tag.
0x9290 37520 Photo Exif.Photo.SubSecTime Ascii A tag used to record fractions of seconds for the <DateTime> tag.
0x9291 37521 Photo Exif.Photo.SubSecTimeOriginal Ascii A tag used to record fractions of seconds for the <DateTimeOriginal> tag.
0x9292 37522 Photo Exif.Photo.SubSecTimeDigitized Ascii A tag used to record fractions of seconds for the <DateTimeDigitized> tag.
0xa000 40960 Photo Exif.Photo.FlashpixVersion Undefined The FlashPix format version supported by a FPXR file.
0xa001 40961 Photo Exif.Photo.ColorSpace Short The color space information tag is always recorded as the color space specifier. Normally sRGB is used to define the color space based on the PC monitor conditions and environment. If a color space other than sRGB is used, Uncalibrated is set. Image data recorded as Uncalibrated can be treated as sRGB when it is converted to FlashPix.
0xa002 40962 Photo Exif.Photo.PixelXDimension Long Information specific to compressed data. When a compressed file is recorded, the valid width of the meaningful image must be recorded in this tag, whether or not there is padding data or a restart marker. This tag should not exist in an uncompressed file.
0xa003 40963 Photo Exif.Photo.PixelYDimension Long Information specific to compressed data. When a compressed file is recorded, the valid height of the meaningful image must be recorded in this tag, whether or not there is padding data or a restart marker. This tag should not exist in an uncompressed file. Since data padding is unnecessary in the vertical direction, the number of lines recorded in this valid image height tag will in fact be the same as that recorded in the SOF.
0xa004 40964 Photo Exif.Photo.RelatedSoundFile Ascii This tag is used to record the name of an audio file related to the image data. The only relational information recorded here is the Exif audio file name and extension (an ASCII string consisting of 8 characters + '.' + 3 characters). The path is not recorded.
0xa005 40965 Photo Exif.Photo.InteroperabilityTag Long Interoperability IFD is composed of tags which stores the information to ensure the Interoperability and pointed by the following tag located in Exif IFD. The Interoperability structure of Interoperability IFD is the same as TIFF defined IFD structure but does not contain the image data characteristically compared with normal TIFF IFD.
0xa20b 41483 Photo Exif.Photo.FlashEnergy Rational Indicates the strobe energy at the time the image is captured, as measured in Beam Candle Power Seconds (BCPS).
0xa20c 41484 Photo Exif.Photo.SpatialFrequencyResponse Undefined This tag records the camera or input device spatial frequency table and SFR values in the direction of image width, image height, and diagonal direction, as specified in ISO 12233.
0xa20e 41486 Photo Exif.Photo.FocalPlaneXResolution Rational Indicates the number of pixels in the image width (X) direction per <FocalPlaneResolutionUnit> on the camera focal plane.
0xa20f 41487 Photo Exif.Photo.FocalPlaneYResolution Rational Indicates the number of pixels in the image height (V) direction per <FocalPlaneResolutionUnit> on the camera focal plane.
0xa210 41488 Photo Exif.Photo.FocalPlaneResolutionUnit Short Indicates the unit for measuring <FocalPlaneXResolution> and <FocalPlaneYResolution>. This value is the same as the <ResolutionUnit>.
0xa214 41492 Photo Exif.Photo.SubjectLocation Short Indicates the location of the main subject in the scene. The value of this tag represents the pixel at the center of the main subject relative to the left edge, prior to rotation processing as per the <Rotation> tag. The first value indicates the X column number and second indicates the Y row number.
0xa215 41493 Photo Exif.Photo.ExposureIndex Rational Indicates the exposure index selected on the camera or input device at the time the image is captured.
0xa217 41495 Photo Exif.Photo.SensingMethod Short Indicates the image sensor type on the camera or input device.
0xa300 41728 Photo Exif.Photo.FileSource Undefined Indicates the image source. If a DSC recorded the image, this tag value of this tag always be set to 3, indicating that the image was recorded on a DSC.
0xa301 41729 Photo Exif.Photo.SceneType Undefined Indicates the type of scene. If a DSC recorded the image, this tag value must always be set to 1, indicating that the image was directly photographed.
0xa302 41730 Photo Exif.Photo.CFAPattern Undefined Indicates the color filter array (CFA) geometric pattern of the image sensor when a one-chip color area sensor is used. It does not apply to all sensing methods.
0xa401 41985 Photo Exif.Photo.CustomRendered Short This tag indicates the use of special processing on image data, such as rendering geared to output. When special processing is performed, the reader is expected to disable or minimize any further processing.
0xa402 41986 Photo Exif.Photo.ExposureMode Short This tag indicates the exposure mode set when the image was shot. In auto-bracketing mode, the camera shoots a series of frames of the same scene at different exposure settings.
0xa403 41987 Photo Exif.Photo.WhiteBalance Short This tag indicates the white balance mode set when the image was shot.
0xa404 41988 Photo Exif.Photo.DigitalZoomRatio Rational This tag indicates the digital zoom ratio when the image was shot. If the numerator of the recorded value is 0, this indicates that digital zoom was not used.
0xa405 41989 Photo Exif.Photo.FocalLengthIn35mmFilm Short This tag indicates the equivalent focal length assuming a 35mm film camera, in mm. A value of 0 means the focal length is unknown. Note that this tag differs from the <FocalLength> tag.
0xa406 41990 Photo Exif.Photo.SceneCaptureType Short This tag indicates the type of scene that was shot. It can also be used to record the mode in which the image was shot. Note that this differs from the <SceneType> tag.
0xa407 41991 Photo Exif.Photo.GainControl Short This tag indicates the degree of overall image gain adjustment.
0xa408 41992 Photo Exif.Photo.Contrast Short This tag indicates the direction of contrast processing applied by the camera when the image was shot.
0xa409 41993 Photo Exif.Photo.Saturation Short This tag indicates the direction of saturation processing applied by the camera when the image was shot.
0xa40a 41994 Photo Exif.Photo.Sharpness Short This tag indicates the direction of sharpness processing applied by the camera when the image was shot.
0xa40b 41995 Photo Exif.Photo.DeviceSettingDescription Undefined This tag indicates information on the picture-taking conditions of a particular camera model. The tag is used only to indicate the picture-taking conditions in the reader.
0xa40c 41996 Photo Exif.Photo.SubjectDistanceRange Short This tag indicates the distance to the subject.
0xa420 42016 Photo Exif.Photo.ImageUniqueID Ascii This tag indicates an identifier assigned uniquely to each image. It is recorded as an ASCII string equivalent to hexadecimal notation and 128-bit fixed length.
0xa430 42032 Photo Exif.Photo.CameraOwnerName Ascii This tag records the owner of a camera used in photography as an ASCII string.
0xa431 42033 Photo Exif.Photo.BodySerialNumber Ascii This tag records the serial number of the body of the camera that was used in photography as an ASCII string.
0xa433 42035 Photo Exif.Photo.LensMake Ascii This tag records the lens manufactor as an ASCII string.
0xa434 42036 Photo Exif.Photo.LensModel Ascii This tag records the lens's model name and model number as an ASCII string.
0xa435 42037 Photo Exif.Photo.LensSerialNumber Ascii This tag records the serial number of the interchangeable lens that was used in photography as an ASCII string.
0x0001 1 Iop Exif.Iop.InteroperabilityIndex Ascii Indicates the identification of the Interoperability rule. Use "R98" for stating ExifR98 Rules. Four bytes used including the termination code (NULL). see the separate volume of Recommended Exif Interoperability Rules (ExifR98) for other tags used for ExifR98.
0x0000 0 GPSInfo Exif.GPSInfo.GPSVersionID Byte Indicates the version of <GPSInfoIFD>. The version is given as 2.0.0.0. This tag is mandatory when <GPSInfo> tag is present. (Note: The <GPSVersionID> tag is given in bytes, unlike the <ExifVersion> tag. When the version is 2.0.0.0, the tag value is 02000000.H).
0x0001 1 GPSInfo Exif.GPSInfo.GPSLatitudeRef Ascii Indicates whether the latitude is north or south latitude. The ASCII value 'N' indicates north latitude, and 'S' is south latitude.
0x0002 2 GPSInfo Exif.GPSInfo.GPSLatitude Rational Indicates the latitude. The latitude is expressed as three RATIONAL values giving the degrees, minutes, and seconds, respectively. When degrees, minutes and seconds are expressed, the format is dd/1,mm/1,ss/1. When degrees and minutes are used and, for example, fractions of minutes are given up to two decimal places, the format is dd/1,mmmm/100,0/1.
0x0003 3 GPSInfo Exif.GPSInfo.GPSLongitudeRef Ascii Indicates whether the longitude is east or west longitude. ASCII 'E' indicates east longitude, and 'W' is west longitude.
0x0004 4 GPSInfo Exif.GPSInfo.GPSLongitude Rational Indicates the longitude. The longitude is expressed as three RATIONAL values giving the degrees, minutes, and seconds, respectively. When degrees, minutes and seconds are expressed, the format is ddd/1,mm/1,ss/1. When degrees and minutes are used and, for example, fractions of minutes are given up to two decimal places, the format is ddd/1,mmmm/100,0/1.
0x0005 5 GPSInfo Exif.GPSInfo.GPSAltitudeRef Byte Indicates the altitude used as the reference altitude. If the reference is sea level and the altitude is above sea level, 0 is given. If the altitude is below sea level, a value of 1 is given and the altitude is indicated as an absolute value in the GSPAltitude tag. The reference unit is meters. Note that this tag is BYTE type, unlike other reference tags.
0x0006 6 GPSInfo Exif.GPSInfo.GPSAltitude Rational Indicates the altitude based on the reference in GPSAltitudeRef. Altitude is expressed as one RATIONAL value. The reference unit is meters.
0x0007 7 GPSInfo Exif.GPSInfo.GPSTimeStamp Rational Indicates the time as UTC (Coordinated Universal Time). <TimeStamp> is expressed as three RATIONAL values giving the hour, minute, and second (atomic clock).
0x0008 8 GPSInfo Exif.GPSInfo.GPSSatellites Ascii Indicates the GPS satellites used for measurements. This tag can be used to describe the number of satellites, their ID number, angle of elevation, azimuth, SNR and other information in ASCII notation. The format is not specified. If the GPS receiver is incapable of taking measurements, value of the tag is set to NULL.
0x0009 9 GPSInfo Exif.GPSInfo.GPSStatus Ascii Indicates the status of the GPS receiver when the image is recorded. "A" means measurement is in progress, and "V" means the measurement is Interoperability.
0x000a 10 GPSInfo Exif.GPSInfo.GPSMeasureMode Ascii Indicates the GPS measurement mode. "2" means two-dimensional measurement and "3" means three-dimensional measurement is in progress.
0x000b 11 GPSInfo Exif.GPSInfo.GPSDOP Rational Indicates the GPS DOP (data degree of precision). An HDOP value is written during two-dimensional measurement, and PDOP during three-dimensional measurement.
0x000c 12 GPSInfo Exif.GPSInfo.GPSSpeedRef Ascii Indicates the unit used to express the GPS receiver speed of movement. "K" "M" and "N" represents kilometers per hour, miles per hour, and knots.
0x000d 13 GPSInfo Exif.GPSInfo.GPSSpeed Rational Indicates the speed of GPS receiver movement.
0x000e 14 GPSInfo Exif.GPSInfo.GPSTrackRef Ascii Indicates the reference for giving the direction of GPS receiver movement. "T" denotes true direction and "M" is magnetic direction.
0x000f 15 GPSInfo Exif.GPSInfo.GPSTrack Rational Indicates the direction of GPS receiver movement. The range of values is from 0.00 to 359.99.
0x0010 16 GPSInfo Exif.GPSInfo.GPSImgDirectionRef Ascii Indicates the reference for giving the direction of the image when it is captured. "T" denotes true direction and "M" is magnetic direction.
0x0011 17 GPSInfo Exif.GPSInfo.GPSImgDirection Rational Indicates the direction of the image when it was captured. The range of values is from 0.00 to 359.99.
0x0012 18 GPSInfo Exif.GPSInfo.GPSMapDatum Ascii Indicates the geodetic survey data used by the GPS receiver. If the survey data is restricted to Japan, the value of this tag is "TOKYO" or "WGS-84".
0x0013 19 GPSInfo Exif.GPSInfo.GPSDestLatitudeRef Ascii Indicates whether the latitude of the destination point is north or south latitude. The ASCII value "N" indicates north latitude, and "S" is south latitude.
0x0014 20 GPSInfo Exif.GPSInfo.GPSDestLatitude Rational Indicates the latitude of the destination point. The latitude is expressed as three RATIONAL values giving the degrees, minutes, and seconds, respectively. If latitude is expressed as degrees, minutes and seconds, a typical format would be dd/1,mm/1,ss/1. When degrees and minutes are used and, for example, fractions of minutes are given up to two decimal places, the format would be dd/1,mmmm/100,0/1.
0x0015 21 GPSInfo Exif.GPSInfo.GPSDestLongitudeRef Ascii Indicates whether the longitude of the destination point is east or west longitude. ASCII "E" indicates east longitude, and "W" is west longitude.
0x0016 22 GPSInfo Exif.GPSInfo.GPSDestLongitude Rational Indicates the longitude of the destination point. The longitude is expressed as three RATIONAL values giving the degrees, minutes, and seconds, respectively. If longitude is expressed as degrees, minutes and seconds, a typical format would be ddd/1,mm/1,ss/1. When degrees and minutes are used and, for example, fractions of minutes are given up to two decimal places, the format would be ddd/1,mmmm/100,0/1.
0x0017 23 GPSInfo Exif.GPSInfo.GPSDestBearingRef Ascii Indicates the reference used for giving the bearing to the destination point. "T" denotes true direction and "M" is magnetic direction.
0x0018 24 GPSInfo Exif.GPSInfo.GPSDestBearing Rational Indicates the bearing to the destination point. The range of values is from 0.00 to 359.99.
0x0019 25 GPSInfo Exif.GPSInfo.GPSDestDistanceRef Ascii Indicates the unit used to express the distance to the destination point. "K", "M" and "N" represent kilometers, miles and knots.
0x001a 26 GPSInfo Exif.GPSInfo.GPSDestDistance Rational Indicates the distance to the destination point.
0x001b 27 GPSInfo Exif.GPSInfo.GPSProcessingMethod Undefined A character string recording the name of the method used for location finding. The first byte indicates the character code used, and this is followed by the name of the method.
0x001c 28 GPSInfo Exif.GPSInfo.GPSAreaInformation Undefined A character string recording the name of the GPS area. The first byte indicates the character code used, and this is followed by the name of the GPS area.
0x001d 29 GPSInfo Exif.GPSInfo.GPSDateStamp Ascii A character string recording date and time information relative to UTC (Coordinated Universal Time). The format is "YYYY:MM:DD.".
0x001e 30 GPSInfo Exif.GPSInfo.GPSDifferential Short Indicates whether differential correction is applied to the GPS receiver. | 2019-04-24T12:00:58Z | https://www.exiv2.org/tags.html |
, NURHALIMAH (2018) PENGARUH METODE EKSPERIMEN TERHADAP KETERAMPILAN PROSES SAINS ANAK USIA 5-6 TAHUN DI TK PANCA BUDI KECAMATAN MEDAN SUNGGAL T.A 2017/2018. Undergraduate thesis, UNIMED.
, KHAIRUNA (2018) PENGARUH MODEL PEMBELAJARAN INKUIRI TERBIMBING TERHADAP KETERAMPILAN PROSES SAINS SISWA PADA MATERI POKOK ELASTISITAS DAN HUKUM HOOKE DI MAN 2 MODEL MEDAN. Undergraduate thesis, UNIMED.
Azmi, Sri Rezki Maulina (2014) PENERAPAN PENDEKATAN KONSTRUKTIVISME DENGAN MODEL PEMBELAJARAN KOOPERATIF TIPE NUMBERED HEAD TOGETHER (NHT) UNTUK MENINGKATKAN AKTIVITAS DAN HASIL BELAJAR SAINS SISWA DI KELAS V SD NEGERI 010145 LABUHAN RUKU. Masters thesis, UNIMED.
Andriyani, Mira (2014) UPAYA MENINGKATKAN AKTIVITAS DAN HASIL BELAJAR SISWA PADA PEMBELAJARAN IPA MENGGUNAKAN PENDEKATAN SAINTIFIK SISWA KELAS V SD SWASTA SABILINA TEMBUNG T.P 2013-2014. Masters thesis, UNIMED.
Angkat, Anni (2012) PENGARUH STRATEGI PEMBELAJARAN TERHADAP KETERAMPILAN PROSES SAINS, SIKAP ILMIAH DAN HASIL BELAJAR SISWA TENTANG EKOLOGI DI SMK NEGERI PENANGGALAN KOTA SUBULUSSALAM. Masters thesis, UNIMED.
Aswad, Halimah Hajar (2017) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PRACTICE REHEARSAL PAIRS PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI 104204 SAMBIREJO TIMUR T.A 2016/2017. Undergraduate thesis, UNIMED.
ARITONANG, WINDA RAMA BARU (2018) THE EFFECT OF INQUIRY TRAINING LEARNING MODEL TO STUDENT'S SCIENCE PROCESS SKILLS ON HARMONIC VIBRATION TOPIC FOR CLASS X SMA N 2 KISARAN A.Y. 2017/2018. Undergraduate thesis, UNIMED.
ANDRIANI, SUCI (2018) PENGARUH MODEL PEMBELAJARAN SCIENTIFIC INQUIRY TERHADAP KETERAMPILAN PROSES SAINS SISWA KELAS XI PADA MATERI ELASTISITAS ZAT PADAT DAN HUKUM HOOKE DI SMA SWASTA DHARMA PANCASILA MEDAN. Undergraduate thesis, UNIMED.
Abubakar, (2015) PENERAPAN PEMBELAJARAN BERBASIS MASALAH DAN PENINGKATAN KETERAMPILAN BERPIKIR TINGKAT TINGGI MATA KULIAH FISIKA UMUM I MAHASISWA SEMESTER I PROGRAM STUDI PENDIDIKAN BIOLOGI PROGRAM EKSTENSI B FMIPA UNIVERSITAS NEGERI MEDAN TAHUN AKADEMIK 2014/2015. Masters thesis, UNIMED.
Agustina, Nurhayati (2017) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN EXPLICIT INSTRUCTION PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 104208 CINTA RAKYAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Aisyah, Siti (2018) MODEL PEMBELAJARAN INKUIRI TERBIMBING TERHADAP KETERAMPILAN PROSES SAINS DAN KEMAMPUAN KOGNITIF IPA SISWA KELAS VI SD NEGERI 104198 PAYA BAKUNG HAMPARAN PERAK KABUPATEN DELI SERDANG. Masters thesis, UNIMED.
Aminah, Siti (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DAN KEMAMPUAN BERPIKIR LOGIS TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Anggreini, Sinta (2017) PENGARUH MODEL PEMBELAJARAN KOOPERATIF TIPE STAD (STUDENT TEAMS ACHIEVEMENT DIVISION) TERHADAP HASIL BELAJAR IPA KELAS IV SD NEGERI 101819 PANCUR BATU KABUPATEN DELI SERDANG TAHUN PELAJARAN 2016/2017. Undergraduate thesis, UNIMED.
Angraini, Nia Devi (2017) MENINGKATKAN HASIL BELAJAR IPA SISWA MELALUI METODE PEMBELAJARAN PENEMUAN TERBIMBING DI KELAS V SD NEGERI 106172 TUNTUNGAN KECAMATAN PANCUR BATU KABUPATEN DELI SERDANG T.A 2016/2017. Undergraduate thesis, UNIMED.
Bahrin, (2013) PENGGUNAAN PENDEKATAN PAILKEM UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA KELAS IV SDN PUTRI BETUNG KAB. GAYO LUES T.A 2012/2013. Undergraduate thesis, UNIMED.
Bako, Sahridun makdin (2016) SUPAYA MENINGKATKAN KEMAMPUAN DAYA CERNA SISWA MENGGUNAKAN MODEL DEMONSTRASI PADA MATA PELAJARAN IPA POKOK BAHASAN BERBAGAI FENOMENA ALAM SERTA EFEKNYA BAGI MAHLUK HIDUP DAN LINGKUNGAN. DI KELAS V SD NEGERI. KUTA ONAN T.P. 2015 / 2016. Undergraduate thesis, UNIMED.
Bancin, Royment Sabil (2017) PENERAPAN MODEL PEMBELAJARAN PAIR CHECKS UNTUK MENINGKATKAN HASIL BELAJAR IPA KELAS V SD NEGERI 106162 MEDAN ESTATE T.A 2016/1017. Undergraduate thesis, UNIMED.
Banjarnahor, nestimala (2017) MENINGKATKAN MINAT BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN METODE PEMBELAJARAN LEARNING START WITH A QUESTION DI KELAS III-A SD NEGERI 064025 TANJUNG SELAMAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Barus, Rany Elisa (2016) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN INDEX CARD MATCH PADA MATA PELAJARAN IPA DI KELAS IV SDN 101776 SAMPALI T. A 2015/ 2016. Undergraduate thesis, UNIMED.
Batubara, Melvariani Syari (2016) PENGEMBANGAN VIDEO PEMBELAJARAN MATA KULIAH KULTUR JARINGAN BERBASIS MASALAH. Masters thesis, UNIMED.
Boangmanalu, Minar (2016) UPAYA MENINGKATAN MINAT BELAJAR SISWA PADA MATA PELAJARAN PKN MENGGUNAKAN MODEL PEMBELAJARAN JIGSAW DI KELAS IV SD NEGERI 030429 JAMBU T.P 2015/2016. Undergraduate thesis, UNIMED.
Butar-Butar, Elisa Debora Naftaliana (2017) STUDI TENTANG IMPLEMENTASI KETERAMPILAN BERTANYA GURU DALAM MATA PELAJARAN IPA KELAS V SD NEGERI SE-KECAMATAN BINJAI SELATAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Capah, Elma Dewi Novia (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN TAKE AND GIVE PADA MATA PELAJARAN IPA POKOK BAHASAN PERNAFASAN KELAS V SD NEGERI 101766 DELI SERDANG. Undergraduate thesis, UNIMED.
Cibro, Nurul Ain A.K. (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DAN KEMAMPUAN BERPIKIR KREATIF TERHADAP KETERAMPILAN PROSES SAINS SISWA MTS. Masters thesis, UNIMED.
Damanik, Ramika Suryadini (2013) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN METODE KERJA KELOMPOK PADA MATA PELAJARAN IPS KELAS IV SD NEGERI NO. 091324 MEREK RAYA TAHUN PELAJARAN 2011/2012. Undergraduate thesis, UNIMED.
Dalimunthe, Syadwina Hamama (2012) THE EFFECT OF CROSSWORD PUZZLE ON STUDENTS ACADEMIC ENGLISH MASTERY AND LEARNING OUTCOMES FOR ENVIRONMENTAL MANAGEMENT TOPIC FOR GRADE VII SMP NEGERI 1 MEDAN ACADEMIC YEAR 2011/2012. Undergraduate thesis, UNIMED.
Dalimunthe, Erpina Dewi (2017) MENINGKATKAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN VISUALIZATION, AUDITORY, KINESTETIC (VAK) PADA MATA PELAJARAN IPA MATERI CAHAYA DAN SIFAT-SIFATNYA KELAS V SD NEGERI 060900 MEDAN JOHOR T.A 2016/2017. Undergraduate thesis, UNIMED.
Dalimunthe, Jumlia Syaulani Rizki (2017) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS PADA PEMBELAJARAN FISIKA. Undergraduate thesis, UNIMED.
Damanik, Erlinawati (2016) PENGARUH PENDEKATAN PEMBELAJARAN KONTEKSTUAL DAN MOTIVASI BELAJAR TERHADAP HASIL BELAJAR PESERTA DIDIK DALAM ILMU PENGETAHUAN ALAM KELAS IV SEKOLAH DASAR SWASTA MUHAMMADIYAH 01 KOTA PEMATANGSIANTAR. Masters thesis, UNIMED.
Damanik, Risjunardi (2016) PENGARUH MODEL PEMBELAJARAN KOOPERTIF TERHADAP KEMAMPUAN BERPIKIR KRITIS, SIKAP ILMIAH DAN KEMAMPUAN MENGKOMUNIKASIKAN HASIL KARYA SAINS PADA MATA KULIAH EKOLOGI HEWAN MAHASISWA UNIVERSITAS SIMALUNGUN. Masters thesis, UNIMED.
Danur, Dessy Wulandary (2017) PENERAPAN MODEL PEMBELAJARAN CARD SORT DALAM MENINGKATKAN MOTIVASI BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS III SDN 104204 SAMBIREJO TIMUR T.A. 2016 / 2017. Undergraduate thesis, UNIMED.
Dewi, Silvia Mutiara (2016) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL WORD SQUARE DI KELAS IV SD NEGERI NO. 105291 SAENTIS TAHUN AJARAN 2015/2016. Undergraduate thesis, UNIMED.
Dewi, Tisrin Maulina and Hasruddin, and Sudibyo, Mufti (2017) PENGEMBANGAN MODUL PENCEMARAN LINGKUNGAN BERBASIS ISLAM-SAINS UNTUK SISWA KELAS X MADRASAH ALIYAH/MA. In: Prosiding Seminar Nasional III Biologi dan Pembelajarannya, 8 September 2017, Universitas Negeri Medan.
Dillah, Kenny Istiah (2017) PENERAPAN MODEL PEMBELAJARAN GUIDED INQUIRY UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DI KELAS V SDN 101765 BANDAR SETIA T.A 2016/2017. Undergraduate thesis, UNIMED.
Dongoran, Herawati (2015) PENGARUH MODEL PEMBELAJARAN DAN SELF EFFICACY TERHADAP KEMAMPUAN PEMECAHAN MASALAH DAN KETERAMPILAN PROSES SAINS SISWA PADA MATERI SISTEM EKSKRESI DI MAN 1 MEDAN. Masters thesis, UNIMED.
Dwi, Dara Fitrah (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING MENGGUNAKAN MIND MAPPING DAN MOTIVASI TERHADAP KETERAMPILAN PROSES SAINS FISIKA. Masters thesis, UNIMED.
Endah, Sarwo (2013) MENINGKATKAN HASIL BELAJAR SISWA MELALUI PENDEKATAN LINGKUNGAN PADA MATA PELAJARAN SAINS KELAS IV SD NEGERI 050596 KUTA PARIT KEC. SELESAI T.A. 2012/2013. Undergraduate thesis, UNIMED.
Fajri, Rahmi (2017) PERBEDAAN METODE PEMBELAJARAN PROBLEM SOLVING DENGAN METODE CERAMAH TERHADAP HASIL BELAJAR IPA SISWA DI KELAS IV SD NEGERI 112143 RANTAU UTARA T.P 2016/2017. Undergraduate thesis, UNIMED.
Fadillah, Eva (2015) PENERAPAN MODEL PROBLEM BASED LEARNING (PBL) TERINTEGRASI MODEL GUIDED INQURY (GI) DENGAN MEDIA BERBASIS KOMPUTER PADA PEMBELAJARAN HIDROLISIS GARAM UNTUK MENINGKATKAN KARAKTER DAN HASIL BELAJAR SISWA SMA KELAS XI IPA DI KOTA MEDAN. Masters thesis, UNIMED.
Fatimah, Ade Evi (2015) PENINGKATAN KEMAMPUAN PEMECAHAN MASALAH MATEMATIS DAN KEMANDIRIAN BELAJAR SISWA SMK NEGERI 1 PERCUT SEI TUAN MELALUI PENDEKATAN DIFFERENTIATED INSTRUCTION. Masters thesis, UNIMED.
Febriyanti, Yohanna (2016) PENGARUH PROGRAM ADIWIYATA TERHADAP PENGETAHUAN DAN SIKAP PEDULI LINGKUNGAN HIDUP SISWA DI SMA NEGERI KOTA MEDAN. Masters thesis, UNIMED.
Firiani, (2018) ANALISIS KEMAMPUAN LITERASI SAINS BIOLOGI SISWA SMA KELAS XI IPA SE-KABUPATEN ACEH TAMIANG. Masters thesis, UNIMED.
Fitri, Astri Mardya (2016) HUBUNGAN ANTARA FASILITAS BELAJAR DENGAN MINAT BELAJAR SISWA PADA MATA PELAJARAN IPA SD NEGERI 101759 TANDAM HILIR 1. Undergraduate thesis, UNIMED.
Fitri, Rika Yulia (2016) EFEK MODEL PROBLEM BASED LEARNING DAN ADVERSITY QUOTIENT TERHADAP KEMAMPUAN PEMECAHAN MASALAH FISIKA SISWA DI SMA. Masters thesis, UNIMED.
Ginting Munte, Sri Rahayu (2014) PENINGKATAN HASIL BELAJAR IPA MATERI CAHAYA DENGAN MENERAPKAN METODE INKUIRI SISWA KELAS VIII-B MTSN HAMPARAN PERAK KABUPATEN DELI SERDANG. Masters thesis, UNIMED.
Ginting, Damenta Br. (2015) PENGARUH MEDIA PEMBELAJARAN BERBASIS KOMPUTER DAN MOTIVASI BERPRESTASI TERHADAP HASIL BELAJAR IPA SISWA SD NEGERI NO.104218 SIDOMULYO TAHUN PELAJARAN 2013/2014. Masters thesis, UNIMED.
Ginting, Lidiya Kanda Br. (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN GROUP INVESTIGATION DI KELAS IV SD NEGERI 105300 SUKA MAKMUR KAB. DELI SERDANG TAHUN PELAJARAN 2016 / 2017. Undergraduate thesis, UNIMED.
Ginting, Susanna (2016) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN NUMBERED HEADS TOGETHER DI KELAS V SD NEGERI 101771 TEMBUNG KECAMATAN PERCUT SEI TUAN T.A 2015/2016”. Undergraduate thesis, UNIMED.
Gita, Nindy (2015) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DENGAN MENGGUNAKAN METODE EKSPERIMEN DI KELAS V SD NEGERI 101778 MEDAN ESTATE KEC. PERCUT SEI TUAN T.A 2014/2015. Undergraduate thesis, UNIMED.
Gowasa, Suwisnawati (2015) PENGARUH PENGGUNAAN MEDIA POWER POINT DAN MEDIA VIDEO PEMBELAJARAN TERHADAP KEMAMPUAN BERPIKIR TINGKAT TINGGI DAN RITENSI MEMORI SISWA PADA MATA PELAJARAN IPA DI KELAS V SD SWASTA RK NO.3 KOTA SIBOLGA. Masters thesis, UNIMED.
Gulo, Yostinus (2016) UPAYA MENINGKATKAN HASIL BELAJAR SISWA TENTANG KONDUKTOR DAN ISOLATOR PANAS DENGAN METODE DEMONSTRASI PADA SISWA KELAS VI SDN NO. 078494 TUHENDRAOWI TP. 2015/2016. Undergraduate thesis, UNIMED.
Gultom, Rose Verawati (2017) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS SISWA PADA MATERI TEORI KINETIK GAS DI KELAS XI SEMESTER II SMA NEGERI 10 MEDAN T.A. 2015/2016. Undergraduate thesis, UNIMED.
Hasanah, Uswatun (2008) PENGARUH MODEL PEMBELAJARAN DAN KREATIVITAS TERHADAP HASIL BELAJAR IPA SISWA KELAS III SEKOLAH DASAR. Masters thesis, UNIMED.
Hutajulu, Ernita N (2013) PERBEDAAN HASIL BELAJAR IPA PADA SISWA KELAS IV YANG DIAJARKAN DENGAN MENGGUNAKAN METODE DISCOVERY DAN METODE THINK PAIR SHARE (TPS) DI SD NEGERI NO 101880 TANJUNG MORAWA TP 2012/2013. Undergraduate thesis, UNIMED.
Hasibuan, Ernita Nuriah (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN TAKE AND GIVE PADA MATA PELAJARAN IPA MATERI SIFAT-SIFAT CAHAYA DI KELAS V SD NEGERI 101875 BATANG KUIS T.A 2012/2013. Undergraduate thesis, UNIMED.
Harahap, Siti Noranijah (2014) STUDI KOMPETENSI PEDAGOGIK GURU BIOLOGI BERSERTIFIKAT PENDIDIK DI SMA NEGERI KOTA MADYA PEMATANG SIANTAR. Undergraduate thesis, UNIMED.
Hakim, Luqmanul (2014) THE EFFECT OF HARD WORK CHARACTER AND PROBLEM BASED LEARNING MODEL TOWARD PHYSICS LEARNING OUTCOMES STUDENTS AT SMPN 4 SEI SUKA. Undergraduate thesis, UNIMED.
Huda, Fitri Nur (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL SYNDICATE GROUP PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 106150 TANDAM HULU I T.A 2016/2017. Undergraduate thesis, UNIMED.
Hartati, (2017) PERBEDAAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN METODE PEMBELAJARAN ROLE PLAYING DAN METODE CERAMAH DI KELAS V SD NEGERI 105300 SUKA MAKMUR TA. 2016/2017. Undergraduate thesis, UNIMED.
Handayani, Usi Kuswuri (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN LEARNING STARTS A QUESTION (LSQ) PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 050615 NAMU UKUR KECAMATAN SEI BINGAI T.A 2016/20217. Undergraduate thesis, UNIMED.
HUSNA, KHAIZURA (2018) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS PADA MATERI POKOK USAHA DAN ENERGI DI KELAS X SMA N 1 SUNGGAL T.P 2017/2018. Undergraduate thesis, UNIMED.
Haer, Afnizar (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF TIPE TWO STAY TWO STRAY (TSTS) PADA PELAJARAN IPA DI KELAS V SDN NO 050615 NAMU UKUR T.A 2016/2017. Undergraduate thesis, UNIMED.
Hafsah, Siti (2016) PENGGUNAAN MODEL PEMBELAJARAN LEARNING STARTS WITH A QUESTION UNTUK MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS V SDN 057203 STABAT KAB.LANGKAT T.A 2015-2016. Undergraduate thesis, UNIMED.
Hairina, (2015) PENGEMBANGAN BAHAN AJAR KIMIA INTERAKTIF BERBASIS WEB PADA MATERI POKOK LARUTAN ASAM BASA. Masters thesis, UNIMED.
Hamdani, (2017) MENINGKATKAN PEMAHAMAN KONSEP SAINS MELALUI METODE DISCOVERY LEARNING DENGAN BANTUAN AUDIO VISUAL TERHADAP HASIL BELAJAR SISWA. In: Seminar Nasional Tahunan Pendidikan Ilmu-Ilmu Sosial, 20 Oct 2017, Medan.
Harahap, Agus Azhar (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING BERBASIS COLLABORATIVE TERHADAP KETERAMPILAN PROSES SAINS DAN KOGNITIF SISWA SMK NEGERI 1 ANGKOLA TIMUR KABUPATEN TAPSEL T.A 2014 / 2015. Masters thesis, UNIMED.
Harahap, Daulat Marulitua (2015) PENGARUH MODEL PEMBELAJARAN TERHADAP KETERAMPILAN PROSES SAINS, SIKAP ILMIAH, DAN HASIL BELAJAR IPA SISWA SMP NEGERI 8 PADANGSIDIMPUAN. Masters thesis, UNIMED.
Harahap, Rita Sari Indah (2018) PENGEMBANGAN PERANGKAT PEMBELAJARAN FISIKA DENGAN MODEL PEMBELAJARAN KOOPERATIF BERBASIS BUDAYA BATAK UNTUK MENINGKATKAN KETERAMPILAN GENERIK SAINS DAN KERJA SAMA SISWA. Masters thesis, UNIMED.
Hasanah, Nina (2015) UPAYA MENINGKATKAN AKTIVITAS DAN HASIL BELAJAR IPA SISWA KELAS IV MELALUI PENERAPAN MODEL INKUIRI TERBIMBING DI MIN SEI MATI MEDAN LABUHAN TAHUN AJARAN 2014/2015. Masters thesis, UNIMED.
Hasanah, Shafiatun (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARANCOOPERATIVE LEARNING TIPEBAMBOO DANCINGPADA PELAJARANIPA DI KELAS IV SD NEGERI 101776 SAMPALITAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Hasibuan, Desi Seprina Yanti (2016) PENGARUH PEMANFAATAN MEDIA TIGA DIMENSI TERHADAP PEMAHAMAN SISWA TENTANG MATERI PESAWAT SEDERHANA PADA PEMBELAJARAN IPA KELAS V SD NEGERI 101775 SAMPALI T.A 2015/2016. Undergraduate thesis, UNIMED.
Hasibuan, Ilham Makmur (2017) PENGARUH PEMBELAJARAN DENGAN MENGGUNAKAN METODE TUTOR SEBAYA (PEER TEACHING) TERHADAP HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA KELAS IV SD NEGERI 108075 DELITUA BARAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Hasibuan, Vivi Uvaira (2016) ANALISIS KESULITAN GURU DAN PENGUASAAN PERANGKAT PEMBELAJARAN MATERI TUMBUHAN HIJAU DI SDN SE-KECAMATAN PERBAUNGAN. Masters thesis, UNIMED.
Hasugian, Erlina Contesa (2016) UPAYA MENINGKATKAN HASIL BELAJAR IPA DENGAN MENGGUNAKAN METODE DEMONSTRASI PADA SISWA KELAS IV SDN NO.030429 JAMBU KECAMATAN SIEMPAT RUBE KAB.PAKPAK BHARAT T.A 2015/2016. Undergraduate thesis, UNIMED.
Hidayani, Arini (2016) PENGEMBANGAN PERANGKAT PEMBELAJARAN BERBASIS MASALAH UNTUK MENINGKATKAN KEMAMPUAN PEMECAHAN MASALAH PADA MATERI DINAMIKA ROTASI. Masters thesis, UNIMED.
Hifni, Muhammad (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING MENGGUNAKAN MEDIA MACROMEDIA FLASH TERHADAP TERHADAP KETERAMPILAN PROSES SAINS DAN KEMAMPUAN BERPIKIR LOGIS SISWA KELAS VIII MTSN BINJAI. Masters thesis, UNIMED.
Hulu, Siska Enjelin (2016) PENGGUNAAN MODEL PEMBELAJARAN PRACTICE REHEARSAL PAIRS UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 023903 BINJAI. Undergraduate thesis, UNIMED.
Husna, Diah Hafizhotul (2017) MENINGKATKAN KEMAMPUAN SISWA DALAM MATERI SUMBER DAYA ALAM DENGAN MENGGUNAKAN METODE PROBLEM BASED LEARNING. In: Seminar Nasional Tahunan Fakultas Ilmu Sosial Universitas Negeri Medan Tahun 2017, 17 May 2017, Medan.
Husna, Diah Hafizhotul (2018) PENGEMBANGAN BAHAN AJAR IPA BERBASIS SAINS TEKNOLOGI MASYARAKAT (STM) DAN PENGARUHNYA TERHADAP HASIL BELAJAR SISWA KELAS IV MIN MEDAN TEMBUNG. Masters thesis, UNIMED.
Hutagalung, Adriyanto (2016) PENERAPAN METODE DEMONSTRASI UNTUK MENINGKATKAN HASIL BELAJAR SAINS KELAS IV SD NEGERI 173444 PARBOTIHAN KECAMATAN ONAN GANJANG KABABUPATEN HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Hutapea, Fitriningsih (2016) ANALISIS DAN PENGEMBANGAN PENUNTUN PRAKTIKUM KIMIA SMA INOVATIF KELAS XI MATERI TERMOKIMIA SESUAI KURIKULUM 2013. Masters thesis, UNIMED.
harahap, Nurhaziza (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PRACTICE REHEARSEL PAIRS (PRAKTIK BERPASANGAN) PADA MATERI GAYA DI KELAS V SD NEGERI 101766 BANDAR SETIA T. A 2016/ 2017. Undergraduate thesis, UNIMED.
Iriani, Khalida (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN METODE NON DIRECTIVE PADA PELAJARAN IPA PADA SISWA KELAS III SDN 104214 DELITUA. Undergraduate thesis, UNIMED.
IRAWAN, CATHERINE (2018) EFEKTIVITAS PEMBELAJARAN BIOLOGI BERBASIS PENDEKATAN SAINTIFIK TERHADAP HASIL BELAJAR SISWA PADA MATERI KEANEKARAGAMAN HAYATI DI KELAS X SMA SWASTA AHMAD YANI BINJAI T.P2018/2019. Undergraduate thesis, UNIMED.
Ichsan, Muhammad (2016) PERBEDAAN PENINGKATAN KEMAMPUAN PEMECAHAN MASALAH DAN BELIEF SISWA ANTARA SISWA YANG DIBERI PMR DENGAN PBM DI SD N 1 TRIENGGADENG KABUPATEN PIDIE JAYA PROVINSI ACEH. Masters thesis, UNIMED.
Ilham,, M. Nasrul (2016) PENERAPAN MODEL SCRAMBLE UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN SAINS KELAS V SD NEGERI 020267 BINJAI KOT. Undergraduate thesis, UNIMED.
Indarianni, (2016) PENGEMBANGAN PENUNTUN PRAKTIKUM MIKROBIOLOGI BERBASIS INKUIRI KONTEKSTUAL PADA MAHASISWA PENDIDIKAN BIOLOGI FMIPA UNIVERSITAS NEGERI MEDAN. Masters thesis, UNIMED.
Irwardhani, Selly (2015) PENGARUH MODEL PEMBELAJARAN INKUIRI TERBIMBING DAN KREATIVITAS TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Janiar, Pristi (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGANMETODE BRAINSTORMING PADA MATA PELAJARAN IPA KELAS V SDN 116260 SIMONIS, AEK NATAS LABUHAN BATU UTARA T.P. 2012/2013. Undergraduate thesis, UNIMED.
Jumini, (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL TWO STAY TWO STARY (TSTS) DI KELAS V SDN 104214 KEDAI DURIAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Jesica Christin, Lado (2017) ANALISIS KUALITAS MINYAK GORENG BERDASARKAN STANDAR NASIONAL INDONESIA (SNI) DAN KANDUNGAN ZAT GIZI YANG BERSUMBER DARI CRUDE PALM OIL (CPO) VARIETAS TENERA. Undergraduate thesis, UNIMED.
Juanta, Palma (2016) EFEK MODEL INQUIRY TRAINING MENGGUNAKAN MEDIA MACROMEDIA FLASH DAN MOTIVASI TERHADAP KETERAMPILAN PROSES SAINS FISIKA SISWA SMA. Masters thesis, UNIMED.
Khaerani, Annisah (2013) PERBANDINGAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN METODE SQ3R DAN METODE KONVENSIONAL PADA MATA PELAJARAN IPA KELAS IV SD NEGERI 105389 TIMBANG DELI KECAMATAN GALANG TA. 2012/2013. Undergraduate thesis, UNIMED.
Khairunnisa, (2017) PENERAPAN MODEL PEMBELAJARAN COOPERATIVE SCRIPT UNTUK MENINGKATKAN MINAT BELAJAR SISWA PADA PELAJARAN IPA DI KELAS IV SDN NO 050615 KECAMATAN SEI BINGAI T.A 2016/2017. Undergraduate thesis, UNIMED.
Karo, Rani Natalia (2016) PENINGKATAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN WORD SQUARE PADA MATA PELAJARAN IPA DIKELAS IV SD NEGERI 101776 SAMPALI MEDAN TA 2015-2016. Undergraduate thesis, UNIMED.
Khadapi, Muhammad (2017) UPAYA MENINGKATKAN HASIL BELAJAR IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN TEAMS GAMES TOURNAMENT (TGT) MATERI POKOK ALAT PERNAFASAN MANUSIA DIKELAS V SD NEGERI 104236 DALU KECAMATAN TANJUNG MORAWA T.A 2016/2017. Undergraduate thesis, UNIMED.
Kurniasih, Ayu (2016) PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE WORD SQUARE UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DI KELAS V SD NEGERI 101765 BANDAR SETIA TAHUN AJARAN 2015/2016. Undergraduate thesis, UNIMED.
khairunnisa, (2015) UPAYA PENERAPAN MODEL PEMBELAJARAN TALKING STICK DALAM MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI NO. 026609 BINJAI SELATAN T.A 2014/2015. Undergraduate thesis, UNIMED.
Lubis, M. Ilyas (2013) MENINGKATKAN KEMAMPUAN SISWA DALAM MENULIS KARANGAN NARASI DENGAN MIND WRITING PADA PELAJARAN BAHASA INDONESIA KELAS IV SD NEGERI 067250 KEC. MEDAN DELI T.P 2012 /2013. Undergraduate thesis, UNIMED.
Lubis, Nilfa Dilla (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PRACTICE REHEARSAL PAIRS KELAS V SD NEGERI 101801 DELI TUA TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Larasati, Novi (2017) PENGEMBANGAN MEDIA PEMBELAJARAN BERBASIS COOPERATIVE LEARNING UNTUK MATA PELAJARAN IPA DI KELAS V SD. Masters thesis, UNIMED.
Lubis, Hutri Purnama Sary (2016) PENGARUH MODEL PEMBELAJARAN INKUIRI DAN KOOPERATIF TERHADAP KEMAMPUAN KOGNITIF, KETERAMPILAN PROSES SAINS, DAN SIKAP ILMIAH SISWA PADA MATERI ANIMALIA DI SMA NEGERI 11 MEDAN. Masters thesis, UNIMED.
Lubis, Wardatul Ashani (2017) PERBEDAAN HASIL BELAJAR IPA MENGGUNAKAN MODEL PEMBELAJARAN DIRECT INSTRUCTION DENGAN MODEL PROBLEM BASED LEARNING DI KELAS V SD NEGERI 105292 BANDAR KLIPPA T.P 2016/2017. Undergraduate thesis, UNIMED.
Malawati, Ratna (2013) ANALISIS KEMAMPUAN PRASYARAT MATEMATIKA DAN HASIL BELAJAR FISIKA SISWA PADA PEMBELAJARAN MENGGUNAKAN MODEL KOOPERATIF TIPE NUMBERED HEADS TOGETHER (NHT). Masters thesis, UNIMED.
Manurung, Binari and Edi, Syahmi and Ulfa, Syarifah Widya (2014) PENGARUH STRATEGI PEMBELAJARAN BERBASIS MASALAH TERHADAP KEMAMPUAN BERPIKIR TINGKAT TINGGI (MENGANALISIS, MENGEVALUASI, MENCIPTA) DAN KETERAMPILAN PROSES SAINS MAHASISWA STIPAP LPP MEDAN. In: Seminar Nasional Biologi dan Pembelajarannya, 23 Aug 2014, Medan.
Mariani, Dwi Junita (2013) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL COOPERATIVE LEARNING TIPE CIRC (COOPERATIVE INTEGRATED READING AND COMPOSITION) KELAS V SD NEGERI 104233 BANDAR LABUHAN TAHUN PELAJARAN 2012/2013. Undergraduate thesis, UNIMED.
Maulida h.s, Efri (2013) MENINGKATKAN MOTIVASI BELAJAR SISWA MELALUI MODEL PENGAJARAN LANGSUNG (DIRECT INTRUCTION) PADA PELAJARAN IPA KELAS IV SD NEGERI 112260 GUNTING SAGA T.A 2012/2013. Undergraduate thesis, UNIMED.
Mulyani, Erna Tri (2013) UPAYA MENINGKATKAN KREATIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN METODE EKSPERIMEN PADA PELAJARA IPA KELAS V SD NEGERI 107415 TANJUNG SARI T.A 2012/2013. Undergraduate thesis, UNIMED.
Manurung, Herbet Erikson (2017) THE DEVELOPMENT OF INTERACTIVE MULTIMEDIA TOWARDS THE MOST DIFFICULT CHEMISTRY SYLLABUS IN SENIOR HIGH SCHOOL. Masters thesis, UNIMED.
Maha, Devi Tasari (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN TEAM QUIZ PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 104208 CINTA RAKYAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Mianora, Cici (2017) PENERAPAN MODEL PEMBELAJARAN EXAMPLE NON EXAMPLE DALAM MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 101772 TANJUNG SELAMAT KEC.PERCUT SEI TUAN KAB.DELI SERDANG TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
MAHARANI, LATIFAH (2018) PENGEMBANGAN LEMBAR KERJA PESERTA DIDIK DENGAN PENDEKATAN STEM (SCIENCE, TECHNOLOGY, ENGINEERING, MATHEMATICS) UNTUK MENINGKATKAN LITERASI SAINS SISWA PADA MATERI VIRUS. Undergraduate thesis, UNIMED.
MENTARI, GRACE SANTA (2018) INVENTARISASI SENYAWA ANTIBAKTERI PADA TUMBUHAN HANJELI (COIX LACRYMA-JOBI L.) DENGAN METODE KROMATOGRAFI GAS (GC-MS). Undergraduate thesis, UNIMED.
MUKHTI, DESY PRATIWI (2018) PENGARUH PEMBELAJARAN EKSPERIMEN BERBASIS INKUIRI TERBIMBING (GUIDED INQUIRY) TERHADAP KEMAMPUAN KOGNITIF DAN KETERAMPILAN PROSES SAINS SISWA PADA MATERI SISTEM SIRKULASI DI KELAS XI MIPA SMAN 1 AIR PUTIH KABUPATEN BATU BARA T.P 2018/2019. Undergraduate thesis, UNIMED.
Maharani, (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF TIPE BERKIRIM SALAM DAN SOAL DI KELAS IV SD NEGERI 101771 TEMBUNG TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Mahrani, Yuyun (2017) MODEL-MODEL PEMBELAJARAN EFEKTIF DAN INOVATIF DALAM MATA PELAJARAN SAINS (IPA). In: Seminar Nasional Tahunan Fakultas Ilmu Sosial Universitas Negeri Medan Tahun 2017, 17 May 2017, Medan.
Manalu, Andriono (2015) EFEK MODEL PROBLEM BASED LEARNING TERHADAP KEMAMPUAN PEMECAHAN MASALAH DAN KETERAMPILAN PROSES SAINS SISWA SMA NEGERI 2 PEMATANGSIANTAR T.A 2014/2015. Masters thesis, UNIMED.
Manalu, Ester Trisna (2016) PENGEMBANGAN PENUNTUN PRAKTIKUM KIMIA BERBASIS KONTEKSTUAL TERINTEGRASI NILAI-NILAI KARAKTER PADA MATERI SISTEM KOLOID. Masters thesis, UNIMED.
Manik,, Hariati (2016) MENINGKATKAN HASIL BELAJ SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN AUDITORY, INTELECTUAL, REPETITION (AIR ) PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI 106163 BANDAR KLIPPA T.A 2015/2016. Undergraduate thesis, UNIMED.
Manurung, Herwin (2016) PENGARUH STRATEGI PEMBELAJARAN BERBASIS PROYEK DAN DISCOVERY TERHADAP KEMAMPUAN BERPIKIR TINGKAT TINGGI, KETERAMPILAN PROSES SAINS DAN SIKAP ILMIAH SISWA PADA MATERI SISTEM RESPIRASI PADA MANUSIA SMA NEGERI 2 PEMATANGSIANTAR. Masters thesis, UNIMED.
Marbun, Junian S (2016) UPAYA MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN PEMBELAJARAN PAKEM DI KELAS IV SD NEGERI 173322 PARULOHAN KEC. LINTONGNIHUTA KAB. HUMBAHAS T.P. 2015/2016. Undergraduate thesis, UNIMED.
Marpaung, Desriana (2017) PENGARUH MODEL PEMBELAJARAN INKUIRI DAN GROUP INVESTIGASI TERHADAP HASIL BELAJAR BIOLOGI DAN KETERAMPILAN PROSES SAINS SISWA PADA MATERI SISTEM PENCERNAAN KELAS XI SMA NEGERI 1 SIANTAR. Masters thesis, UNIMED.
Marpaung, Endang Yulistira (2017) DAYA ADSORPSI ARANG AKTIF KULIT PISANG RAJA BULU (MUSA PARADISIACA I. VAR SAPIENTUM) SEBAGAI ADSORBEN LOGAM BERAT BESI (FE). Undergraduate thesis, UNIMED.
Marpaung, Fadilah (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING BERBANTUAN PETA KONSEP DAN SIKAP ILMIAH TERHADAP HASIL BELAJAR KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Melinda, Sri (2016) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL EXAMPLES NON EXAMPLES DI KELAS IV SD NEGERI 115 GUNUNGTUA JAE TAHUN AJARAN 2015/2016. Undergraduate thesis, UNIMED.
Mulia, Ramadhani (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAPHASILBELAJARSISWA(KETERAMPILAN PROSESSAINS)DI SMANEGERI1HINAI. Undergraduate thesis, UNIMED.
Muliati, Sri (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS PADA PELAJARAN FISIKA. Undergraduate thesis, UNIMED.
Murtiningsih, Eka (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS SISWA PADA MATERI POKOK FLUIDA STATIS KELAS X SEMESTER GENAP DI SMA NEGERI 3 MEDAN T.P 2015/2016. Undergraduate thesis, UNIMED.
Muti’ah, (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING MENGGUNAKAN MEDIA PHET DAN KEMAMPUAN BERPIKIR LOGIS TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Ningsih, Siska Rahayu (2013) PEMBELAJARAN IPA TERPADU PADA POKOK BAHASAN ASAM-BASA DAN GARAM MELALUI MODEL PEMBELAJARAN INKUIRI TERPIMPIN UNTUK MENINGKATKAN KREATIVITAS DAN HASIL BELAJAR SISWA KELAS VII. Masters thesis, UNIMED.
Nurhayati, (2013) PENERAPAN MODEL COLLABORATIVE LEARNING UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA KELAS V SD NEGERI 3 KUTAPANJANG GAYO LUES TAHUN AJARAN 2012/2013. Undergraduate thesis, UNIMED.
Nasution, Vera Handayani (2013) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL MIND MAPPING PADA MATA PELAJARAN IPA DI KELAS V SD SWASTA BABAR SARI PANCUR BATU TAHUN AJARAN 2012/2013. Undergraduate thesis, UNIMED.
Nasution, Letmillialusi Sabila (2012) PERBEDAAN HASIL BELAJAR SISWA YANG MENGGUNAKAN METODE EKSPOSITORI BERBASIS PETA PIKIRAN DENGAN BERBASIS PETA KONSEP PADA SUB MATERI POKOK SISTEM EKSKRESI MANUSIA DI KELAS XI IA SMA NEGERI I KISARAN TP 2011/2012. Undergraduate thesis, UNIMED.
Nofrini, (2017) MENINGKATKAN HASIL BELAJAR SISWA DALAM POKOK BAHASAN PERUBAHAN LINGKUNGAN PADA PELAJARAN IPA DENGAN MENGGUNAKAN COMPLETEN SENTENCE DI KELAS IV SDN 107403 CINTA RAKYAT T.A. 2016/2017. Undergraduate thesis, UNIMED.
Nasution, Fitriyani (2017) PENERAPAN PENDEKATAN PEMBELAJARAN SAINTIFIK TERHADAP HASIL BELAJAR KIMIA SISWA KELAS X DI SMA SWASTA PERSIAPAN STABAT. Undergraduate thesis, UNIMED.
Nadeak, Yosua (2016) EFEK MODEL PEMBELAJARAN BERBASIS MASALAH (PROBLEM BASED LEARNING) DAN KREATIVITAS TERHADAP KETERAMPILAN PEMECAHAN MASALAH SISWA DI SMA. Masters thesis, UNIMED.
Naibaho, Julesman (2016) PENGARUH MODEL PEMBELAJARAN DISCOVERY DAN MOTIVASI BELAJAR TERHADAP HASIL BELAJAR IPA SISWA KELAS V SDN 091473 PLUS TIGABALATA. Masters thesis, UNIMED.
Naibaho, Sahrolina (2017) MENINGKATKAN KEMANDIRIAN BELAJAR SISWA DENGAN MENGGUNAKAN MODEL CONTEXTAL TEACHING AND LEARNING (CTL) PADA PEMBELAJARAN IPA KELAS V SD NEGERI 101766 BANDAR SETIA TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Naibaho, Verawati Angelina (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN QUANTUM TEACHING PADA PELAJARAN IPA DI KELAS V SD NEGERI 106162 MEDAN ESTATE KAB. DELI SERDANG T.A 2016/2017. Undergraduate thesis, UNIMED.
Narso, (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DENGAN MENGGUNAKAN MEDIA PHET DAN MOTIVASI TERHADAP KETERAMPILAN PROSES SAINS SISWA KELAS VIII SMP NEGERI 1 LABUHAN DELI TAHUN AJARAN 2015/2016. Masters thesis, UNIMED.
Nasution, Belladina (2015) PENGARUH STRATEGI PEMBELAJARAN DAN MINAT BELAJAR TERHADAP HASIL BELAJAR IPA SISWA KELAS IV SEKOLAH DASAR. Masters thesis, UNIMED.
Nasution, Eni Sumanti (2016) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DAN PENALARAN FORMAL TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Nasution, Intan Bayati (2016) HUBUNGAN MOTIVASI BERPRESTASI MINAT DAN PERHATIAN ORANG TUA TERHADAP HASIL BELAJAR KOGNITIF BIOLOGI DAN KEMANDIRIAN SISWA SMA NEGERI SEKECAMATAN MEDAN KOTA. Masters thesis, UNIMED.
Nasution, Lia Afriyanti (2015) EFEK PENGGUNAAN MODEL PEMBELAJARAN INQUIRY TRAINNING BERBANTUAN MEDIA VISUAL DAN KREATIVITAS SISWA TERHADAP KETERAMPILAN PROSES SAINS SISWA KELAS VIII SMP AMIR HAMZAH MEDAN. Masters thesis, UNIMED.
Nasution, Maya Ardiani (2017) PENGGUNAAN STRATEGI PEMBELAJARAN CARD SORT UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA BAGI SISWA KELAS V SDN 101801 KEDAI DURIAN. Undergraduate thesis, UNIMED.
Nasution, Murniati (2016) PENGARUH MODEL PEMBELAJARAN BERBASIS MASALAH DAN MOTIVASI TERHADAP HASIL BELAJAR IPA SISWA DI KELAS V SD SWASTA MUHAMMADIYAH 01 PEMATANGSIANTAR. Masters thesis, UNIMED.
Nasution, Sangkot Sri Rezeki (2016) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN MODELLING THE WAY PADA MATA PELAJARAN IPA KELAS V SD MUHAMMADIYAH CENDANA ASRI KEC. BATANG KUIS T.A. 2015/2016. Undergraduate thesis, UNIMED.
Nasution, Sari Wahyuni Rozi (2016) PENGARUH MODEL PEMBELAJARAN INQUIRI TERBIMBING DAN KREATIVITAS TERHADAP HASIL BELAJAR KOGNITIF TINGGI FISIKA SISWA. Masters thesis, UNIMED.
Nasution, Ummi Latifah (2017) PERBEDAAN HASIL BELAJAR ILMU PENGETAHUAN ALAM IPA MENGGUNAKAN METODE PEMBELAJARAN THINK PAIR SHARE (TPS) DAN MENGGUNAKAN METODE DISCOVERY SISWA KELAS V SD NEGRI 104205 TEMBUNG TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Nasution, Unita Sukma Zuliani (2016) PENGARUH MODEL PEMBELAJARAN BERBASIS MASALAH (PROBLEM BASED LEARNING) DAN KEMAMPUAN BERPIKIR KRITIS TERHADAP KEMAMPUAN PEMECAHAN MASALAH FISIKA SISWA SMA. Masters thesis, UNIMED.
Nduru, Elena Mayanti (2015) KONTRIBUSI FASILITAS BELAJAR, KOMPETENSI GURU, KETERAMPILAN PROSES SAINS DAN SIKAP ILMIAH TERHADAP HASIL BELAJAR BIOLOGI KOGNITIF SISWA SMA DI KECAMATAN TELUKDALAM. Masters thesis, UNIMED.
Nisya, Zainun (2017) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN STRATEGI BELAJAR PQ4R (PREVIEW, QUESTION, READ, REFLECT, RECITE, DAN REVIEW) PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI 101800 DELITUA T. A 2016/2017. Undergraduate thesis, UNIMED.
Novita, Leny (2014) PENGEMBANGAN BUKU AJAR KIMIA INOVATIF SMA/MA KELAS XI SEMESTER 2 MENGGUNAKAN MODEL PEMBELAJARAN PROJECT BASED LEARNING (PJBL) BERDASARKAN KURIKULUM 2013. Masters thesis, UNIMED.
Nur, Zubaidah (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL TIPE SCRAMBLE PADA PELAJARAN IPA DI KELAS V SD NEGERI 060808 MEDAN. Undergraduate thesis, UNIMED.
Nurina, Sekar Drya Fajrin (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN COURSE REVIEW HORAY DI KELAS V SD NEGERI 050671 KAMPUNG GOHOR TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Pralabaika, Nikita Rufa (2013) MENINGKATKAN HASIL BELAJAR SISWA MELALUI MODEL PEMBELAJARAN KOOPERATIF TIPE JIGSAW PADA MATA PELAJARAN IPS DI KELAS V SD NEGERI 066046 MEDAN HELVETIA T.A. 2012/2013. Undergraduate thesis, UNIMED.
Pohan, Dahrim (2017) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DAN KEMAMPUAN BERPIKIR LOGIS TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Putri, Meilisa (2017) PERBEDAAN PENERAPAN METODE BELAJAR TUNTAS (MASTERY LEARNING) DENGAN METODE PENEMUAN (DISCOVERY) TERHADAP HASIL BELAJAR IPA PADA SISWA KELAS V SD NEGERI 104214 DELITUA. Undergraduate thesis, UNIMED.
Praptiwi, (2017) PENGGUNAAN MODEL COOPERATIVE SCRIPT UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA KELAS V SD NEGERI 104208 CINTA RAKYAT T.A 2016/2017. Undergraduate thesis, UNIMED.
PUTRI, RAHMADANI (2018) FAKTOR-FAKTOR KESULITAN BELAJAR SISWA PADA MATERI INVERTEBRATA DI KELAS X IPA SMA NEGERI 3 RANTAU UTARA TAHUN PEMBELAJARAN 2017/2018. Undergraduate thesis, UNIMED.
PUTRI, CLAUDIA ROSMAULI (2018) IMPLEMENTASI MODEL PEMBELAJARAN POE (PREDICT, OBSERVE, EXPLAIN) DAN HUBUNGANNYA DENGAN KETERAMPILAN PROSES SAINS SISWA KELAS XI MIA SMA METHODIST 5 MEDAN PADA MATERI SEL. Undergraduate thesis, UNIMED.
Pakpahan, Rejeki (2016) PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE JIGSAW UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DI KELAS V SD NEGERI 173315 SILABAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Pakpahan, Rouli Natalina (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING BERBANTUAN MEDIA PHET TERHADAP KEMAMPUAN BERPIKIR LOGIS DAN KETERAMPILAN PROSES SAINS SISWA SMA KELAS XI IPA. Masters thesis, UNIMED.
Panjaitan, Fatmawarny (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING BERBASIS KOLABORATIF DAN PEMAHAMAN KONSEP AWAL TERHADAP KETERAMPILAN PROSES SAINS IPA SISWA SMP. Masters thesis, UNIMED.
Panjaitan, Novalia (2017) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN CONNECTING ORGANIZING REFLECTING EXTENDING PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 104208 CINTA RAKYAT TA 2016/2017. Undergraduate thesis, UNIMED.
Pardede, Erna (2015) EFEK MODEL PEMBELAJARAN GUIDED DISCOVERY BERBASIS KOLABORASI DENGAN MEDIA FLASH TERHADAP KETERAMPILAN PROSES SAINS DAN HASIL BELAJAR KOGNITIF TINGKAT TINGGI FISIKA SISWA SMA. Masters thesis, UNIMED.
Parinduri, Fifi Erianti (2017) UPAYA MENINGKATKAN SIKAP KREATIF SISWA DENGAN MENGGUNAKAN PENDEKATAN INQUIRY PADA PELAJARAN IPA KELAS V SD NEGERI 107405 SEI ROTAN. Undergraduate thesis, UNIMED.
Pasaribu, Adriantho Benny (2014) PENINGKATAN KEMAMPUAN PEMAHAMAN DAN KREATIVITAS MATEMATIKA SISWA SMP MELALUI PENDEKATAN PENEMUAN TERBIMBING DENGAN BANTUAN MEDIA SOFTWARE AUTOGRAPH. Masters thesis, UNIMED.
Pertiwi, Wulan (2017) PENERAPAN MODEL PEMBELAJARAN AUDITORY, INTELLECTUAL, REPETITION (AIR) DALAM MENINGKATKAN HASIL BELAJAR IPA DI KELAS III SDN 101765 BANDAR SETIA T.A 2016/ 2017. Undergraduate thesis, UNIMED.
Prasetyo, Gihari Eko (2017) PENGEMBANGAN MEDIA PEMBELAJARAN MENGGUNAKAN ADOBE FLASH UNTUK MENINGKATKAN HASIL BELAJAR PADA MATA PELAJARAN IPA KELAS V SD N 050660 KWALA BINGAI. Masters thesis, UNIMED.
Pratiwi, Indah (2016) PENGARUH MODEL PEMBELAJARAN NUMBERED HEADS TOGETHER (NHT) DAN TEAMWORK SKILL TERHADAP HASIL BELAJAR IPA SISWA KELAS IV TAHUN AJARAN 2015/2016. Masters thesis, UNIMED.
Pratiwi, Isnaini (2017) HUBUNGAN KECERDASAN EMOSIONAL DENGAN HASIL BELAJAR IPA SISWA KELAS V SD NEGERI 117513 PULO TARUTUNG TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Prayogi, Ricky (2017) EFEK MODEL INKUIRI DAN KEMAMPUAN BERPIKIR KREATIF TERHADAP KETERAMPILAN PROSES SAINS FISIKA SISWA KELAS X SMA UNGGULAN CT FOUNDATION. Masters thesis, UNIMED.
Priani, Nelda Okta (2017) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN METODE THE LEARNING CELL PADA PELAJARAN IPA KELAS V SDN 101775 SAMPALI KAB. DELI SERDANG T.A 2016/2017. Undergraduate thesis, UNIMED.
Pulungan, Syafrida Hanum (2015) PENINGKATAN KEMAMPUAN KOMUNIKASI MATEMATIS DAN SELF-EFFICACY SISWA MTSN DI KECAMATAN KUALUH SELATAN MELALUI PEMBELAJARAN BERBASIS MASALAH. Masters thesis, UNIMED.
Puspita, Debby May (2017) PENERAPAN MODEL DISCOVERY LEARNING UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA. In: Seminar Nasional Tahunan Fakultas Ilmu Sosial Universitas Negeri Medan Tahun 2017, 17 May 2017, Medan.
Putri, Desi Hayati (2015) PENGARUH MODEL PEMBELAJARAN TERHADAP HASIL BELAJAR BIOLOGI, SIKAP ILMIAH, DAN KETERAMPILAN PROSES SAINS SISWA DI SMA NEGERI 1 SIMPANG EMPAT ASAHAN. Masters thesis, UNIMED.
Rangkuti, Zuraidah (2013) MENINGKATKAN HASIL BELAJAR SISWAPADA PELAJARAN IPA MENGGUNAKAN METODE PEMBELAJARAN TUTOR SEBAYA T.A2012/2013. Undergraduate thesis, UNIMED.
Ritonga, Idayati (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN METODE OBSERVASI PADA PEMBELAJARAN IPA DI KELAS V SD NEGERI NO 104314 DOLOK MASIHUL T.A 2012/2013. Undergraduate thesis, UNIMED.
Rangkuti, Zuraidah (2013) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA MENGGUNAKAN METODE PEMBELAJARAN TUTOR SEBAYA T.A 2012/2013. Undergraduate thesis, UNIMED.
Rajagukguk, Ivan Lauren (2013) PENGARUH PENGGUNAAN TAKTIK MENGAJAR PUNGGUNG DENGAN PUNGGUNG TERHADAP HASIL BELAJAR BIOLOGI SISWA PADA MATERI SISTEM REPRODUKSI DI KELAS XI SMA NEGERI 1 PERCUT SEI TUAN T.P. 2012/2013. Undergraduate thesis, UNIMED.
Rahmadani, Fitri (2016) ANALISIS KOMPETENSI GURU BIOLOGI SMA SE-KABUPATEN BATU BARA. Masters thesis, UNIMED.
Rahmadani, Siti Mahyuni (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA MELALUI MODEL SOMATIC AUDITORY VISUALIZATION INTELLEKTULLY (SAVI) PADA PEMBELAJARAN IPA KELAS IV SD NEGERI 107403 CINTA RAKYAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Rajagukguk, Ivan Lauren (2016) PENGEMBANGAN PENUNTUN PRAKTIKUM GENETIKA BERBASIS KETERAMPILAN PROSES SAINS. Masters thesis, UNIMED.
Rajgukguk, Aril (2017) PENGARUH PENGGUNAAN METODE PEMBELAJARAN EKSPERIMEN TERHADAP HASIL BELAJAR IPA KELAS V SDN 104204 SAMBIREJO TIMUR KECAMATAN PERCUT SEI TUAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Ramadani, Putri Sri (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL SNOWBALL THROWING PADA MATA PELAJARAN IPA KELAS IV SD NEGERI 108075 DELITUA BARAT T.A 2016 / 2017. Undergraduate thesis, UNIMED.
Ramadhani, Asiah (2017) MENINGKATKAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN MODEL KOOPERATIF TIPE NHT PADA PELAJARAN IPA DI KELAS V SDN 105287 TEMBUNG T.A 2016/2017. Undergraduate thesis, UNIMED.
Ramadhani, Nazila (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING DAN KEMAMPUAN BERPIKIR KRITIS TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Rambe, Sartika Sari (2016) EFEK MODEL PEMBELAJARAN SCIENTIFIC INQUIRY BERBANTU MIND MAPPING DAN KREATIVITAS TERHADAP KETERAMPILAN PROSES SAINS SISWA SMP. Masters thesis, UNIMED.
Rambe, Sholeh (2015) MENINGKATKAN AKTIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN MODEL EXPLICIT INSTRUCTION PADA MATA PELAJARAN IPA KELAS V SD NEGERI 060822 MEDAN KEC. MEDAN AREA T.A 2014/2015. Undergraduate thesis, UNIMED.
Rangkuti, Arnita (2017) UPAYA MENINGKATKAN AKTIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN COOPERATIVE TIPE MAKE A MATCH PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI NO. 050771 PANGKALAN SUSU T.A 2016/2017. Undergraduate thesis, UNIMED.
Rezeki, Ketiara (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN STRATEGI PEMBELAJARAN GROUP TO GROUP EXCHANGE DI KELAS V SDN 104214 KEDAI DURIAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Rina, (2017) PERANGKAT PEMBELAJARAN INOVATIF DALAM PEMBELAJARAN IPA TERPADU UNTUK MENGGALI KEMAMPUAN BERPIKIR KREATIF SISWA. In: Seminar Nasional Tahunan Fakultas Ilmu Sosial Universitas Negeri Medan Tahun 2017, 17 May 2017, Medan.
Ririn, Surahmawati Dwi (2017) UPAYA MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA KELAS V DENGAN MENGGUNAKAN MODEL PROBLEM SOLVING DI SD NEGERI 106162 MEDAN ESTATE TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Roza, Cut Badzlina (2016) PENGARUH MODEL PEMBELAJARAN BERBASIS MASALAH DAN PENEMUAN TERBIMBING TERHADAP HASIL BELAJAR SISTEM PENCERNAAN DAN KETERAMPILAN PROSES SAINS SISWA SMA NEGERI 1 LANGSA. Masters thesis, UNIMED.
Ruwita, Lili (2017) PENGARUH MODEL PEMBELAJARAN PROBING-PROMPTING TERHADAP HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS V SDN 101775 SAMPALI TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Siregar, Maya Rossiana (2014) PENGARUH METODE INQUIRY DAN MOTIVASI BELAJAR TERHADAP HASIL BELAJAR ILMU PENGETAHUAN ALAM SISWA DI KELAS V SD NEGERI NO. 064978 MEDAN DENAI. Masters thesis, UNIMED.
Sutopo, Adi (2013) MODEL PEMBELAJARAN STS DALAM MATA PELAJARAN SCIENCE. In: Pekan Ilmiah Periode XXI - TA. 2012/2013, 25-26 Jun 2013, Medan.
Sinaga, Rane Marena (2013) MENINGKATKAN HASIL BELAJAR SISWA MELALUI MODEL PEMBELAJARAN KONSTRUKTIVISME PADA MATA PELAJARAN IPA DI KELAS V SDN 096742 SIMPANG IV KECAMATAN RAYA KAHEAN TA 2012/2013. Undergraduate thesis, UNIMED.
Sibarani, Hartha L (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN DISCOVERY PADA MATA PELAJARAN IPA KELAS V SD NEGERI 101880 TANJUNG MORAWA TAHUN AJARAN 2012/2013. Undergraduate thesis, UNIMED.
Sembiring, Pransiskus (2012) UPAYA MENINGKATKAN KEAKTIFAN BELAJAR SISWA DENGAN MENGGUNAKAN METODE EKSPERIMEN PADA PELAJARAN IPA KELAS IV SD NEGERI 106821 BANDAR BARU KEC. SIBOLANGIT T.A. 2012/2013. Undergraduate thesis, UNIMED.
Sari, Laila Putri (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF TIPE NUMBERED HEAD TOGETHER PADA MATA PELAJARAN IPA KELAS V SD AL-HIDAYAH MEDAN T.A 2012/2013. Undergraduate thesis, UNIMED.
Siregar, Muhammad Tajuddin (2013) MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA POKOK BAHASAN PERPINDAHAN DAN PERUBAHAN ENERGI LISTRIK MELALUI METODE DEMONSTRASI PADA SISWA KELAS IV DI SD N 117507 GAMBANGAN KEC AEK KUO, KAB LABUHAN BATU UTARA. T.P 2012/2013. Undergraduate thesis, UNIMED.
Siregar, Erlina Hasbi (2012) UPAYA PENINGKATAN HASIL BELAJAR SISWA MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF TIPE TEAMS GAMES TOURNAMENT (TGT) PADA MATERI POKOK EKOSISTEM DI KELAS X1 SMA NEGERI 1 MERANTI KAB. ASAHAN T.P 2011/2012. Undergraduate thesis, UNIMED.
Siregar, Nurhasanah (2012) ANALISIS KESULITAN BELAJAR SISWA PADA MATA PELAJARAN BIOLOGI DI KELAS X SEMESTER I SMA N 1 DOLOK MASIHUL TAHUN AJARAN 2011/2012. Undergraduate thesis, UNIMED.
Situmorang, Trimanto (2017) PENGARUH MODEL PEMBELAJARAN INQURY TRAINING BERBASIS MEDIA ANIMASI TERHADAP KETERAMPILAN PROSES SAINS SISWA SMA. Undergraduate thesis, UNIMED.
Siahaan, Rahut Silvia (2017) MENINGKATKAN KEAKTIFAN BELAJAR SISWA KELAS V PADA MATA PELAJARAN IPA MELALUI MODEL PEMBALAJARAN LEARNING COMMUNITY SD NEGERI NO.101776 SAMPALI TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Sipahutar, Nanda Eka Syahfitri (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN EXPLICIT INSTRUCTION PADA PELAJARAN IPA KELAS V SD NEGERI 060857 JL. DURUNG MEDAN T.A 2017. Undergraduate thesis, UNIMED.
Samosir, Siska Evrida Yanti (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA PADA PEMBELAJARAN IPA MENGGUNAKAN MODEL PEMBELAJARAN VAK DI KELAS III-B SD NEGERI NO.101765 BANDAR SETIA T.A 2016/2017. Undergraduate thesis, UNIMED.
Sahdu, Nadya Umay (2017) ANALISIS KEMAMPUAN BERPIKIR KRITIS SISWA BERDASARKAN TES PISA LITERASI SAINS KELAS X IPA DI MADRASAH ALIYAH NEGERI KOTA MEDAN TAHUN PEMBELAJARAN 2016/2017. Undergraduate thesis, UNIMED.
Siregar, Riadoh Mawaddah (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL KOOPERATIF TGT ( TEAM GAMES TOURNAMENT) DI KELAS III SD NEGERI NO. 101800 DELITUA T.A 2016/2017. Undergraduate thesis, UNIMED.
Sucippitari, Rayi (2017) PENGEMBANGAN BUKU AJAR IPA BERBASIS LITERASI SAINS MATERI BUMI DAN ALAM SEMESTA PADA SISWA KELAS V SD MUHAMMADIYAH 02 MEDAN. Masters thesis, UNIMED.
Silitonga, Ronauly (2017) PENGARUH STRATEGI PEMBELAJARAN BERBASIS KETERAMPILAN PROSES DAN GAYA BELAJAR TERHADAP HASIL BELAJAR IPA SISWA SD NEGERI 064025 MEDAN. Masters thesis, UNIMED.
Suryani, (2017) MENERAPKAN MODEL HNT UNTUK MENINGKATKAN RASA PERCAYA DIRI SISWA PADA MATA PELAJARAN IPA DI KELAS IV SD IT AR-RAYHAN SCHOOL MEDAN AMPLAS T.A 2016/2017. Undergraduate thesis, UNIMED.
Sinaga, July R (2018) PENGARUH MODEL PEMBELAJARAN INKUIRI TERBIMBING TERHADAP KETERAMPILAN PROSES SAINS SISWA PADA MATERI POKOK ELASTISITAS DAN HUKUM HOOKE DI KELAS XI SMA NEGERI 10 MEDAN T.P. 2017/2018. Undergraduate thesis, UNIMED.
SITEPU, JUNITA ELVIANI (2018) EFEK MODEL PROBLEM BASED LEARNING TERHADAP PENINGKATAN LITERASI SAINS PESERTA DIDIK KELAS X SEMESTER II PADA MATERI POKOK MOMENTUM, IMPULS, DAN TUMBUKAN DI SMA NEGERI 2 LUBUK PAKAM T.A 2017/2018. Undergraduate thesis, UNIMED.
SIREGAR, ISMA KHAIRIYAH (2018) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN PENDEKATAN RECIPROCAL TEACHING DI KELQAS V SD NEGERI NO. 101747 KLUMPANG KEBUN T.A 2017/2018. Undergraduate thesis, UNIMED.
SINULINGGA, RUTH PRILA DIANITA (2018) ANALISIS KESULITAN BELAJAR SISWA PADA MATERI HEWAN INVERTEBRATA DI KELAS X MIA SMA SWASTA DHARMA PANCASILA MEDAN TAHUN PEMBELAJARAN 2017/2018. Undergraduate thesis, UNIMED.
SORMIN, TRYANA JAYANTI (2018) MENINGKATKAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELEJARAN EXPLICIT INSTRUCTION PADA MATA PELAJARAN IPA DI KELAS V SD NEGERI 101766 BANDAR SETIA, KEC. PERCUT SEI TUAN T.A 2017/2018. Undergraduate thesis, UNIMED.
SIPAYUNG, YESSICA UNY TWELVINA (2018) UPAYA MENINGKATKAN HASIL BELAJAR DAN AKTIVITAS SISWA MELALUI IMPLEMENTASI MODEL MIND MAPPING DIKOMBINASIKAN DENGAN NUMBERED HEAD TOGETHER MATERI SISTEM EKSKRESI PADA MANUSIA PADA SISWA KELAS XI MIA 1 SMA NEGERI 1 SUNGGAL TAHUN PELAJARAN 2016/2017. Undergraduate thesis, UNIMED.
SOFIAH, NURUL EVA (2018) PERBEDAAN HASIL BELAJAR SISWA MENGGUNAKAN MODEL PEMBELAJARAN SNOWBALL THROWING DAN TWO STAY TWO STRAY (TSTS) PADA SUB MATERI JARINGAN TUMBUHAN DI KELAS XI IPA SMA NEGERI 1 BANDAR PERDAGANGAN T.P 2018/2019. Undergraduate thesis, UNIMED.
SARI, KAMALIA PERMATA (2018) PENGEMBANGAN BUKU PENGENALAN SERANGGA PENYERBUK SEBAGAI SUPLEMEN MATAKULIAH ENTOMOLOGI DI JURUSAN BIOLOGI UNIVERSITAS NEGERI MEDAN. Undergraduate thesis, UNIMED.
SIJABAT, ERVINNA (2018) PENERAPAN METODE GOAL PROGRAMMING DALAM PENGOPTIMALAN PRODUKSI CRUDE PALM OIL DAN PALM KERNEL DI PT. PERKEBUNAN NUSANTARA IV- SIANTAR UNIT MAYANG. Undergraduate thesis, UNIMED.
SARAGIH, KARTIKA SARI DEWI (2018) SINTESIS ZEOLIT DENGAN METODE KOPRESIPITASI SEBAGAI ADSORBEN LOGAM CU, PB DAN ZN. Undergraduate thesis, UNIMED.
Safitri, Layil (2017) ANALISIS KESIAPAN GURU IPA DALAM IMPLEMENTASI KURIKULUM 2013 DI SMP NEGERI SE- KECAMATAN STABAT. Masters thesis, UNIMED.
Sambas, Ayu Lestari (2017) HUBUNGAN PEMBERIAN PENGUATAN (REINFORCEMENT) DENGAN HASIL BELAJAR IPA SISWA KELAS IV SD NEGERI 010006 SEI. APUNG KECAMATAN TANJUNGBALAI KABUPATEN ASAHAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Samirah, (2016) PENGARUH PEMBELAJARAN DISCOVERY TERHADAP KETERAMPILAN PROSES SAINS DAN KEMAMPUAN KOGNITIF IPA SISWA KELAS V SEKOLAH DASAR. Masters thesis, UNIMED.
Samosir, Friska Elisabet (2016) PENGEMBANGAN LEMBAR AKTIVITAS SISWA BERBASIS MASALAH MATERI PESAWAT SEDERHANA KELAS V SD N 091447 SARIBUJAWA KABUPATEN SIMALUNGUN. Masters thesis, UNIMED.
Saragi., Irfa Yulinda (2017) PENGARUH MODEL PEMBELAJARAN TERHADAP KEMAMPUAN BERPIKIR TINGKAT TINGGI, SIKAP ILMIAH DANKETERAMPILAN PROSES SAINS SISWA MADRASAH ALIYAH NEGERI (MAN) LUBUKPAKAM PADA MATERI EKOSISTEM. Masters thesis, UNIMED.
Sari, Dewi Sartika (2015) PENGARUH MODEL PEMBELAJARAN TERHADAP PENGETAHUAN BIOLOGI, SIKAP ILMIAH, DAN KETERAMPILAN PROSES SAINS SISWA SMA DIPONEGORO KISARAN. Masters thesis, UNIMED.
Sari, Dyan Wulan (2017) PENGARUH MODEL PEMBELAJARANINQUIRYTRAINING BERBASIS KOLABORATIF DAN SIKAP ILMIAH TERHADAP KETERAMPILAN PROSES SAINS MATERI SUMBER DAYA ALAM DI SD METHODIST 1 MEDAN. Masters thesis, UNIMED.
Sari, Emilia (2017) EFEK MODEL PEMBELAJARAN KOOPERATIF TIPE GROUP INVESTIGATION DAN KEMAMPUAN BERPIKIR LOGIS TERHADAP HASIL BELAJAR FISIKA. Masters thesis, UNIMED.
Sari, Septi Devita (2017) PERBANDINGAN KONSEP PENDIDIKAN DI INDONESIA DENGAN JERMAN : ANALISIS KOMPARATIF SISTEM PEMBELAJARAN IPA. In: Prosiding Seminar Nasional III Biologi dan Pembelajarannya, 8 September 2017, Universitas Negeri Medan.
Sari, Suci Perwita (2016) PENGARUH MODEL DISCOVERY LEARNING DAN KECERDASAN INTERPERSONAL TERHADAP HASIL BELAJAR IPA SISWA SD MUHAMMADIYAH 02 MEDAN. Masters thesis, UNIMED.
Sari, Yuni Purnama (2017) PENERAPAN METODE PEMBELAJARAN OUTDOOR ACTIVITIES DALAM MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN ILMU PENGETAHUAN ALAM (IPA) DI KELAS IV SD NEGERI 101775 SAMPALI T.A 2016/2017. Undergraduate thesis, UNIMED.
Sa’adah, Lia (2016) PERBEDAAN HASIL BELAJAR IPA DAN KETERAMPILAN PROSES SAINS SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN INKUIRI TERBIMBING DAN PEMBELAJARAN DISCOVERY. Masters thesis, UNIMED.
Sembiring, Al Khudri (2015) PENGARUH MODEL PEMBELAJARAN TERHADAP PENGUASAAN KONSEP DAN KETERAMPILAN PROSES SAINS MAHASISWA PADA MATAKULIAH ILMU PENGETAHUAN LINGKUNGAN DI UNIVERSITAS LANCANG KUNING PEKANBARU. Masters thesis, UNIMED.
Sembiring, Winda Astuti (2016) PENGARUH MODEL PEMBELAJARAN INKUIRI BERBASIS KOLABORATIF DAN KETERAMPILAN BERPIKIR KRITIS TERHADAP HASIL BELAJAR IPA SISWA KELAS IV SD NEGERI 023972 TP. 2015-2016. Masters thesis, UNIMED.
Siagian, Asister Fernando (2015) PENGARUH MODEL PEMBELAJARAN INKUIRI TERBIMBING TERHADAP KEMAMPUAN BERPIKIR KRITIS DAN KETERAMPILAN PROSES SAINS SISWA SMA. Masters thesis, UNIMED.
Siagian, Erwina Laily (2015) ANALISIS KEMAMPUAN GURU BIOLOGI DALAM MENGEVALUASI HASIL BELAJAR SISWA DI SMA SE KOTA PADANGSIDIMPUAN. Masters thesis, UNIMED.
Siagian, Helena Evadonna (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING MENGGUNAKAN MACROMEDIA FLASH DAN KEMAMPUAN BERPIKIR KREATIF TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Siahaan, Birna Mastiur (2016) PENERAPAN MODEL PEMBELAJARAN MAKE A MATCH SEBAGAI UPAYA MENINGKATKAN HASIL BELAJAR IPA KELAS V SD NEGERI 102059 SARANG GITING KECAMATAN DOLOK MASIHUL T.A 2015/2016. Undergraduate thesis, UNIMED.
Sibarani, Veemona Esther (2016) EKSISTENSI SNAKE LEMMA PADA MODUL. Undergraduate thesis, UNIMED.
Siburian, Lousiana Ebernzer (2016) UPAYA MENINGKATKAN HASIL BELAJAR IPA MELALUI PENERAPAN METODE DEMONSTRASI PADA SISWA KELAS V SD NEGERI 173453 NAGURGURAN KEC. SIJAMAPOLANG KAB. HUMBAHAS T.P. 2015/2016. Undergraduate thesis, UNIMED.
Sihite, Marlehon (2016) MENINGKATKAN HASIL BELAJAR SISWA DALAM PEMBELAJARAN SAINS MELALUI METODE BELAJAR INKUIRI TERBIMBING DI KELAS V SD NEGERI 067242 MEDAN SUNGGAL T. A. 2016/2017. Undergraduate thesis, UNIMED.
Sihite, Sri Wahyuni (2017) PENERAPAN MODEL INDEX CARD MATCH DALAM MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI 101767 TEMBUNG KEC. PERCUT SEI TUAN KAB. DELI SERDANG T.A 2016/2017. Undergraduate thesis, UNIMED.
Sihombing, Hermansyah (2016) PENGARUH PROJECT BASED LEARNING BERORIENTASI LESSON STUDY TERHADAP KREATIVITAS DAN HASIL BELAJAR SISWA PADA MATERI TERMOKIMIA DI SMA KELAS XI. Masters thesis, UNIMED.
Sihombing, Yovanna Theresia (2014) PENGEMBANGAN BUKU AJAR BIOLOGI PENCEMARAN LINGKUNGAN BERBASIS LITERASI SAINS KELAS X SMA/MA. Masters thesis, UNIMED.
Sihotang, Change (2016) UPAYA MENINGKATKAN HASIL BELAJAR SAINS DENGAN METODE DEMONSTRASI PADA SISWA KELAS IV SD NEGERI 173492 AEK SONGSONG KECAMATAN PARLILITAN KABUPATEN HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Silaban, Winarto (2016) ANALISIS PELAKSANAAN DAN PERMASALAHAN PRAKTIKUM BIOLOGI DI SMA NEGERI SE KABUPATEN DAIRI. Masters thesis, UNIMED.
Silaen, Hanah Mariah (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL THINK TALK WRITE DI KELAS V SD NEGERI 101776 SAMPALI TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Silalahi, Endang (2016) FAKTOR-FAKTOR YANG BERPENGARUH TERHADAP PENGETAHUAN DAN SIKAP PEDULI LINGKUNGAN PADA SISWA TINGKAT SMP/MTS N DAN SMA/MAN ADIWIYATA DI KABUPATEN LABUHANBATU. Masters thesis, UNIMED.
Silitonga, Purnama (2015) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING DAN KREATIVITAS TERHADAP KETERAMPILAN PROSES SAINS. Masters thesis, UNIMED.
Simamora, Fatimah (2017) PENGARUH MODEL PEMBELAJARAN VAK (VISUALIZATION, AUDIOTORY, KINESTHETIC) TERHADAP HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA MATERI GAYA MAGNET DI KELAS V SD NEGERI 101771 TEMBUNG TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Simamora, Saut M. (2016) PENGEMBANGAN LKS BERBASIS PROYEK UNTUK MENINGKATKAN HASIL BELAJAR IPA SISWA KELAS V SD SWASTA BAPTIS INDEPENDEN MEDAN. Masters thesis, UNIMED.
Simanihuruk, Rosenni (2017) MENINGKATKAN MINAT BELAJAR SISWA PADA PELAJARAN IPA MENGGUNAKAN STRATEGI PEMBELAJARAN GIVING QUESTION AND GETTING ANSWERS KELAS V SD NEGERI 060857 DURUNG KEC. MEDAN TEMBUNG T.A 2016/2017. Undergraduate thesis, UNIMED.
Simanjuntak, Lely M (2016) HUBUNGAN KECERDASAN EMOSIONAL DENGAN HASIL BELAJAR IPA SISWA KELAS VII SMP N 10 MEDAN TAHUN PEMBELAJARAN 2015/2016. Undergraduate thesis, UNIMED.
Simanjuntak, Naomi (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING MENGGUNAKAN MACROMEDIA FLASH DAN MOTIVASI TERHADAP KETERAMPILAN PROSES SAINS SISWA. Masters thesis, UNIMED.
Simare-Mare, Gitafor Marokana (2017) MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN PENDEKATAN SAINTIFIK DI KELAS IV SD NEGERI 101776 SAMPALI TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Simarmata, Kartomo and Silitonga, Pasar M. and Silaban, Saronom (2016) EFFECT OF LEARNING MODEL TO OUTCOMES OF STUDENT’S CHEMISTRY WITH SALT HYDROLSIS SCIENSE CLASS ELEVEN IN SENIOR HIGH SCHOOL PERCUT SEI TUAN. In: Proceeding AISTEEL The First Annual International Seminar on Transformative Education and Educational Leadership, 19 November 2016, Medan.
Simatupang, Juanda Lius (2016) PENGGUNAAN MEDIA GAMBAR UNTUK MENINGKATKAN HASIL BELAJAR TENTANG SAINS PADA SISWA KELAS V SD NEGERI 176353 SIBORUTOROP KEC. PARANGINAN KAB. HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Simatupang,, Dorti (2016) UPAYA MENINGKATKAN HASIL BELAJAR SAINS MELALUI PENERAPAN METODE DEMONSTRASI PADA SISWA KELAS IV SD NEGERI 177055 SIGALOGO KEC. ONAN GANJANG KAB. HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Sinaga, Roida Ferawati (2016) PENGARUH MODEL PEMBELAJARAN DAN GAYA BELAJAR TERHADAP HASIL BELAJAR IPA. Masters thesis, UNIMED.
Sinambela, Linda Rosanti (2016) UPAYA MENINGKATKAN HASIL BELAJAR SAINS DENGAN MENGGUNAKAN MODEL KOOPERATIF TIPE STAD PADA KELAS IV SD NEGERI 173355 MARBUN KEC. BAKTIRAJA KAB. HUMBAHAS T.P. 2015/2016. Undergraduate thesis, UNIMED.
Sipahutar, Sri Khaurani (2016) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN MIND MAPPING PADA MATA PELAJARAN IPA KELAS IV SD NEGERI 107417 SEI MERAH T.A 2015 / 2016. Undergraduate thesis, UNIMED.
Sirait, Irmawanti (2017) PENGARUH PENGGUNAAN METODE PEMBELAJARAN DISCOVERY PADA TOPIK BIOTEKNOLOGI TERHADAP KETERAMPILAN PROSES SAINS SISWA DI SMA NEGERI 1 PANAIHULU. In: Prosiding Seminar Nasional III Biologi dan Pembelajarannya, 8 September 2017, Universitas Negeri Medan.
Sirait, Irmawanti (2016) PENGARUH PENGGUNAAN METODE PEMBELAJARAN INQUIRY DAN DISCOVERY PADA TOPIK BIOTEKNOLOGI TERHADAP HASIL BELAJAR, KETERAMPILAN PROSES SAINS, DAN SIKAP ILMIAH SISWA DI SMA NEGERI 1 PANAIHULU. Masters thesis, UNIMED.
Sirait, Khairun Fitri (2016) ANALISIS KOMPETENSI GURU BIOLOGI SMA NEGERI SE KABUPATEN BATUBARA. Masters thesis, UNIMED.
Siregar, Fitriana (2016) ANALISIS BUKU BIOLOGI SMA KELAS X MATERI KINGDOM ANIMALIA BERDASARKAN LITERASI SAINS SE-KABUPATEN DELISERDANG. Masters thesis, UNIMED.
Siregar, Hiba Dertyana (2015) PENGARUH MODEL PEMBELAJARAN KOOPERATIF GROUP INVESTIGATION DAN PEMAHAMAN KONSEP AWAL TERHADAP KETERAMPILAN PROSES SAINS SISWA SMA. Masters thesis, UNIMED.
Siregar, Imam Maulana (2017) PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE GROUP INVESTIGATION UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA KELAS V SD NEGERI NO.101772 TANJUNG SELAMAT TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Siregar, Linda Haryati (2016) PENGARUH MODEL PROBLEM BASED LEARNING BERBASIS KOLABORATIF TERHADAP HASIL BELAJAR DITINJAU DARI KECERDASAN NATURALIS SISWA PADA MATA PELAJARAN IPA DI SD SWASTA BHARLIND MEDAN T.P 2015/2016. Masters thesis, UNIMED.
Siregar, Mianna Eventina (2016) UPAYA MENINGKATKAN MINAT BELAJAR SISWA PADA MATA PELAJARAN IPA MENGGUNAKAN MODEL PEMBELAJARAN CONTEXTUAL AND TEACHING LEARNING ( CTL ) DI KELAS V SD N 038093 SIBAGINDAR TAHUN PELAJARAN 2015/2016. Undergraduate thesis, UNIMED.
Siregar, Nurjmiah (2018) PENGEMBANGAN LEMBAR KERJA MATERI JAMUR PADAMAKANAN BERBASIS INKUIRI KONTEKSTUAL TERHADAP KETERAMPILAN PROSES SAINS, SIKAP ILMIAH, DAN BERPIKIR TINGKAT TINGGI MAHASISWA PENDIDIKAN BOLOGI DI UNIVERSITAS MUHAMMADIYAH TAPANULI SELATAN. Masters thesis, UNIMED.
Sirhayuni, Yuli Sara (2016) HUBUNGAN PENGGUNAAN MEDIA BENDA KONKRET TERHADAP MOTIVASI BELAJAR SISWA KELAS V PADA MATA PELAJARAN IPA SD N 106158 JALAN MASJID DUSUN X PEMATANG JOHAR. Undergraduate thesis, UNIMED.
Sitakar, Hendra (2016) MENINGKATKAN BERPIKIR ILMIAH SISWA MELALUI METODE INKUIRI PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI SINAMO PAKPAK BHARAT. Undergraduate thesis, UNIMED.
Sitanggang, Junianto Fransisco (2015) PENGARUH MODEL PEMBELAJARAN KOOPERATIF DAN TIPE KEPRIBADIAN TERHADAP HASIL BELAJAR IPA SISWA SD ST. ANTONIUS MEDAN TAHUN PELAJARAN 2013/2014. Masters thesis, UNIMED.
Sitanggang, Raysyah Putri (2016) PENGARUH MODEL PEMBELAJARAN RECIPROCAL TERHADAP KEMAMPUAN BERPIKIR KRITIS DAN HASIL BELAJAR IPA SISWA MUHAMMADIYAH 4 MEDAN HELVETIA. Masters thesis, UNIMED.
Sitanggang, Ristauli Marlina (2016) MENINGKATKAN HASIL BELAJAR SAINS SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF THINK PAIR SHARE DI KELAS V SD NEGERI 078493 FADOROSIFULUBANUA T.P 2015/2016. Undergraduate thesis, UNIMED.
Sitepu, Riny Chairiah (2017) MENINGKATKAN HASIL BELAJAR SISWA MELALUI MODEL PEMBELAJARAN INSIDE OUTSIDE CIRCLE PADA MATA PELAJARAN ILMU PENGETAHUAN ALAM DI KELAS IV SD NEGERI 020620 BINJAI SELATAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Sitepu, Rusti (2016) UPAYA MENINGKATKAN HASIL BELAJAR SAINS MELALUI PENGGUNAAN MEDIA GAMBAR DI KELAS V SD NEGERI 173471 SIJARANGO KECAMATAN PAKKAT KABUPATEN HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Situmorang, Rusli (2016) UPAYA MENINGKATKAN HASIL BELAJAR SAINS MELALUI METODE EKSPERIMEN PADA SISWA KELAS IV SD NEGERI 173456 HUTAGINJANG KECAMATAN SIJAMAPOLANG KABUPATEN HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Solin, Pismaet Krisman (2016) PENERAPAN METODE PAIKEM UNTUK MENINGKATKAN HASIL BELAJAR SAINS PADA KELAS V SD NEGERI 175786 SIAMBATON JULU KECAMATAN PAKKAT KABUPATEN HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Sulaiman, (2017) PENGARUH MODEL PEMBELAJARAN INKUIRI, EKSPOSITORI DAN GAYA BELAJAR TERHADAP KETERAMPILAN PROSES SAINS DAN HASIL BELAJAR SISWA SMA NEGERIN 1 RANTAU SELATAN. In: Prosiding Seminar Nasional III Biologi dan Pembelajarannya, 8 September 2017, Universitas Negeri Medan.
Suryani, Nenni (2016) PENGEMBANGAN LEMBAR KERJA SISWA BERBASIS LITERASI SAINS PADA PEMBELAJARAN BIOLOGI KELAS XI IPA SEMESTER 2. Masters thesis, UNIMED.
Susilawati, Sri Mila (2015) EFEK MODEL PEMBELAJARAN INQUIRY TRAINING DAN PEMAHAMAN KONSEP AWAL TERHADAP KETERAMPILAN PROSES SAINS SISWA KELAS X PADA SMA NEGERI 1 KUTA CANE TAHUN AJARAN 2015/2016. Masters thesis, UNIMED.
Syahfitri, Widiya (2017) MENINGKATKAN HASIL BELAJAR SISWA MELALUI MODEL PEMBELAJARAN SCRAMBLE PADA MATA PELAJARAN ILMU PENGETAHUAN ALAM (IPA) DI KELAS IV SD NEGERI 101801 KEDAI DURIAN T.A 2016/2017. Undergraduate thesis, UNIMED.
Syahriah, Alfi (2016) PENGEMBANGAN PENUNTUN PRAKTIKUM KIMIA SMA PADA MATERI KIMIA UNSUR TERINTEGRASI MODEL PEMBELAJARAN BERBASIS PROYEK. Masters thesis, UNIMED.
Syahrina, Nur Elfi (2017) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN NUMBERED HEAD TOGETHER DI KELAS IV SD NEGERI NO. 101772 TANJUNG SELAMAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Syam, Intan Nazri (2017) PENERAPAN PAIKEM UNTUK MENINGKATKAN HASIL BELAJAR SISWA PADA PELAJARAN IPA DI KELAS V SDN 101801 KEDAI DURIANKEC.DELITUA T.A 2016/2017. Undergraduate thesis, UNIMED.
Syasmita, Indah (2017) UPAYA MENINGKATKAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN PEMBELAJARAN BERBASIS MUSIKAL PADA MATA PELAJARAN IPA KELAS V SDN 101766 BANDAR SETIA T.A 2016/2017. Undergraduate thesis, UNIMED.
Tarigan, Siska Pramita (2012) MENINGKATKAN MINAT BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN KOOPERATIF TIPE THINK PAIR SHARE PADA MATA PELAJARAN IPA DI KELAS IV SD NEGERI NO 024766 BINJAI, T.A 2011/2012”. SKRIPSI FAKUTAS ILMU PENDIDIKAN, UNIVERSITAS NEGERI MEDAN 2012. Undergraduate thesis, UNIMED.
Tursina, (2017) PENGEMBANGAN LEMBAR KERJA SISWA (LKS) INOVATIF BERBASIS PROJECT BASED LEARNING (PJBL) UNTUK MENINGKATKAN HASIL BELAJAR IPA SISWA SD PADA KONSEP ORGAN PERNAPASAN PADA MANUSIA. Masters thesis, UNIMED.
Tamba, Herlopen (2015) EFEK MODEL PEMBELAJARAN INKUIRI TERBIMBING BERBASIS KOLABORATIF DAN PEMAHAMAN KONSEP TERHADAP KETERAMPILAN PROSES SAINS FISIKA SISWA SMP. Masters thesis, UNIMED.
Tamba, N.F. Susanti (2014) UPAYA MENINGKATKAN PEMAHAMAN KONSEP DAN KEMAMPUAN BERPIKIR KRITIS SISWA MELALUI PENERAPAN PEMBELAJARAN BERBASIS MASALAH DENGAN PENDEKATAN METAKOGNISI. Masters thesis, UNIMED.
Tampubolon, Nurlina Magdalena (2016) PENERAPAN MODEL PEMBELAJARAN KOOPERATIF STUDENT TEAMS ACHIEVEMEN DIVISION (STAD) UNTUK MENINGKATKAN HASIL BELAJAR IPA PADA SISWA KELAS IV SD NEGERI 173314 NAGASARIBU KEC. LINTONGNIHUTA KAB. HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Tampubolon, Sri Hartati (2017) CODE SWITCHING OF MATHEMATICS AND SCIENCE TEACHER IN GRADE ONE CLASSROOM INTERACTION AT SD PELITA KASIH TANJUNG MORAWA. Masters thesis, UNIMED.
Tanjung, Dian Ramadhani (2016) PENGARUH PENGGUNAAN E-LEARNING BERBASIS EDMODO TERHADAP KEMANDIRIAN, MOTIVASI, DAN HASIL BELAJAR PADA MATERI SISTEM GERAK SMA NASIONAL PLUS CINTA BUDAYA MEDAN. Masters thesis, UNIMED.
Tanjung, Yulia Rezka Fajar Aini (2016) PENGARUH STATUS SEKOLAH, RENCANA PENDIDIKAN SETELAH TAMAT SMA DAN LATAR BELAKANG PENDIDIKAN ORANG TUA TERHADAP LITERASI SAINS SISWA SMA KELAS XI IPA SE-KOTA KISARAN TAHUN PEMBELAJARAN 2015/2016. UNSPECIFIED thesis, UNIMED.
Tarigan, Ira Tania (2017) PENERAPAN MODEL PEMBELAJARA SQ3R (SURVEY, QUESTION, READ, RECITED, DAN REVIEW) UNTUK MENINGKATKAN MOTIVASI BELAJAR SISWA PADA MATA PELAJARAN IPA KELAS V SD NEGERI 104208 CINTA RAKYAT T.A 2016/2017. Undergraduate thesis, UNIMED.
Tarigan, Juniko Esra (2016) PENGARUH PEMBELAJARAN MENGGUNAKAN PETA KONSEP DALAM TATANAN STUDENTS TEAM ACHIEVEMENT DIVISION (STAD) DAN PERILAKU SOSIAL TERHADAP HASIL BELAJAR IPA SISWA KELAS IV SD 064020 MEDAN SUNGGAL TAHUN PELAJARAN 2015/2016. Masters thesis, UNIMED.
Tarihoran, Siti Marlina (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN TEAM ASSISTED INDIVIDUALLY (TAI) PADA MATA PELAJARAN IPA. In: Seminar Nasional Tahunan Fakultas Ilmu Sosial Universitas Negeri Medan Tahun 2017, 17 May 2017, Medan.
Togatorop, Riama (2016) UPAYA MENINGKATKAN HASIL BELAJAR IPA MELALUI METODE EKSPERIMEN PADA SISWA KELAS V SD NEGERI 173397 DOLOKSANGGUL KAB. HUMBANG HASUNDUTAN T.P. 2015/2016. Undergraduate thesis, UNIMED.
Tumangger, Mahlina (2016) UPAYA MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN METODE TANYA JAWAB DI KELAS IV SD NEGERI 033931 SALAK PAKPAK BHARAT T.A. 2015/2016. Undergraduate thesis, UNIMED.
Tumangger, Sariani (2016) UPAYA MENINGKATKAN MINAT BELAJAR SISWA MELALUI MEDIA GAMBAR PEMBELAJARAN IPA MATERI DAUR HIDUP HEWAN DI KELAS V SD NEGERI KUTA ONAN DESA KABAN TENGAH KEC. SITELLU TALI URANG JEHE KAB. PAKPAK BHARAT TAHUN AJARAN 2015-2016. Undergraduate thesis, UNIMED.
Turnip, Julion (2015) PENGARUH METODE INKUIRI TERBIMBING DAN PROYEK TERHADAP HASIL BELAJAR BIOLOGI, KEMAMPUAN BERPIKIR KRITIS, DAN KETERAMPILAN PROSES SAINS SISWA DI SMP SWASTA HKBP SIMANTIN PANE KECAMATAN PANEI KABUPATEN SIMALUNGUN SUMATERA UTARA. Masters thesis, UNIMED.
Ulin, Meri Pinta (2015) EFEK PEMBELAJARAN GUIDED DISCOVERY DENGAN MENGGUNAKAN PETA KONSEP TERHADAP KETERAMPILAN PROSES SAINS DAN KEMAMPUAN KOGNITIF FISIKA SISWA SMA KELAS X. Masters thesis, UNIMED.
Utami, Annisa Rizki (2017) PENERAPAN METODE TALKING STICK UNTUK MENINGKATKAN SIKAP KREATIF SISWA PADA MATA PELAJARAN IPA KELAS IV SD NEGERI 101801 KEDAI DURIAN TAHUN AJARAN 2016/2017. Undergraduate thesis, UNIMED.
Wardani, Rika Ayu (2013) MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN METODE TAKE AND GIVE DI KELAS V SD NEGERI 105296 PERCUT HILIR T. A. 2012/ 2013. Undergraduate thesis, UNIMED.
Wahyuni, Zuhro (2017) PENERAPAN MODEL PEMBELAJARAN PAIR CHECKS DALAM MENINGKATKAN HASIL BELAJAR SISWA PADA MATA PELAJARAN ILMU PENGETAHUAN ALAM (IPA) DI KELAS V SD NEGERI 101766 BANDAR SETIA T.A 2016/2017. Undergraduate thesis, UNIMED.
Widyastika, Dinda (2017) MENINGKATKAN MOTIVASI BELAJAR SISWA PADA MATA PELAJARAN IPA DENGAN MENGGUNAKAN MODEL PEMBELAJARAN PREDICTION GUIDE (TEBAK PELAJARAN) DI KELAS V SD NEGERI NO.106163 BANDAR KLIPPA DELI SERDANG T.A 2016/2017. Undergraduate thesis, UNIMED.
Winanda, Yuna (2016) PENGARUH MODEL PEMBELAJARAN INQUIRY TRAINING TERHADAP KETERAMPILAN PROSES SAINS SISWA PADA PELAJARAN FISIKA. Undergraduate thesis, UNIMED.
Wulandari, Rizka (2015) PENINGKATAN HASIL BELAJAR DAN KREATIVITAS SISWA MELALUI METODE PRAKTIKUM BERBASIS KOLABORASI DI KELAS IV-B SD SWASTA PLUS PELANGI MEDAN T.A 2014/2015. Masters thesis, UNIMED.
Yuliyanda, (2013) MENINGKATKAN HASIL BELAJAR SISWA DENGAN MENGGUNAKAN STRATEGI PEMBELAJARAN KOOPERATIF TIPE TWO STAY TWO STRAY PADA MATERI POKOK SUMBER DAYA ALAM DENGAN LINGKUNGAN DALAM MATA PELAJARAN IPA DI KELAS IV SD NEGERI 104209 SAENTIS, KECAMATAN PERCUT SEI TUAN. Undergraduate thesis, UNIMED.
YULINAR, RIZKI DWI (2018) PENGARUH MODEL PEMBELAJARAN INDUKTIF TERHADAP HASIL BELAJAR SISWA PADA MATERI MOMENTUM DAN IMPULS KELAS X SEMESTER II SMA NEGERI 15 MEDAN T.P 2017/2018. Undergraduate thesis, UNIMED.
Yani, Ahmad Fauzi Syahputra (2015) PENGEMBANGAN PENUNTUN PRAKTIKUM KIMIA SMA KELAS XI PADA MATERI HIDROLISIS GARAM SESUAI MODEL PEMBELAJARAN PENEMUAN DAN BERBASIS PROYEK. Masters thesis, UNIMED.
Yunita, Ade Neni (2016) MENINGKATKAN MOTIVASI BELAJAR SISWA PADA MATA PELAJARAN ILMU PENGETAHUAN ALAM (IPA) DENGAN MENGGUNAKAN MODEL TEAM-ASSISTED INDIVIDUALIZATION (TAI) DI KELAS IV SD NEGERI 101855 KUTALIMBARU TAHUN AJARAN 2015/2016. Undergraduate thesis, UNIMED.
Yusnita, Nurdewi (2017) MENINGKATKAN MINAT BELAJAR SISWA PADA MATAPELAJARAN IPA MELALUI MODEL COURSEREVIEW HORAY DI KELAS IV SD NEGERI101797 DELI TUA T.A 2016/2017. Undergraduate thesis, UNIMED.
Zuhairiyah, Nina (2013) MENINGKATKAN AKTIVITAS BELAJAR SISWA PADA MATA PELAJARAN IPS DENGAN MODEL PEMBELAJARAN KOOPERATIF TIPE JIGSAW DI KELAS IV SD NEGERI NO. 060929 MEDAN JOHOR. Undergraduate thesis, UNIMED.
Zetkas, Eryati (2016) ANALISIS KESULITAN BELAJAR SISWA MATERI BIOTEKNOLOGI KELAS IX SMP SE-KOTA PADANGSIDIMPUAN. Masters thesis, UNIMED.
Zulfahmi, (2017) PENDEKATAN MORFOMETRI, MORFOLOGI, JENIS KELAMIN TUKA. Undergraduate thesis, UNIMED.
Zulpadly, (2016) ANALISIS KESULITAN BELAJAR SISWA SMA NEGERI PADA MATERI BIOTEKNOLOGI SE-KABUPATEN ROKAN HILIR. Masters thesis, UNIMED.
This list was generated on Sun Apr 21 02:20:34 2019 WIB. | 2019-04-20T19:28:20Z | http://digilib.unimed.ac.id/view/subjects/Q1.html |
Nokia warned of flat earnings or a loss and we sold for a $1 per share loss. Given current conditions the share price may be under pressure through year end or longer until they can introduce their Microsoft powered smart phone.
DreamWorks is also under pressure today because of less than expected revenue weekend for the opening of Kung Fu Panda II. We added shares.
We also sold Boston Scientific flat and switched the funds to American Eagle slightly lower than we sold the last piece before earnings. The share price/trading volume on AEO has settled since the reaction to the news of two weeks ago.
In the last week markets around the world have moved lower as folks have decided that selling is easier than buying and fear has replaced greed.
Earlier this year we decided to moderate our practice of the last ten years of timing market activity. Early in the decade that strategy served us well and reflected our concern with the excess speculation in the housing markets and the greed mentality that the spiraling higher of housing prices had engendered.
We survived 2008 and 2009 by strategic trading. But in the last two years our previous success at timing has failed us and hindered recent results.
We adopted a timing approach because of rampant speculation - first in the tech mania of 1998-2000 -and then in the ensuing mania of the housing/mortgage/ home equity explosion. We expected and feared a very large correction/crash and were willing to forego gains to avoid large losses that a crash would create. We have learned overtime that when the value of an investor’s account drops substantially the investors’ (including our) ability to maintain positions for eventual recovery and profit is severely tested.
The Crash of 2008-2009 was such an event. During that Crash we were severely tested by investor concerns and more so by our own uncertainty regarding the political resolve of the powers to deal with the situation. There was a point in late 2008 that most investment banks and insurance companies were insolvent and aside from the drop in the value of portfolios the ability of the financial system to survive was the more important question. The solutions proffered were not totally to our liking but they worked and we do think the financial system- while not robust – is solvent and capable of dealing with the future.
The difference between now and 2008 is that the markets have recognized the financial problems and priced financial stocks accordingly. And another difference is that speculation is occurring in commodities not stocks or housing. It is our hope that regulators have a handle on the risks involved in the margin speculation that is occurring.
Since the Crash of 2008-2009 and the subsequent return to normal (some overvalued/some undervalued) price levels of stocks we have decided to change our strategy. It is our thought that markets- while volatile- are experiencing relatively normal activity with corrections and rallies (somewhat exacerbated because of High Frequency Computer trading).
The rapid adoption and encouragement of High Frequency Trading by major players and the various exchanges, which have a monetary stake in the high volume trading activity, makes trying to time markets more difficult- witness the Flash Crash of May 2010.
And so we have returned to the investment mode we followed in the 1980s and 1990s of buying out of favor stocks that have value and the potential to gain when problems that are clearly recognizable are confronted. That doesn’t’ mean that all the stocks we own will recover we do expect that the recovery of the majority of stocks.
This market approach with out of favor value stocks worked well in the last century because there weren’t computer programs that valued portfolios on an hourly or even monthly basis. This allowed investors to maintain holdings and weather corrections without the trauma created by seeing accounts and thus net worth drop by 10% to 20% during corrections. We have no answer for the minute by minute pricing of portfolios except to suggest that clients treat their investment portfolios as they do their homes’ value- an investment that over time will rise. Two to three years out - or sooner- our investments will offer above average return. We know that long term holding of investments has been anathema to us over the past 12 years but because our timing crystal ball has cracked we believe our change in style is appropriate.
There has been rampant speculation in the commodities markets this year and the minor popping of the silver and to some extent gold bubble has led to the correction in stocks as speculators and hedge funds turn to selling stocks to raise cash to meet raised margin requirements and cover losses. The uncertainty in Europe over the fate of Greece and Ireland and Portugal has added another worry for global investors. We consider those countries to be no more important than some of the states in the USA that are having financial problems but don’t seem to be on the media radar as causes of worry for the markets. The continuation of China’s economic expansion is another concern. We don’t have the answer for any of these questions but all have created a great Wall of Worry.
All this doesn’t mean that stocks and portfolio values won’t go down. But having survived 1974, 1982, 1987, 2000, 2008-2009 and the Flash Crash of 2010 it’s obvious (or maybe “we are confident”) that we can absorb, survive and profit from whatever the markets choose to give.
We switched Huntington Bank to Dell.
Aéropostale reported forewarned lower earnings but warned going forward and dropped $4 after having dropped $4 when it forewarned. We sold half the position. We made $1.50 - $2 per share trading it in April so today’s loss is somewhat mitigated but still painful. The stock was and is now cheaper but we are not smarter than Mister Market. Because it is cheap we kept half the position. If it moves lower over the summer we have room to reestablish the half position we sold.
For the same reason we sold half our American Eagle which and announces next Wednesday is down in sympathy-The Gap is down $4 on disappointing earnings. Five analysts have cut ratings on AEO in the last few days to preserve their stock picking records which leaves no one to cut when earnings are announced.
On a positive note Hewlett Packard is up today when most of the DJIA stocks are lower. Maybe it has found a bottom.
We also sold Sony (Japan??) and cut some DreamWorks since it announces earnings next week and all our stocks except Dell –which dropped beforehand- have been under pressure when they announced. It’s the kind of market where value stocks just get more valuable.
We sold KBE (Major Bank ETF) for a scratch loss. We own enough individual bank stocks which were purchased after we established the KBE holding.
We took a $1 per share loss on Alcoa. The commodity bubble seems to be deflating at least for a while and we would like to be able to deploy the cash elsewhere on any more market weakness. We have a love/hate relationship with Alcoa (seems cheap/ volatile earnings and huge debt) and we are moving on for now.
We also sold Yahoo for a wash in most accounts. The Alibaba, Alipay imbroglio is too inscrutable for us.
We added Talbots warrants to accounts to lower our average cost to 60 to 90 pennies in many accounts. We have four years for the warrants to work for us and the dollars involved in the latest purchase make the speculation risk/reward attractive. A double in the price of Talbots from its present price would cause a quintuple in the price of the warrants from today’s price if it occurs over the next 15 months.
Jobless claims fell to 409,000 in the most recent week, which was less than expected but still too high for comfort. We really need to see jobless claims fall back below the 400,000 threshold again to see a more dramatic (and needed) pickup in job creation. Continuing claims also fell slightly, which is more encouraging, as it could mean that some of the long-term unemployed are finally getting jobs. However, it also could reflect the masses of unemployed who are now running out of their maximum, 99 weeks of unemployment insurance.
There are many reasons for the persistence of jobless claims above the 400,000 threshold, not least of which are temporary production disruptions created by the earthquake in Japan. Vehicle production was particularly hard-hit in April and remained suppressed in May as producers attempted to restore supply chains. The good news is that production in Japan seems to be coming back faster than many expected, so producers here will be recouping losses this summer. In the interim, you might want to wait a bit, until inventories have been replenished, to buy a new vehicle, as shortages have temporarily pushed up the price of both new and used vehicles.
Another more disturbing reason for the persistence of high jobless claims is the run-up in oil prices. The surge in commodity prices likely deferred some hiring until later in the year, as many companies waited to see what effect those prices would have on consumer demand. Discounters and other retailers catering to low- and middle-income households reported a slowdown in spending and fewer trips to the store as oil prices rose. This made it difficult to pass along oil-related price increases to consumers and forced some retailers to cut costs, including workers.
Separately, New York Federal Reserve President Bill Dudley underscored his view that the labor market is still healing too slowly to allow inflation to accelerate, and that even though headline inflation is uncomfortably high, it’s not likely to become self-feeding. He noted that even if hiring picked up by about 30% on a monthly basis, we would still have substantial slack in the labor market by the end of 2012. This provides the rationale for the decision that the Fed made during the April meeting to exit its stimulus program gradually.
Bottom Line: Special factors are exacerbating already weak economic fundamentals and holding back the recovery. That said, the recovery persists, which is better than the alternative, and prospects do look good for a pickup in growth later in the year. I would love to be surprised more on the upside than the downside by the incoming economic data.
Existing home sales edged down 0.8% to a 5.05 million unit rate in April, after being revised down in March. Sales are now running more than 12% below the level hit a year ago when the tax credit for first-time home buyers helped to buoy sales.
Losses were more heavily concentrated in the condo and multi-family than single-family market. Realtors complained that cancellations, due largely to appraisals that fell short of the agreed-upon price, are now shaving 11% of sales from the total. Moreover, a flurry of new rules associated with Dodd-Frank financial market reforms are expected to further constrain credit, particularly for first-time buyers, who along with the extremely wealthy and all-cash buyers are all that the market has left. The result will keep the housing market from recovering to more reasonable levels, despite record affordability and a substantial backlog of pent-up demand in the market.
We eliminated Coldwater and Talbots from accounts. We will hold the Talbot warrants.
Talbots has been a mistake. Period. The recent phone calls clients who own the shares have been receiving from the proxy solicitor asking clients to vote their shares for management is because management needs votes to assure that they will get exorbitant bonuses amounting to over half of last year’s companywide earnings. We are voting by selling. They are spending shareholder money to get bonuses they don’t deserve. Talbot’s warrants are a speculation on eventual recovery and with four years till expiration there is a chance they may help us recover our oversized loss in the shares.
(Each warrant entitles the holder to purchase One (1) New share of Common Stock (NYSE Symbol "TLB") at an exercise price of $14.85 per share. The Talbots Warrants commenced trading on the NYSE Amex on April 21, 2010, under the ticker symbol “TLB.WS.” There are 17.2 million warrants outstanding with an expiration date of April 6, 2015.
(Barron’s) Shares of Hewlett-Packard dropped $3, or 8%, at $37 after the company this morning beat fiscal Q2 revenue and EPS estimates, but cut its full year view below analysts’ estimates, in keeping with a memo from CEO Leo Apotheker reported by The Wall Street Journal last night that suggested tough times ahead. Q2 revenue rose 2.5% to $31.63 billion, yielding EPS of $1.24, versus expectations for $31.5 billion and $1.21.
For Q3, the company sees revenue of $31.1 billion to $31.3 billion, and EPS of $1.08 per share. That is below the consensus estimate of $31.8 billion and $1.23.
Revenue for the full year was forecast at $129 billion to $130 billion, and EPS of “at least” $5 per share. That is down from a prior forecast of $130 billion to $131.5 billion, and EPS of $5.20 to $5.28 per share. Analysts have been modeling $130.2 billion and EPS of $5.24.
Revenue in HP’s personal systems group, which contains the personal computer products, was down 5%, year over year. Commercial PC sales were up 13%, while consumer PC sales were down 23%, year over year.
Imaging and printing revenue was up 5%, services revenue was up 2%, enterprise revenue was up 15%, and software revenue was up 17%. HP’s financial services unit delivered growth of 17%.
The company’s conference call with analysts to discuss the results is coming up at 8:30 am this morning, and you can access it here. I believe that Apotheker is scheduled to appear any minute now on CNBC as well.
I would note that Gardner’s first take on HP, last night, after the memo was reported, was that it was “too late” to jump ship, and that with HP’s P/E in the single digits, the stock was already valued as a no-growth enterprise, hence, the intrinsic value of the shares should be higher than this morning’s depressed price.
With earnings of $5 for the year Hewlett is cheap at 7.5 X forward earnings. We are adding shares to accounts today on the selloff.
Very interesting article that explains what is going on with the Mississippi River and the water diversions.
We added more shares to accounts 8% lower than yesterday’s close using the Dell sale proceeds.
Nvidia beat and has a positive forecast but analysts don’t want to believe management. The share price is down 10% in trading today.
Loved it at $26 hate it at $18. (Forbes) Nvidia beat first-quarter estimates Thursday, and the company's outlook was solid but not outstanding. Nvidia forecast second-quarter sales of about $1.01 billion or 5% sequential growth, which was higher than the $992.4 million top line expected but in line with the pace analysts were looking for.
The overarching competitive issues were discussed on the earnings call with analysts Thursday. Nvidia executives said they expected the flat sales in its core graphics chips to be offset by growth in its mobile-chip business in the second quarter. But analysts questioned the company's assertion that the momentum that its Tegra mobile chips had at the beginning of this year was going to be as sustainable as the executives were forecasting. Specifically, there have been reports that Texas Instruments' OMAP chip has won the reference design for the next generation of Google (GOOG) Android phones running on Ice Cream Sandwich, the upcoming version of the software.
In a better market environment the shares would have popped $1. Instead they dropped $1.80. We are repurchasing our sale of yesterday since we only sold because of our worry about the reaction to earnings. Since earnings and forecast were positive we will go with management and not the analysts.
We took short profits in Nvdia and Dell. Nvidia earnings come tonight and we would rather be out than in for them. Dell is bouncing off its 12 month high and any market weakness may take it back lower to rest the $15 level.
(Barron’s) Shares of Yahoo! (YHOO) are down $1.39, or 7.5%, at $17.16, perhaps reflecting the company’s notice in a regulatory filing last night that an aspect of its overseas investment is being restructured. In its 10-Q filing with the Securities & Exchange Commission yesterday, the company said part of Alibaba Group Ltd., the China-based e-commerce venture in which Yahoo! holds a 43% stake, is being split off into a separate property.
To expedite obtaining an essential regulatory license, the ownership of Alibaba Group’s online payment business, Alipay, was restructured so that 100 percent of its outstanding shares are held by a Chinese domestic company which is majority owned by Alibaba Group’s chief executive officer. Alibaba Group’s management and its principal shareholders, Yahoo! and Softbank Corporation, are engaged in ongoing discussions regarding the terms of the restructuring and the appropriate commercial arrangements related to the online payment business.
Alibaba, along with Yahoo! Japan, have been consistently seen as a goldmine for Yahoo! amidst the trouble in its core business. Hence, perhaps some volatility in the stock whenever there’s any perceived change in the nature of those investments.
Stocks cratered in response the volatility in the commodities sector where Oil dropped $4 and Gasoline 40 pennies per gallon on news of an unanticipated inventory build. The Oil/Gold/Silver trade is very crowded with hedge funds and mom and pop and that affects stocks in that when margin requirements are raised or there are margin calls some folks including big boys and girls have to sell stocks to raise cash.
We added to our Boston Scientific position after the shares dropped 10% in price at midday on news that the CEO will retire in December. CEOs come and go. Unless there is other news the drop was not warranted although it was good for the CEO's ego but not the shares he holds.
Asia was slightly lower overnight as is Europe at midday. Greece’s rating was lowered by S&P (yawn) but that is the negative news of the start of trading that has the markets in neutral. For some reason the 3% rally in the dollar over the past few days is also a negative. But the drop is the dollar over the past year has been a negative. Go figure. Oil is up $3 to $100 so the $4 per gallon local gas price only has to drop 7% this week to meet the drop in the price of oil. Fat chance. Gold is up $15 to $1506.
(Huffington Post) Home values fell 3 percent during the first three months of this year, for the biggest quarterly drop since 2008, according to a new report from data provider Zillow. Even as the stock market climbs to three-year highs, and as payrolls tentatively expand, housing continues to fall in almost every U.S. metro area. Prices won't find a bottom until 2012 at the soonest, Zillow predicts, meaning American homeowners could be in for at least another year of pain.
"Home value declines are currently equal to those we experienced during the darkest days of the housing recession," Zillow chief economist Stan Humphries said in a statement. "With accelerating declines during the first quarter, it is unreasonable to expect home values to return to stability by the end of 2011."
Even though the recession officially ended in June 2009, the real estate market has yet to hit bottom. Since the peak in 2006, home values nationally are down 29.5 percent, Zillow says. Compared to this time last year, prices are down 8.2 percent nationally.
(crooksandliars.com) The economy added 1.3 million private-sector jobs between February 2010 and January 2011, and the headline unemployment rate edged downward, from 9.8% to 8.8%, between November of last year and March. It inched upward in April, to 9%, but tempering that increase was the news that the economy added 244,000 jobs last month (not including those 62,000 McJobs), beating economists' expectations.
The evidence points to the latter. According to a recent analysis by the National Employment Law Project (NELP), the biggest growth in private-sector job creation in the past year occurred in positions in the low-wage retail, administrative, and food service sectors of the economy. While 23% of the jobs lost in the Great Recession that followed the economic meltdown of 2008 were “low-wage” (those paying $9-$13 an hour), 49% of new jobs added in the sluggish “recovery” are in those same low-wage industries. On the other end of the spectrum, 40% of the jobs lost paid high wages ($19-$31 an hour), while a mere 14% of new jobs pay similarly high wages. As a point of comparison, that's much worse than in the recession of 2001 after the high-tech bubble burst. Then, higher wage jobs made up almost a third of all new jobs in the first year after the crisis.
Indeed in 2010, one in four jobs added by private employers was a temporary job, which usually provides workers with few benefits and even less job security. It's not surprising that employers would first rely on temporary hires as they regained their footing after a colossal financial crisis. But this time around, companies have taken on temp workers in far greater numbers than after previous downturns. Where 26% of hires in 2010 were temporary, the figure was 11% after the early-1990s recession and only 7% after the downturn of 2001.As many labor economists have begun to point out, we're witnessing an increasing polarization of the U.S. economy over the past three decades. More and more, we're seeing labor growth largely at opposite ends of the skills-and-wages spectrum -- among, that is, the best and the worst kinds of jobs.
(NYT) Nvidia Corp. placed a $367 million bet on a novel technology for wireless chips to help build its foothold in smartphones and tablet-style computers.
The Silicon Valley chip maker on Monday struck an all-cash deal for Icera Inc., a start-up in Bristol, England that has spent nine years pursuing an unusual programmable technology for what the industry calls baseband communication functions.
Nvidia, a specialist in computer graphics, has added microprocessor technology to compete in mobile devices—but also needs baseband capability to match rivals such as Qualcomm Inc. and Intel Corp.
"As a result of this acquisition we have two of the most important processors in mobile computing," said Jen-Hsun Huang, Nvidia's chief executive, in an interview.
Most companies add special circuitry for each set of communications protocols. Icera, by contrast, designed more general-purpose processors that use software to handle different wireless standards.
That means the same chip could work on 2G, 3G and 4G cellular networks, for example, and be upgraded to handle new features. Each piece of silicon also tends to be smaller, a savings in space and manufacturing cost, Icera says.
Icera, founded in 2002, raised some $250 million in venture capital over the years. Stan Boland, its president and chief executive, says the company started out with accessories known as dongles that help laptop computers connect to wireless networks. He said Icera is just starting to deliver samples of its chips aimed at cellular handsets.
Mike Thelander, an analyst with Signals Research Group, said his firm recently conducted tests that found Icera's technology was within "spitting distance" of market leader Qualcomm's. But he believes Icera has struggled to get accepted by cellphone makers, because of concerns about its size and staying power.
As a result of the deal, Mr. Thelander said, Icera has the backing of a big-name company and Nvidia gets the baseband capability it needs to offer customers a more complete bundle of technology. "It's really a win-win-win," he said.
Mr. Huang said Nvidia still expects its chips to work alongside baseband processors from other companies, when customers prefer it. Meanwhile, having an in-house baseband technology makes it more feasible to create products that combine a microprocessor and baseband on one piece of silicon.
Most smartphones and tablets now keep those functions separate, Mr. Huang noted, but such integrated products are at least a theoretical possibility as a result of the deal. "We don't have any plans at the moment, but we certainly have the ability to do it," he said.
Nvidia, which reports its fiscal first-quarter earnings on Thursday, said Monday it sees the deal slightly trimming its operating profit through the first half of the 2012 calendar year, and adding to it in the second half of next year. The deal has been approved by both companies' boards and is expected to be completed in 30 days.
Oil gained $5 so any gasoline price changes are off. Sorry. Gold regained $16. The major market measures traded higher most of the day with little conviction- also known as no volume. Breadth ended the day positive.
Oil is down another $2 to $97 and Gold is weak but only down $2 as the trading day begins. Asia was mixed overnight and Europe is higher at midday as markets await the Employment Report.
U.S. economy adds 244,000 jobs in April; unemployment rate is 9%. Total private payrolls increased 268,000 which is the largest monthly increase since April 2006. The numbers were better than and the major market measures are higher on the news.
(WSJ) J.P. Morgan Chase & Co.'s trading activities recorded a net gain in every trading session for the first quarter, the company said in a filing early Friday.
The bank, the second-largest U.S. bank by assets behind Bank of America Corp., said the so-called perfect quarter included average daily revenue of $112 million in the trading operations. Seven days in the period, which ended March 31, had more than $160 million in revenue.
J.P. Morgan had posted a perfect quarter in the fourth quarter, as well, but Jes Staley, the head Morgan's investment bank, said at the time he didn't expect that to continue. Mr. Staley, when revealing the fourth quarter's performance at the bank's investor day said, "I fully expect trading loss days to come back."
For 2010, the bank had a daily net loss only eight times, all in the second quarter. In 2009, the bank had 42 days of losses and it had 97 in 2008.
Bank of America also said it posted a perfect quarter during the first three months of the year.
We switched Barnes & Noble with a nice short profit to Aéropostale.
The major market measures were up over 1% after three hours of trading when a rumor swept to internet that Greece was leaving the Euro-Zone- or maybe not- or maybe would default or maybe who knows. The major measures quickly lost two/thirds of the gain as the HFT kids pushed their buttons before stabilizing at lower levels. And so goes investing in the world of High Frequency Trading.
The major market measures managed to hold some gains into the close in light trading. Breadth was 2/1 to the good. The S&P 500 closed at 1340 support/former resistance.
"Giving debt relief to people that really need it, that's what foreclosure is."[Homeowners] are probably better off going somewhere else, because they get relieved almost 100% of the debt through foreclosure." Jamie Dimon, CEO of JP Morgan.
The market measures are lower pre-opening as Jobless claims jumped to 474,000 when 400,000 were expected. Oil has a $106 handle and Gold is back down to $1500 as the trading day begins. European bourses are 1% lower at midday and Asia was mixed small overnight.
(WSJ) In the first four months of this year, average daily trading volume of stocks listed on the New York Stock Exchange and Nasdaq Stock Market is down 15% from 2010's pace, running at an average rate of 6.3 billion shares a day. Volume has been edging lower throughout the year, with April's daily average of 5.8 billion shares marking the slowest month since May 2008.
"The ripple effects across trading from the lack of fundamental demand are very real," said Jose Marques, global head of electronic equity trading at Deutsche Bank AG.
A big reason for the decline in volumes has been a general quieting of the big swings in stock prices commonly seen from 2008 through the first half of 2010. That has been reflected in a decline in the Chicago Board Options Exchange volatility index, also called the VIX, which last month fell to its lowest level since July 2007.
The declines in volatility and volume have been bad news for high-frequency traders, whose strategies generally rely on squeezing profits out of the tiny differences between the buy and sell orders of stocks within a fraction of a second. High-frequency traders also act as liquidity providers in the market, often taking the other side of a trade from long-term investors.
(WSJ) General Motors Co. said Thursday its net income tripled in the first quarter due to stronger vehicle sales and sales of assets, including its stake in Delphi Automotive LLP.
GM said net income rose to $3.2 billion or $1.77 a share, from $865 million or 55 cents a share, beating analyst estimates of about 93 cents a share. Operating profit, reflecting the strength of its core automotive business, increased to $2 billion from $1.7 billion. Revenue increased 15%, to $36.2 billion, from $31.5 billion.
(streetinsider.com) Aéropostale (NYSE: ARO) reports total sales for Q1 were $469.2 million, up 1 percent from the same period last year. Same store sales down 7 percent. ARO lowered its Q1 EPS guidance from 35-38c to about 20c. The Street was looking for quarterly EPS of 37c. We repurchased shares as the stock price fell $3.80 on the news. We have traded ARO profitably for past few years.
Productivity growth slowed to a 1.6% pace in the first quarter and 1.3% compared to a year ago. This helps explain why net hiring has improved, but not enough to prompt workers who were sidelined by the recession to throw their hats back into the ring and rejoin the labor force.
In a related development, unit labor costs rebounded after contracting in the fourth quarter, but remain limited. This, along with rising input costs has put a bit of a squeeze on profit margins. The exception is the manufacturing sector, where productivity growth rose at a 6.3% pace and unit labor costs continued to plummet. Indeed, our manufacturing workers are easily the most productive in the world, a fact too often overlooked by those predicting the end of American manufacturing.
Separately, unemployment claims surprised many and surged by 43,000 to 474,000 at the end of April. Several factors contributed to the rise, not least the disruption in Japanese production and a new extension of unemployment benefits in Oregon. That said, it is hard to ignore the fact that claims have been trending in the wrong direction - up instead of down - in April. This coupled with some renewed concern about the European debt crisis, which marked the start of a slump in growth last spring and summer, is not exactly reassuring.
Bottom Line: Today marks the infamous "flash crash" of a year ago. Although the U.S. economy appears to be on more stable footing than it was then, it provides a useful reminder of how weak the recovery still is. Labor markets are taking a particularly long time to heal. Some of the weakness is transitory, but that provides little solace for those who are now running out of employment benefits.
Silver is down $3 today and 25% in price since last Friday. Oil is down $6 to $102 which may be related to some trapped longs in Silver.
Tomorrow the Government Employment Report for April will please either the bulls or bears or maybe no one. Today’s market action is being influenced by the devastation being experienced by commodities bulls who are getting their lunch and dinner handed to them on a silver platter.
The major measures closed down 1% and more in moderate trading. Breadth was 3/2 negative. And tomorrow is another day. Oil closed down 10% today at $98. Maybe gasoline prices will drop 10%. Not. Gold lost $46 to $1468 and Silver ended at $35.52.
Asia was mildly lower overnight and Europe is mixed at midday. Gold is down $8 and Oil has a $110 handle with U.S futures flat as the trading day begins. ADP suggests 179,000 jobs were created in April which is lower than hoped. The Government number comes Friday for the big boys and girls to have their fun.
The ADP report on private sector employment rose by 179,000 in April, less than expected, as hiring cooled slightly in the face of higher energy prices and the associated political uncertainty in oil-producing countries. Gains were concentrated in small and mid-sized firms. We are beginning to see the payoff from the surge in initial public offerings (IPOs) at the end of 2010, which is creating a tailwind. Young firms, in particular, which are often counted as small businesses, are finally hitting a critical mass and hiring. Facebook and its plan to hire more than 20,000 workers, more than McDonalds is just one example.
Indeed, gains in the service sector, which includes many emerging companies, far outpaces gains in manufacturing. Hiring in the manufacturing sector is still on the upswing for both blue- and white-collar workers.
Bottom Line: Today's ADP report, coupled with some disappointing increases in jobless claims in recent weeks, suggest that the "official" report on payroll employment for April will also disappoint on Friday. Public sector layoffs, in particular, are expected to remain elevated and add to the headwinds for private sector employment, which also moderated a bit over the month.
On May 2 we mentioned that margin retirements on Silver had been raised to $16,200 per contract. We neglected to mention that the contract controlled 5000 ounces of silver and thus was worth $250,000 when silver was at $50 an ounce last week. Today with silver at $39 an ounce that one tract is worth $195,000. If a speculator had put up the minimum of $14,000 required last week that speculator would be wiped out and owe $41,000.
The major market measures are 1% lower at midday with the S&P near support and former resistance of 1340.
The major market measures closed lower in usual trading. Breadth was negative and the financials were for sale all day.
Asia and Europe were lower overnight. Gold is $1544 and Oil has a $112 handle as the trade day begins. U.S stocks opened lower but re flat lining after one half hour of trading.
(streetinsider.com) FBR Capital reiterates an 'Outperform' on Fifth Third Bancorp (NASDAQ: FITB), PT $17. FBR analyst says, "NPAs declined in the C&I, construction, and residential portfolios, but there was a slight tick up in CRE NPAs. The modest increase in CRE NPAs prevented a more meaningful increase in reserve releases from $190M in 4Q10. This is likely a result of the company's continuing drag from its Michigan and Florida CRE loan portfolio. On the earnings front, pre-tax, pre-provision earnings also declined, but should be sustainable through FY11 as mortgage banking bounces back slightly from a poor quarter. With a strong capital base and relatively attractive valuation of 9.7x FY12E EPS, FITB should be positioned to outperform when it starts to put its capital to work. We are increasing our FY11 operating EPS estimates to $1.20 from $1.05 due to the current quarter's results and lower provisions and maintaining our FY12 operating EPS estimate of $1.40."
The reason NVDA is down this morning is this story on thestreet.com which is old new news: The new desktop iMacs feature Intel's new 32-nanometer technology, which uses quad core processors and a Turbo Boost feature to crank up the computing speeds. The iMacs also house the Thunderbolt -- a speedy variation on the USB and FireWire data connections -- that was developed for Apple by Intel. Prices of the iMacs range from $1,200 to $2,000 and each option includes the Sandy Bridge quad-core chip.
The move, though expected, is a welcome endorsement for Intel, after the chip maker got off to a rocky start earlier this year when it had to recall the first shipments of its new processors. And while Apple embraced Intel for its computing processors, it also put AMD in the inner circle by choosing its ATI Radeon graphics processors for all the iMacs.
This chip choice is bad news for graphics chip rival Nvidia which had been in previous versions of the iMacs.
We can’t be that lucky.
Shares of Alcoa, Inc. (NYSE: AA) are higher in early trading Monday on unsubstantiated takeover rumors. While Alcoa has been the target of takeover speculation in the past, today's rumors appear to have originated with trading sources and likely have little merit. Nonetheless, shares of AA are up 2.5 percent to $17.65. Yesterday, Goldman Sachs upgraded shares of AA to Buy, citing improving supply chain dynamics. In addition to today's rumors, the stock could be seeing follow-through from this bullish call.
UPDATE: Reuters reported that the rumored suitor for Alcoa (NYSE: AA) is Rio Tinto (NYSE: RIO). According to traders, rumors are they secured a $US25 billion syndication loan to acquire Alcoa for $US25.5 per listed share.
And so how do you tell your wife not to go shopping?
A rookie trading card for Wayne Gretzky sold to an anonymous bidder for $94,163, a record for a hockey card, SCP Auctions, Inc. said on its website. Hall of Famer Gretzky, 49, holds National Hockey League records for goals, assists and points. He led the Edmonton Oilers to Stanley Cup championships in 1984, 1985, 1987 and 1988 and retired in 1999.
GM sales up 24% in April; Chrysler’s up 22%; and Ford’s were up 16%.
The major market measures closed lower with the S&P down 0.5% and NAZZ losing .75% while the DJIA was positive at the close on programs. Financials had a bid all day and breadth was flat with volume light as usual. Maybe light volume is moderate volume.
Oil is down $1 and Gold is flat as the trading day begins. Asia was higher although China was closed and Europe also is firm. U.S. futures indicate a higher opening. Talking heads are giving the death of Bin Laden as the reason for the positive tone.
We are adding Alcoa to accounts. We traded for profit last year and then it got away from us. We are buying gingerly because it has been volatile for the last three years. It has a huge amount of debt which offers earnings leverage but that leverage goes both ways. (StreetInsider.com)Goldman Sachs upgraded Alcoa (NYSE: AA) from Neutral to Buy and raised their 6-month price target from $17 to $22, citing improving supply chain dynamics. The firm states, "We view the structural industry change, driven by the de-linking of alumina from the aluminum price, as a potential major long-term contributor to Alcoa, which is the largest global third-party alumina seller." Goldman is also positive on the cyclical upturn in the aerospace cycle. The firm sees Alcoa earnings $1.40/$1.65 in 2011/2012, up from $1.10/$1.25, and about 6%/11% higher than consensus. The firm said Alcoa can earn $1.95 on a normalized basis.
Last Friday we added Microsoft to accounts after it sold off even though earnings and sales were above expectations. (briefing.com) Microsoft (MSFT $25.89 -0.82) reported third quarter earnings of $0.61 per share, including a $0.05 tax benefit primarily related to an agreement with the IRS to settle a portion of their audit of tax years 2004 to 2006, $0.05 better than the Thomson Reuters consensus of $0.56. Revenues rose 13.3% year-over-year to $16.43 billion versus the $16.19 billion consensus.
Microsoft Business Division revenue grew 21% year-over-year. Server & Tools revenue grew 11% year-over-year, the fourth consecutive quarter of double-digit growth. Online Services Division revenue grew 14% year-over-year primarily driven by increases in search revenue. Bing's US search share increased to 13.9% this quarter. Entertainment & Devices Division grew 60% year-over-year, fueled by Kinect for Xbox 360, the fastest-selling consumer electronics device in history, continued strong Xbox 360 console sales and growth of Xbox Live.
Microsoft reaffirmed its operating expense guidance of $26.9 billion to $27.3 billion for the full year ending June 30, 2011. Microsoft also offers preliminary FY12 operating expense guidance of 3% to 5% growth from the mid-point of fiscal year 2011 guidance or $28.0 billion to $28.6 billion. Office had another huge quarter, again exceeding everyone's expectations, and the addition of Office 365 will make our cloud productivity solutions even more compelling. We continue to see strong adoption of our cloud-based services among the Fortune 500."
We also added Goldman Sachs to a few larger accounts for a trade.
Back during the Hunt Silver corner in 1979 the Commodities exchanges first raised margin requirements and then allowed no more opening positions in silver. In effect the exchanges changed the rules. The same may happen again. The house never loses and if someone knows when the house is going to change the rules they can make a lot of money.
(Bloomberg) Silver prices fell sharply Monday after CME Group hiked the amount of cash needed to hold speculative positions in the metal, while gold declined on news that al Qaeda leader Osama bin Laden had been killed in a U.S.-led operation in Pakistan. Initial margins increased to $14,513 a contract from $12,8525, effective from the close on April 29, CME, parent of the Chicago Board of Trade and Chicago Merc, said in a statement.
Construction spending increased a stronger-than-expected 1.4% in March after losing ground in February, but gains remained uneven. Residential construction actually increased, but compared to very low levels. There were also some increases in commercial and public construction. Transportation was off compared to March of last year; much of that activity is funded by state and local governments, many of which are cutting everywhere that they can to offset revenue shortfalls. Not surprisingly, construction on educational buildings was also curtailed compared to last year, a harbinger of cuts in the pipeline for teachers as well.
Separately, the Institute for Supply Management (ISM) manufacturing index decreased to 60.4 in March, but remained well above levels consistent with robust manufacturing activity. Order backlogs, in particular, improved as many tried to stockpile inventories ahead of commodity-led price increases. Manufacturers were divided, however, on their ability to pass on higher input costs and many complained of the toll those higher input prices took on profit margins. Manufacturers engaged in exporting were better able to pass along price increases to foreign buyers, who are experiencing stronger economic growth.
Bottom Line: The economic and political news today looks a little better than it did last week. There is a sense of relief. Nothing, however, can bring back the nights of sleep lost during the height of the financial crisis or during the months after 9/11. I hope the events of the last two days provide some sense of closure to those who suffered and give our troops the purpose and validation they deserve in serving our country.
We sold Yahoo for an almost $3 gain and placed part of the profit in Talbots warrants. They are our 4 year – so far not so good speculation – on Talbots eventually recovering.
The major market measures couldn’t hold their Osama is dead gains and closed mildly lower on the day in light trading. Breadth was negative at the bell. Gold ended at $1544 and Oil was $113.14. | 2019-04-23T04:54:56Z | http://www.lemleyletter.com/lemley_home_May2011.html |
ABUJA, Nigeria (June 7, 2010) – Bill Gates, co-chair of the Bill & Melinda Gates Foundation, gave the Kick Polio Out of Africa (KPOA) campaign a boost today by signing the football which is traveling from Cape Town to Egypt ahead of the 2010 World Cup. During the ball’s epic journey through 22 polio-affected and high-risk countries, Rotary clubs throughout Africa are mobilizing the public for massive immunizations and raising awareness for polio eradication. Gates lauded Rotary’s efforts to help kick polio out the continent -- and eventually out of the world.
Gates also commended Nigeria for making significant gains in the fight against polio and urged them to finish the job. He joins Nigerian officials in bringing attention to the current immunization rounds throughout Africa targeting more than 100 million children under the age of five.
After traveling for almost four months across the continent, the football is close to reaching it final destination in Alexandria, Egypt. The grand campaign finale will be held at the Bibliotheca Alexandrina, on 12 June, under the auspices of First Lady Suzanne Mubarak. African Cup of the Nation champions will kick the ball -- symbolically kicking polio out the continent and into the Mediterranean Sea. Also attending the event will be film star and polio goodwill ambassador Hany Salama, polio-infected children, government officials, and dignitaries.
On 23 February, Rotary launched its “Kick Polio out of Africa” awareness campaign in Cape Town, one of the host cities to the 2010 World Cup, with the symbolic kicking of a ball signed by Emeritus Archbishop Desmond Tutu. Afflicted with polio as a child, Tutu joined the campaign as goodwill ambassador. From Egypt, the ball will travel to Montréal, Canada, to be presented at the Rotary International Convention later this month. The ball’s journey is being underwritten by DHL Express.
In support of the campaign, Rotary launched a virtual ball inviting football fans and supporters around the world to sign the ball. With a few simple clicks of a mouse, one can sign the online ball at www.kickpoliooutofafrica.org and join the global movement of solidarity to save all children from this crippling and sometimes fatal disease. The signatures will be formally presented to the spearheading partners of the Global Polio Eradication Initiative after the 2010 World Cup.
“We are calling on the continent's football players to bring their enormous influence to this campaign. Only unified efforts which galvanise whole societies towards these goals will succeed in kicking this virus, that looks so much like a football, out of Africa and eventually, out of the world,” declared former South African President Nelson Mandela, in his 1996 address at the Organization for African Unity Summit as he formally kicked off the “Kick Polio out of Africa” campaign.
Polio eradication has been Rotary’s top priority for more than two decades. The international humanitarian service organization has contributed more than US$900 million toward a polio-free world, and is a spearheading partner in the Global Polio Eradication Initiative, along with the World Health Organization, the U.S. Centers for Disease Control and Prevention, and UNICEF.
The football’s journey can be followed on http://kickpoliooutofafrica.wordpress.com.
To sign and kick the virtual ball, go to www.kickpoliooutofafrica.org.
We estimate the protective efficacy of insecticide-treated mosquito nets and indoor-residual spraying on reducing malaria-attributable mortality 1–59 months to be 55%, with a range of 49–61%, in Plasmodium falciparum settings.
We estimate malaria prevention interventions in pregnancy (intermittent preventive therapy and insecticide-treated mosquito nets) to have a pooled protective efficacy of 35% (95% confidence interval: 23–45%) on reducing the prevalence of low birth weight in the first or second pregnancy in areas of stable Plasmodium falciparum transmission.
These data support the continued scale-up of these malaria prevention interventions in endemic settings that will prevent a considerable number of child deaths due directly and indirectly to malaria.
These protective efficacy estimates will allow the use of the LiST model for estimating the likely impact of past intervention scale-up, as well as for predicating future impact of intervention scale-up by national malaria control programs.
Published by Oxford University Press on behalf of the International Epidemiological Association. © The Author 2010; all rights reserved.
1Department of International Health and Development, Tulane University School of Public Health and Tropical Medicine, New Orleans, LA 70112, USA and 2Malaria Control and Evaluation Partnership in Africa (MACEPA), a program at PATH, Batiment Avant Centre, 01210 Ferney-Voltaire, France.
Background Insecticide-treated mosquito nets (ITNs) and indoor-residual spraying (IRS) are recommended strategies for preventing malaria in children. While their impact on all-cause child mortality is well documented, their impact on reducing malaria-attributable mortality has not been quantified. While the impact of intermittent preventive therapy in pregnant women (IPTp) and ITNs in pregnancy for improving birth outcomes is also well established, their impact on preventing neonatal or child mortality has not been quantified.
Methods We performed two systematic literature reviews in Plasmodium falciparum endemic settings; one to estimate the effect of ITNs and IRS on preventing malaria-attributable mortality in children 1–59 months, and another to estimate the effect of ITNs and IPTp on preventing neonatal and child mortality through improvements in birth outcomes.
Results We estimate the protective efficacy (PE) of ITNs and IRS on reducing malaria-attributable mortality 1–59 months to be 55%, with a range of 49–61%, in P. falciparum settings. We estimate malaria prevention interventions in pregnancy (IPTp and ITNs) to have a pooled PE of 35% (95% confidence interval: 23–45%) on reducing the prevalence of low birth weight (LBW) in the first or second pregnancy in areas of stable P. falciparum transmission.
Conclusion This systematic review quantifies the PE of ITNs for reducing malaria-attributable mortality in children, and the PE of IPTp and ITNs during pregnancy for reducing LBW. It is assumed the impact of IRS is equal to that of ITNs on reducing malaria-attributable mortality in children. These data will be used in the Lives Saved Tool (LiST) model for estimating the impact of malaria prevention interventions. These data support the continued scale-up of these malaria prevention interventions in endemic settings that will prevent a considerable number of child deaths due directly and indirectly to malaria.
Fortunately, effective interventions for preventing malaria mortality in children are available and are being scaled-up across malaria endemic areas of Africa. These include insecticide-treated mosquito nets (ITNs), indoor-residual spraying (IRS) and intermittent preventive therapy in pregnant women (IPTp). Both ITNs and IRS prevent malaria transmission by reducing the chances that an individual will be bitten by an infective Anopheles mosquito. IPTp is the administration of two or more treatment doses of an effective antimalarial drug given at defined intervals during pregnancy of at least 1 month, regardless of whether the woman has a parasite infection at the time of treatment. It acts as treatment of existing infections (symptomatic or not) and as prophylaxis by limiting the development of infection for an interval of time in pregnancy.
ITNs and IRS are recommended strategies for preventing malaria in children with their impact on all-cause child mortality (ACCM) well demonstrated.3–7 Two ITN trials have attempted to assess the effect of ITNs on mortality due to malaria in children.8,9 However, these studies yielded non-significant results that were inconsistent with reductions in ACCM, likely because of misclassification bias from post-mortem verbal autopsies.10–12 Thus, their impact on reducing deaths due to malaria in children has not been well quantified. While IPTp and ITNs for preventing malaria in pregnancy and improving birth outcomes is also well established, their impact on preventing neonatal or child mortality has not been quantified. We performed systematic literature reviews to identify individual and community-randomized controlled trials to estimate the effect of ITNs and IRS on preventing malaria-attributable mortality, defined here as mortality due directly to malaria, in children 1–59 months (assuming no malaria deaths occur during the neonatal period), and to estimate the effect of ITNs and IPTp on preventing neonatal and child deaths through improvements in birth outcomes, in P. falciparum endemic settings.
These reviews of effectives of the interventions are shaped in large part by the needs of the Lives Saved Tool (LiST) model. In that model, increases in coverage of an intervention results in a reduction of one or more cause-specific deaths or in reduction of a risk factor. Therefore, the reviews and the GRADE process used were designed to develop estimates of the effect of an intervention in reducing either a risk factor or a death due to specific cause. For more details of the review methods, the adapted grade approach or the LiST model see other articles in this supplement.
To quantify the protective effect of ITNs and IRS in preventing direct-malaria deaths in children, and for IPTp and ITNs among pregnant women in preventing neonatal and child deaths through improved birth outcomes, we conducted a systematic literature review to identify individual and community-randomized controlled trials using PUBMED, WHOLIS, CAB Abstracts via OVID Global Health, SIGLE and LILAC search engines. An attempt was made to identify unpublished studies through contact with experts in the field. Studies were limited to those implemented in areas of endemic P. falciparum malaria transmission. Where insufficient data from individual or community-randomized controlled trials could be identified, we included quasi-experimental and observational studies.
Data from studies meeting the inclusion criteria, as outlined below, were reviewed and data were abstracted into a standardized dataset. Extracted data included the following study characteristics: site, duration, target population, design, intervention definition, outcome definitions, raw data on outcomes of interest, study effect with 95% confidence intervals (CIs) and standard errors for each outcome, and any noted limitations or biases. The study quality was assessed according to the GRADE technique adapted by the Child Health Epidemiology Reference Group.13 Studies were grouped according to type of study outcome and study designs for meta-analysis using STATA 10.0. Meta-analyses are reported as the Mantel–Haenszel pooled relative risks (RRs) with accompanying 95% CIs. For community-randomized controlled trials, the empirically estimated standard errors as reported in the literature, either directly or estimated from 95% CIs, were used in the meta-analysis.
We sought to measure the effect of ITNs in comparison with no mosquito net on child health outcomes in P. falciparum malaria endemic settings. To be included in this analysis, ITN trials had to measure one of the following outcomes among children under 5 years old: malaria-attributable mortality, all-cause mortality, incidence of severe or uncomplicated malaria or the prevalence of malaria parasite infection. Studies assessing the impact of insecticide-treated barriers for vector controls other than ITNs, such as insecticide-treated curtains, were excluded, as the LiST model only includes ITNs. A comprehensive and thorough Cochrane Review was performed through 2002 and published in 2004.3 Relevant data were included from the 2004 Cochrane Review, with our search focused on identifying eligible studies conducted after the inclusion dates of the Cochrane Review (post 2002). A combination of the following search terms was used: malaria, Plasmodium; bednet, mosquito net, ITN, LLIN, insecticide-treated, impregnated, permethrin, lambdacyhalothrin, deltamethrin and cyfulthrin. Studies that compared ITNs with untreated mosquito nets were excluded.
We sought studies that measured the effect of IRS compared with no spraying on child health outcomes related to malaria in P. falciparum malaria endemic settings. To be included in this analysis, IRS trials had to measure one of the following outcomes among children under 5 years old: malaria-attributable mortality, all-cause mortality, incidence of severe or uncomplicated malaria or the prevalence of malaria parasite infection. A combination of the following search terms was used: malaria, Plasmodium, IRS, insecticide, deltamethrin, Lambda-cyhalothrin, Icon, dichloro-diphenyl-trichloroethane and Bendiocarb. Studies that evaluated IRS plus another intervention (e.g. ITNs), for which the IRS-specific effect could not be isolated, were excluded.
We sought studies that measured the effect of at least two doses per pregnancy of IPTp with sulphadoxine–pyrimethamine (SP) vs a placebo on child health outcomes within P. falciparum malaria endemic settings, independent of ITNs. For IPTp trials to be included in this analysis, one of the following outcomes had to be measured: intrauterine growth retardation (IUGR), pre-term delivery, prematurity, low birth weight (LBW), perinatal mortality, neonatal mortality, infant mortality or child mortality. Two comprehensive reviews have been published with data through 2006.14,15 In addition to relevant data from the Cochrane Review meeting the inclusion criteria, a literature search was conducted limited to studies published after 2006. A combination of search terms was used including: malaria, Plasmodium, sulphadoxine, pyrimethamine, IPT, IPTp, intermittent preventive treatment and pregnancy. Trials that compared two doses of IPTp to another drug (not a placebo) were excluded, as were trials that assessed IPTp compared with ITNs where the effect of IPTp against a placebo could not be isolated.
We sought studies that measured the effect of access to ITNs among pregnant women vs no ITNs on child health outcomes within P. falciparum malaria endemic settings, independent of IPTp. For ITN trials to be included in this analysis, one of the following outcomes had to be measured: IUGR, pre-term birth, LBW, perinatal mortality, neonatal mortality, infant mortality or child mortality. Trials that compared ITNs with untreated nets were excluded, as were trials that assessed ITNs plus IPTp where the effect of ITNs against no mosquito net (placebo) could not be isolated. As a thorough and comprehensive systematic review was recently published with data through February 2009,16 we did not attempt to update their findings but reference those within the review that met our inclusion/exclusion criteria.
While there are robust data for the protective efficacy (PE) of ITNs against ACCM among children 1–59 months,3 no such data are currently available on their impact of malaria-attributable mortality. It was therefore necessary to derive an estimate of the PE of ITNs for reducing malaria-attributable mortality (PEMAM) from ACCM thusly.
where PEACCM is equal to the PE (per cent) of ITNs in reducing ACCM among children aged x, and ß is equal to an estimate of the per cent of deaths from all-causes due to malaria among children aged x in areas without access to malaria prevention interventions. Due to the likelihood of misclassification bias where ß is estimated from post-mortem verbal autopsies,10–12 we present two methods.
The first approach used a pooled estimate of the PEACCM among children 1–59 months across trials, represented as PEACCM 1–59 m, and an aggregate estimate of ß based on the per cent of all <5 deaths across 20 countries with stable malaria transmission in sub-Saharan African in 2000 that were due directly to malaria, which was estimated to be 22.4% (95% CI 19.8–24.9%), represented here as ß<5.17 However, it was then necessary to remove neonatal deaths from this estimate of ß<5 to get the proportion of all deaths 1–59 months due to malaria, represented by ß1–59 m. It has previously been estimated that 26% of child deaths occurred during the first month of life in sub-Saharan Africa between 2000 and 2003.18 Assuming no malaria deaths occur during the neonatal period, ß1–59 m was estimated as the per cent of malaria deaths <5 (ß<5 = 22.4%)/(100–26%) or 30.2%. Using Equation (1), the PE of ITNs on direct malaria mortality 1–59 months (PEMAM 1–59 m) is estimated as: the pooled PEACCM 1–59/30.2%.
An alternative disaggregated approach uses estimates of PEACCM 1–59 and ß within each ITN trial study site rather than using a pooled estimate of the PEACCM among children 1–59 months across trials (PEACCM 1–59 m) and an aggregate estimate of ß under the general premise outlined previously. Using equation (1), an estimate of PEMAM 1–59 m within each study site is obtained as: PEACCM 1–59/ß1–59 m. As estimates of ß within each study were obtained from post-mortem verbal autopsies among all children <5 years old, ß1–59 m was estimated with the removal of neonatal deaths as outlined above. The resultant PEDMM 1–59 m (%) were then transformed to RRs (RR = [(100 – PE)/100] and pooled across trials with a meta-analysis weighted by the inverse standard error of the RR for ACCM reductions obtained by each trial.
The Cochrane Review included 14 studies performed in stable P. falciparum endemic settings, all of which were conducted in sub-Saharan Africa. Ten of these studies included the effect of ITNs vs no nets with outcomes specific to children3 (Figure 1), of which three reported the effect of ITNs on ACCM8,19,20 (Supplementary Table 1). All of these trials used an intention-to-treat analysis for assessing the impact of ITNs on ACCM, where intervention villages were provided with high household ITN coverage (nearly 100%) and control villages received no ITNs. ITN use by children in these trials ranged from 50% to 97%, depending on the season. Four studies also reported the effect of ITNs on the incidence of uncomplicated malaria,21–24 while six reported the effect of ITNs on the prevalence of malaria parasitemia8,20,21,25–27 (Supplementary Table 1). Two trials that assessed the impact of ITNs on ACCM also attempted to assess their impact on malaria-attributable mortality; neither showed significant results.8,9 However, both were excluded from the 2004 Cochrane Review because of the likelihood of misclassification bias from post-mortem verbal autopsies that resulted in contradictory results with ACCM, which is a much more robust outcome measure. Both are also excluded here.
The systematic review of studies published after 2002 revealed 163 abstracts, of which 24 contained an outcome of interest. Only two of these studies were randomized trials, one limited to infants28 and one comparing ITNs to untreated nets.3 Both studies were therefore excluded. The resulting meta-analyses, which are largely consistent with the 2004 Cochrane Review without the inclusion of the trial assessing the impact of insecticide-treated curtains,29 show a PE of ITNs for reducing ACCM 1–59 months = 18% (RR = 0.82: 95% CI = 0.75–0.90) (Figure 2 and Table 1). Four trails show a PE of ITNs for reducing uncomplicated malaria incidence in children by 51% (RR = 0.49: 95% CI = 0.44–0.54), while six trials show a PE of ITN for reducing malaria parasite infection prevalence in children by 17% (RR = 0.83: 95% CI = 0.64–0.88) (Table 1).
Based on Rule 1,30 the PE of ITNs on reducing malaria-attributable mortality should therefore be derived from high quality evidence of reductions in ACCM. The first approach, as outlined in the materials and methods section, using the pooled estimate of the PEACCM among children 1–59 months across trials (PEACCM 1–59 m = 18%) and the aggregate proportion of all under five deaths due directly to malaria in 2000 1–59 months (ß1–59 m = 30.2%) yielded an estimate of the PE of ITNs at reducing malaria-attributable mortality 1–59 months = 60%. The second approach using the disaggregated method yielded a pooled PE of ITN at reducing malaria-attributable mortality 1–59 months = 49% (Table 2). Our best estimate therefore suggests that the PE of ITNs on malaria-attributable mortality 1–59 months ranges between 49% and 60%, with the point estimate for the LiST model being the mid-point of 55% (Box 1).
Malaria-attributable mortality among children 1–59 months.
Moderate (three high-quality community-randomized controlled trials assessing ITNs on the reduction of ACCM 1–59 months).
Moderate (all-cause mortality 1–59 months).
The literature review revealed 177 abstracts for IRS, of which 31 included outcomes of interest among children in P. falciparum endemic settings of sub-Saharan Africa (Figure 3). Seven studies met the inclusion criteria and are included in this analysis: three prior to 1976 and four since 1996 (Table 3).4–7,31–33 The only community-randomized controlled trial identified in the search was excluded because it was among refugees and therefore lacked external validity.34 Other studies with desired outcomes were excluded because they did not represent comparisons of IRS to control households, but included ITNs and other interventions. Two of the seven studies contained the outcome of IRS on ACCM,5,6 three contained all-cause infant mortality,5–7 three contained incidence of uncomplicated malaria7,31,32 and five contained the prevalence of malaria parasitemia in children6,31,32,35,36 (Supplementary Table 2).
While showing positive reductions in the malaria burden, all included studies evaluated the effect of IRS on child health outcomes using a pre/post-study design and therefore suffer from serious methodological weaknesses which limit internal validity and subsequent interpretation of results vis-à-vis IRS PE on malaria-attributable mortality (Table 3). Based on the fact that IRS impact on malaria morbidity has been shown to be similar to that of ITNs for which there are robust empirical data,37 IRS PE on malaria-specific mortality in the LiST model will be set equal to ITNs at 55% as described above.
The 2006 Cochrane Review and the 2007 review for IPTp included four studies performed in areas of stable P. falciparum transmission which included the effect of IPTp vs placebo with outcomes specific to birth outcomes or child health.14,15 An additional literature search limited to articles published after the Cochrane Review (post 2006) revealed 23 abstracts; the only trial which contained an outcome of interest was excluded because it assessed the impact of IPTp +ITNs vs ITNs alone, where the effect of IPTp alone vs a placebo could not be isolated38 (Figure 4). Of the studies included here, two contained the outcome of neonatal mortality,39,40 one contained perinatal mortality40 and three contained the outcome of LBW prevalence (<2500 g)39,41,42 (Supplementaey Table 3). All were conducted in sub-Saharan Africa. The meta-analysis of data available from two randomized controlled trials shows no evidence of a statistically significant reduction in neonatal mortality among women in the first or second pregnancy (Table 4).14 The one study that assessed the impact of IPTp on perinatal mortality was also insignificant among women in the first or second pregnancy. Based on two randomized controlled trials, the 2006 Cochrane Review shows that IPTp, isolated from ITNs, significantly reduces the prevalence of LBW with an RR of 0.58 (95% CI: 0.43–0.78) among pregnant women in their first or second pregnancy. A more recent review containing three randomized controlled trials (the two previous trials in the 2006 Cochrane Review plus one additional trial) within the context of SP resistance and ITNs in sub-Saharan Africa found IPTp among women in their first or second pregnancy significantly reduces the prevalence of LBW with an RR of 0.71 (95% CI: 0.55–0.92). A meta-analysis limited to studies without ITNs shows that IPTp reduces the prevalence of LBW with an RR of 0.64 (95% CI: 0.56–0.72), resulting in IPTp having a PE of 36% (95% CI: 28–44%) independent of ITNs (data not shown).
Results from two trials included in the recently published 2009 Cochrane Review show access to ITNs, isolated from IPTp, to reduce LBW with an RR of 0.71 (95% CI: 0.54–0.92), suggesting that ITNs have a PE of 29% (95% CI: 8–46%) among women in the first or second pregnancy in areas of stable P. falciparum transmission, independent of IPTp.16,41,43 While the Njagi (2002) study used individual randomization and the ter Kuile (2003) study used community randomization, both assessed the impact of access to ITNs based on intention-to-treat, thus individual use was not assessed. There was no available evidence of ITNs preventing pre-term deliveries or neonatal mortality.
As the effects of IPTp and ITNs used during pregnancy have similar causal pathways for improving birth outcomes as measured by LBW, and as there is no evidence of a synergistic effect between them,38 the data were pooled with a meta-analysis to yield an RR of 0.65 (95% CI: 0.55–0.77) for reducing LBW from either IPTp or ITNs among women in the first or second pregnancy (Table 4 and Figure 5). A pooled PE point estimate of 35% is therefore suggested for use in the LiST model for malaria prevention during the first two pregnancies with either IPTp or ITNs for preventing LBW (Box 2).
LBW among first or second pregnancies.
High (five high-quality randomized controlled trials assessing IPTp (3) and ITNs (2) on the reduction of LBW among a woman’s first two pregnancies).
Ideally, the impact of IPTp and ITNs in pregnancy could be quantified on the outcome of neonatal and/or infant mortality. However, as of yet the pooled estimate for IPTp and ITNs for reducing neonatal mortality is no statistically significant as the trials were not powered to detect slight changes in this outcome. As data become available it will be important to quantify the effect of malaria prevention interventions during pregnancy on neonatal and child mortality.
We performed a systematic review of the published and unpublished literature to quantify the best estimate for the PE of ITNs and IRS for preventing mortality due directly to malaria in children 1–59 months, and the effect of ITNs and IPTp on preventing neonatal and child deaths through improvements in birth outcomes, in P. falciparum endemic settings. Results will be used for the default settings of PE in the LiST model for estimating the number of child malaria deaths that can be prevented from scale-up of these malaria prevention interventions.
Two community-randomized controlled trials attempted to assess the impact of ITNs on malaria-attributable mortality.8,9 The trial from the Gambia showed a non-significant PE against child deaths due to malaria of 14%, while the trial from Ghana showed a non-significant reduction in PE of 22% against this outcome. These results are lower than expected and stand in contradiction to the trial results for the PE against ACCM of 23 and 18%, respectively, as well as compared with the results of this meta-analysis of an 18% PE of ITNs against ACCM. In light of these contradictions, we surmise error due to misclassification, which likely resulted in bias as well as increased variance about point estimates,10–12 limits the validity of these estimates from the Gambia and Ghana.
We used two methods to derive the PE of ITNs on malaria-attributable mortality based on their observed effect on ACCM. We surmise the first approach resulting in a PE of 60% yields the most robust estimate because the proportion of all deaths due to malaria was estimated across 31 studies within 14 countries with P. falciparum transmission between 1980 and 2000, thus it is likely less sensitive to systematic errors in post-mortem verbal autopsies as compared with the second method which was estimated across only three study sites in three countries.
We propose that the default coverage indicator for ITN and IRS in the LiST model use a composite indicator for the proportion of households protected by either intervention established from the following two indicators: the proportion of households with 1 ITN, and the proportion of households sprayed by IRS in the past 12 months.45 We suggest that ITN household possession be used instead of ITN use by children <5 for the following reasons. First, the trials from which the meta-analysis-derived 18% PE of ITNs on reducing ACCM 1–59 months were all based on intention-to-treat analyses, meaning the estimated RRs were based on whether or not a child lived in a village that was given ITNs or not; while use was measured separately within intervention villages, it never entered into the RR estimates. Second, ITN household possession captures the community effect of ITNs better than individual use. Third, ITN use among children ascertained by household surveys such as the Demographic and Health Survey and the Unicef Multiple Indicator Cluster Survey, which are implemented during the dry season, yield underestimates of use during higher transmission seasons.46–49 Fourth, use last night, as measured by household surveys, is likely the lowest measure of regular use over time. And last, use by a child under five likely underestimates use by anyone in the house, which is important vis-à-vis the ‘bait and kill’ effect that ITNs provide for reducing the overall abundance of Anopheles mosquitoes.
Our meta-analysis shows the PE of malaria prevention interventions in pregnancy (IPTp or ITNs) to have a pooled PE of 35% (95% CI: 23–45%) on reducing the prevalence of LBW in the first two pregnancies within areas of stable P. falciparum transmission. LBW has been shown to be associated with marked increases in neonatal and infant mortality.50–52 While LBW is due to either IUGR or pre-term delivery, the effect of malaria prevention interventions during pregnancy on LBW in the LiST model acts solely through IUGR with a 35% PE. Using IUGR as a proxy for LBW seems reasonable as it has been shown that IUGR is the predominant cause of LBW in settings of high malaria transmission.53,54 The effect of IUGR has two effects in the LiST model as noted elsewhere.30 First, children with IUGR have a greater RR of dying during the neonatal period, with increased RR of dying due to diarrhoea (RR = 2.0), sepsis/pneumonia (RR = 2.0) and asphyxia (RR = 2.3). Second, IUGR increases the chance that the child will be stunted, which in turn increases the RR for measles, malaria, diarrhoea and pneumonia deaths by ages in the post-neonatal period.
It should be noted that that malaria prevention during pregnancy shows a significant protective effect against perinatal mortality when two trials on regular prophylaxis are included in the analysis [RR = 0.73 (95% CI = 0.53–0.99)].14 One trial in the Gambia evaluated weekly pyrimethamine-dapsone provision55 while the other in Uganda assessed weekly chloroquine provision.56 However, we have chosen to omit these studies from the LiST model as continuous daily or weekly provision of antimalarials does not fit the definition of IPTp that is being implemented across stable P. falciparum malaria settings in sub-Saharan Africa.
Data from two randomized controlled trials show IPTp reduces neonatal mortality by 38% among women in the first or second pregnancy [RR = 0.62 (95% CI: 0.37–1.05)]; this result was not statistically significant as neither trial was powered to assess this outcome.39,40 This is supported by estimates that suggest LBW from malaria in pregnancy in areas of stable transmission account for as much as 11% of neonatal deaths and 6% of all infant deaths.52 Additionally, maternal malaria has been shown to be associated with increased risk of prematurity specifically, which has been shown to be associated with increased neonatal and early infant mortality.57–59 If this effect of IPTp/ITNs can be better quantified with additional data, from additional analyses of conducted randomized controlled trials or from observational data, its effect during pregnancy for reducing neonatal and infant mortality directly should be used in the LiST model instead of acting indirectly through IUGR. Until then, the effect of IPTp and ITNs on neonatal and early infant mortality, estimated through IUGR, will likely be underestimated in the LiST model.
We propose that the default coverage indicator in the LiST model for IPTp and ITNs used in pregnancy be comprised of a composite indicator for the proportion of pregnant women protected by either intervention established from the following two indicators: the proportion of women who received IPTp during antenatal care visits during their last pregnancy, and the proportion of pregnant women who slept under an ITN the previous night.45 In the LiST model for IPTp, the coverage indicator applies only to women in their first or second pregnancy in countries with stable P. falciparum transmission where IPTp is national policy. While the indicators for IPTp and ITNs are not contemporaneous, they are readily available from most national household surveys and approximate coverage of either intervention. However, the two studies that were used to quantify the effect of ITNs on birth outcomes used different units of randomization which has implications for selecting the appropriate coverage indicator for LiST.41,43 Njagi and colleagues (2002) randomized individual pregnant women to receive ITNs, which is much closer to assessing the individual effect of ITN use, while ter Kuile and colleagues (2003) randomized communities and thus their estimated PE is a result of whether or not a pregnant woman lived in a village with high ITN household possession. Thus, there is no perfect indicator of ITN coverage that matches both studies. For this reason, we have chosen to recommend ITN use (personal protection) over ITN household possession in the LiST model for assessing the impact of ITNs/IPTp on reducing LBW to be most conservative (i.e. ITN use is always lower than ITN household possession).
There are several limitations of using the LiST model to estimate the number of child malaria deaths that could be prevented through scale-up of prevention intervention coverage. First, the PE of ITNs and IRS is assumed constant across intervention coverage. Based on previous observations from the ITN trials, it is likely that the true protective effect of vector control interventions increases with increasing coverage due to a community effect, which at this point is unaccounted for in the LiST model.44 Second, the LiST model does not currently account for the PE of ITN/IRS scale-up on indirect malaria mortality where malaria is eliminated as a coinfection that contributes to a child death. This likely results in a significant underestimation of the true number of child deaths that could be prevented from malaria prevention intervention scale-up. Third, the coverage of interventions in the LiST model are assumed independent, while in reality it is likely people exposed to one malaria intervention are more likely to be exposed to other malaria interventions as a result of access to health care issues, resulting in an overestimate of impact. And last, the LiST model does not account for any possible synergistic effect between ITNs and IRS for preventing child malaria deaths. If data become available that show any such effects, the LiST model should account for this dimension on PE.
Unfortunately, birth and death registries are generally not available in most malaria-endemic countries for ascertaining changes in malaria-specific mortality. Until such data become available, the LiST model should be used to estimate the likely impact that is occurring across countries vis-à-vis prevention of child malaria deaths from intervention coverage scale-up. Additionally, there are now several rounds of population-based household surveys, such as the Demographic and Health Survey and the Multiple Indicator Cluster Survey, that allow the measurement of child survival intervention coverage and ACCM at two or more time points. As a result, the usefulness of the LiST model could potentially be gauged from comparison with empirical data on time trends in ACCM and intervention coverage from these surveys.
An additional systematic review focused on quantifying the PE of additional malaria interventions against child mortality that will be included in the LiST model is planned, including case management of uncomplicated and severe malaria and intermittent preventive therapy in infants. Additionally, future versions of the LiST model will include interventions that prevent miscarriage and stillbirths. As there is evidence that access to ITNs in the first or second pregnancy in areas of stable P. falciparum transmission prevents fetal loss (RR = 0.67, 95% CI = 0.47 – 0.97),16 this intervention will be incorporated into future versions of LiST for estimating this outcome.
This systematic review quantifies the PE of ITNs and IRS for reducing malaria-attributable mortality, and the PE of IPTp and ITNs during pregnancy for reducing LBW. These data support the continued scale-up of these malaria prevention interventions in endemic settings that will prevent a considerable number of child deaths due directly and indirectly to malaria. These PE estimates will allow the use of the LiST model for estimating the likely impact of past intervention scale-up, as well as for predicating future impact of intervention scale-up by national malaria control programmes.
US Fund for UNICEF from the Bill & Melinda Gates Foundation (grant 43386) to ‘Promote evidence-based decision making in designing maternal, neonatal and child health interventions in low- and middle-income countries’.
This study was part of a large effort by the Child Health Epidemiology Reference Group to document the protective efficacies of child survival interventions for use in the LiST model. We thank all CHERG members for their comments, collaboration and encouragement throughout this process. We also thank Richard Cibulskis (WHO), Mac Otten (WHO), Alex Rowe [Centers for Disease Control and Prevention (CDC)], Steven Yoon (CDC), Meghna Desai (CDC), Larry Slutsker (CDC) and Jacek Skarbinski (CDC) for their thoughtful comments on the draft manuscript. The Department of International Health and Development, Tulane University School of Public Health and Tropical Medicine is also thanked for its support.
3 Lengeler C. Insecticide-treated bed nets and curtains for preventing malaria. Cochrane Database Syst Rev (2004;) CD000363.
4 Bradley D. Morbidity and mortality at Pare-Taveta, Kenya and Tanzania, 1954-66: the effects of a period of malaria control. In: Disease and Mortality in sub-Saharan Africa—Feachem R, Jamison D, eds. (1991) New York: University Oxford Press. 248–63.
5 Molineaux L, Gramiccia G. The Garki Project: Research on the Epidemiology and Control of Malaria in the Sudan Savanna of West Africa (1980) Geneva: WHO.
10 Todd JE, De Francisco A, O'Dempsey TJ, Greenwood BM. The limitations of verbal autopsy in a malaria-endemic region. Ann Trop Paediat (1994) 14:31–6.
14 Garner P, Gulmezoglu AM. Drugs for preventing malaria in pregnant women. Cochrane Database Syst Rev (2006;) CD000169.
16 Gamble CL, Ekwaru JP, ter Kuile FO. Insecticide-treated nets for preventing malaria in pregnancy (Review). Cochrane Database Syst Rev (2009) 2:1–51.
25 Fraser-Hurt N, Felger I, Edoh D, et al. Effect of insecticide-treated bed nets on haemoglobin values, prevalence and multiplicity of infection with Plasmodium falciparum in a randomized controlled trial in Tanzania. Trans R Soc Trop Med Hyg (1999) 93(Suppl 1):47–51.
45 Roll Back Malaria. Guidelines for Core Population-Based Indicators (2008) Calverton, MD: Roll Back Malaria, MEASURE Evaluation, World Health Organization, UNICEF.
59 Barros FC, Huttly SR, Victora CG, Kirkwood BR, Vaughan JP. Comparison of the causes and consequences of prematurity and intrauterine growth retardation: a longitudinal study in southern Brazil. Pediat (1992) 90:238–44.
60 Zambia Ministry of Health. Zambia National Malaria Indicator Survey 2008 Lusaka, Zambia: Zambia Ministry of Health; 2008.
62 Rowe AK, Rowe SY, Snow R, et al. Estimates of the burden of mortality directly attributable to malaria for children under 5 years of age in Africa for the year 2000 Final report. For the Child Health Epidemiology Reference Group (CHERG) (2006) Washington DC: Child Health Epidemiology Reference Group (CHERG);. | 2019-04-19T18:31:45Z | http://childsurvival.net/?content=com_articles&artid=18 |
As of the date of this writing, the future of the DOL “Fiduciary Rule” remains unclear. Judicial challenges remain, and the Trump administration has not yet expressed its view on whether the rule will be repealed (and how long that will take). Many broker-dealer and dual registrant firms have already spent millions to comply with the rule – but are they choosing the right path for compliance?
Some broker-dealer firms – both wirehouses and IBDs – will choose not to use the DOL’s Best Interests Contract Exemption (B.I.C.E.) and will move their clients (to the extent not grandfathered) to fee-based accounts. Yet, other broker-dealer firms have (e.g., Merrill Lynch, etc.) will embrace B.I.C.E., which contains a proverbial minefield of traps for both firms and their financial advisors.
What does this mean for financial advisors in those firms that utilize B.I.C.E.? Here are my insights and legal analysis. I question why any financial advisor would want to use B.I.C.E., given the likelihood of significant reputational damage that would result for the advisor.
The U.S. Department of Labor issued its final “Conflict of Interest” (“C.O.I.”) regulation in April 2016, with the effective date of its core provisions on April 10, 2017. Under the C.O.I. regulation, fiduciary status is imposed on nearly everyone providing investment recommendations to ERISA-covered plan sponsors and plan participants, as well as to owners of IRA accounts, Keogh plan accounts and health savings accounts. While prohibited transaction exemptions (PTEs) (including the B.I.C.E.) permit the receipt of third-party compensation, as a practical matter firms – and their advisors – should transition to fee-based accounts. Anything less will result in significant reputational risk to advisors, as well as substantially increased litigation risk to both firms and advisors.
B.I.C.E. permits commissions, 12b-1 fees and other third-party compensation to be paid to broker-dealer firms. Much attention has been focused on the voluminous disclosures required under B.I.C.E.; some firms may wrongly believe that they can conduct “business as usual” simply by providing these disclosures. However, the core of the DOL’s rules are found in the 237 words that comprise the Impartial Conduct Standards. These standards impose strict fiduciary duties of loyalty and due care upon firms and advisors, require the receipt of only reasonable compensation, and prohibit misleading statements. And, these Impartial Conduct Standards also apply to recommendations of proprietary funds, principal trades and fixed-index annuities.
Under B.I.C.E. and its Impartial Conduct Standards, recommendations must be given to clients “without regard to the financial or other interests of the Adviser, Financial Institution or any Affiliate, Related Entity, or other party.” “[F]or example, an advisor, in choosing between two investments, could not select an investment because it is better for the advisor’s or financial institution’s bottom line ….” Moreover, neither the firm nor advisor may seek to limit its liability by disclaiming their core fiduciary duty or loyalty, nor may the firm seek to have the client waive the fiduciary duties owed to the client.
The Impartial Conduct Standards also incorporate, as part of a firm’s and advisor’s fiduciary duty of due care, the tough “prudent investor rule” (PIR). The PIR has a decades-long history of interpretation, as it is the core of a trustee’s duty to manage investment under trust law, and it is codified in most states as a version of the Uniform Prudent Investor Act. The PIR requires the advisor to manage risk across the investor’s portfolio, and to consider the risk and return objectives of the portfolio in making decisions. The duties to diversify investments and to avoid idiosyncratic risk are emphasized, in keeping with the findings of modern portfolio theory.
The PIR’s duties to avoid idiosyncratic risk and to avoid waste of the client’s assets bring into doubt the efficacy of several programs already announced by certain firms. For example, an IRA platform for smaller clients consisting only of individual stocks and bonds may render it impossible for an advisor to minimize idiosyncratic risk.
The PIR also poses huge challenges to the use of expensive funds and annuity products, where less expensive alternatives are available. For example, a broker-dealer platform or program in which the financial advisor is confined to the use of higher-cost mutual funds or variable annuities would likely run afoul of the fiduciary’s duty to avoid waste of the client assets, especially where similar lower-cost investments were available in the marketplace. While the use of very-low-total-cost index funds and index ETFs is not explicitly required by the rule, their utilization is certainly implicitly favored and should be viewed as one step that could be taken along the path toward risk reduction for the firm and its advisors.
Academic research has not ruled out the utilization of all active management strategies. However, the research is compelling that high-cost actively managed funds should be avoided by advisors operating under the fiduciary duty of prudence, given the consistent inverse relationship between investment product fees and investor returns. Further research on the ability of very-low-cost actively managed funds to beat appropriately chosen benchmarks is desired, as the current research is insufficient to either support or undermine their utilization.
In private litigation and arbitration, firms and advisors are normally sued not only for breach of contract, but also under state common law for breach of fiduciary duty. In such proceedings broker-dealer firms and their advisors usually deny the existence of fiduciary status. However, when the prudent investor rule is imposed upon one portion of a client’s portfolio, other portions of the portfolio should also be managed prudently given the fiduciary’s duty to consider the client’s other investments and assets.
When fiduciary duties are applicable contractually under B.I.C.E. for the management of IRA accounts, then it more likely that common law fiduciary status will be found to exist for the entirety of the advisor’s relationship with the client – including but not limited to the IRA account and other brokerage and investment advisory accounts upon which advice is provided. In other words, a court or arbitrator is more likely to find that a relationship of trust and confidence exists for non-qualified accounts when fiduciary duties are already imposed upon qualified accounts managed by the advisor.
Given the higher likelihood of fiduciary status under state common law, methods to comply with state common law fiduciary duties should be reviewed.
Once the burden of proof and/or persuasion shifts from the client to the firm and advisor, proof must be offered that the client was not harmed by the receipt of the additional compensation by the firm. As discussed below, given that additional compensation is paid by product providers from product fees, and that higher product fees on average lead to lower returns for investors, especially over the long term, this is a difficult burden of proof to meet.
The “careful scrutiny” of additional fees received by a firm under B.I.C.E.
As indicated above, the receipt by of third-party compensation is likely to be closely scrutinized under B.I.C.E. This is especially true when additional compensation is received by a broker-dealer firm, such as through 12b-1 fees, payment for shelf space and other forms of revenue sharing and/or marketing reimbursements, as this amounts to a form of self-dealing.
If additional fees and costs are received from the recommendation of a particular investment, such additional compensation is necessarily derived from the product’s costs. And here’s the rub … the academic research is strong and compelling – higher product fees and costs result, on average, in lower returns for investors.
“Commissions are better for investors?” Not so fast!
Some financial advisors might argue that mutual fund A share classes are better for investors, as the client does not need to pay ongoing fees – just an upfront commission. Leaving aside for a minute that most class A shares still impose a 0.25% or less annual 12b-1 fee, the impact of the sales commission is often understated.
A 5.75% sales charge requires a mutual fund to earn a 1.20% greater annual return (assuming a hypothetical 10% level return of the fund), if the fund is held for five years. If held for 10 years, the impact of the sales charge falls to 0.59% annually. If held for 15 years, the impact falls to 0.43%. But, here’s the rub – according to the Investment Company Institute the average holding period for stock mutual funds is only four years, and for bond mutual funds only three years. With these average holding periods a 5.75% sales charge translates into an annual fee well above 1.2% a year.
In addition, the application of Modern Portfolio Theory often leads to the need to rebalance a client’s investment portfolio. And, if the financial advisor just deals with mutual fund A share classes, it may very well occur that the advisor would recommend that some of the shares of a fund purchased by a client just a few months or few years before would need to be sold for rebalancing purposes. In essence, commission-based compensation is inconsistent with the application of Modern Portfolio Theory.
Some financial advisors will still argue that breakpoint discounts on mutual fund A share class commissions will significantly lower the commissions paid. Yet, in hundreds and hundreds of investment portfolios I’ve reviewed, implemented by brokers, nearly 90% of them appeared to be structured to avoid breakpoint discounts by spreading out investments among funds from different fund companies. Under a fiduciary standard the level of scrutiny intensifies, and it would be hard for brokers to justify such a practice given the prudent investor rule’s duty to avoid the waste of client assets. Financial advisors who operate under a fiduciary standard will have to justify any action that negates breakpoint discounts; given the existence of the conflict of interest in connection with breakpoint discounts, the burden of proof and persuasion falls upon the financial advisor, not the client. Subjective “good faith” is insufficient to meet this burden, as the actions of the financial advisor are judged under an objective standard.
Lastly, the comparison of “sales commission” to “1% annual fee” is often comparing apples to oranges. When a mutual fund A share class is sold, the broker has no duty to continue to monitor the portfolio. (However, several courts have found that, in situations when trailing compensation exists and continued advice is provided to the investor, fiduciary status existed under state common law, which included an ongoing duty.) In contrast, investment advisors who charge 1% annual fees often provide a large amount of ongoing financial planning and investment advice. And, of course, many investment advisors charge less than 1%, particularly on larger accounts.
Relying on 12b-1 fees? Don’t!
In 2010 the U.S. Securities and Exchange Commission (SEC) held hearings on whether 12b-1 fees should be continued. While no action was taken by the SEC at that time, since then various SEC officials have indicated that 12b-1 fees remain under review.
Even before the enactment of Rule 12b-1 the SEC had generally opposed the use of fund assets for the purpose of financing the distribution of mutual fund shares, noting that "existing shareholders of a fund often derive little or no benefit from the sale of new shares." Given the substantial evidence that investors fail to understand 12b-1 fees, their uncompetitive nature (as they generally cannot be negotiated), and the indefinite continuation of 12b-1 fees in many instances even if the client no longer desires ongoing investment advice, it is likely that 12b-1 fees will be repealed at some future date.
The DOL’s Impartial Conduct Standards set forth the existing requirement that the both the firm and advisor receive no more than “reasonable compensation.” As a result of this standard, firms will likely benchmark their services and fees against those of other firms in order to ensure that the total fees paid by the client to the firm are not excessive. Yet, as Tim Hauser, the Deputy Assistant Secretary for Program Operations of EBSA at the DOL, explained at a conference in the Fall of 2016, it is very difficult for a plaintiff’s attorney or an agency to prevail on allegations of unreasonable compensation. The courts generally defer to the parties to negotiate fees, provided the negotiation occurs in an arms’-length bargaining and not as a result of self-dealing by a fiduciary, in order that courts not get involved in rate-setting.
Under B.I.C.E. the firm may receive additional compensation from the recommendation of particular products, but the firm must adopt policies and procedures to ensure that individual advisors do not receive differential compensation, bonuses, or awards “to the extent they are intended to or would reasonably be expected to cause Advisers to make recommendations that are not in the Best Interest of the Retirement Investor.” In other words, while firms can receive additional compensation for the recommendation of certain products, the advisor must not receive any portion of such additional compensation. The distinction between compensation received by the firm, versus those received by the advisor, results in a significant disconnect between the interests of the firm and the interests of the advisor.
It is possible under B.I.C.E. to pay advisors additional compensation when a more complex product, that requires additional time to explain, is provided to a client. But plaintiff’s attorneys will likely question advisors on the additional time spent to understand more complex products (which time, in theory, would be allocated among many clients), and to explain the more complex product to a specific client. These plaintiff’s attorneys will likely assert that the amount of additional compensation provided to the advisor could easily become an improper incentive to the advisor under B.I.C.E., given the relatively small amount of additional time spent by the advisor with each individual client.
Where financial products are recommended, due to the vast asymmetry of information between a financial firm and its clients, incentives exist for the firm to pass off low-quality goods as higher-quality ones. Over time, such economic incentives tend to distort a fiduciary’s judgment, as has often been recognized by the courts.
B.I.C.E. effectively limits the ability of individual advisors to receive additional compensation. But under B.I.C.E. firms will still possess the economic incentive to encourage their advisors to promote to clients investment products that pay the firm (but not the advisor) additional compensation. Advisors working in firms that utilize B.I.C.E. must confront the substantial likelihood that their own interests will not align with those of their firms.
The single most important asset a financial advisor possesses is her or his personal reputation. Damage to the advisor’s reputation is the greatest risk individual advisors face today. Such risk is realized should client complaints, usually triggered by the presence of conflicts of interest, lead to resolutions that mandate disclosures of settlements or arbitration awards to current clients of the advisor as well as to future potential clients.
Yet, for the larger financial services firm, reputational risk is far less consequential. Those firms can more easily mask transgressions via nondisclosure agreements with claimants during settlements, mandatory arbitration of individual claims and voluminous documents that are seldom read by clients. Moreover, a firm’s reputation is more easily repaired via marketing and promotion, explaining away past transgressions as due to “rogue advisors” who are no longer with the firm, and the inevitable passage of time that dims consumer’s memories.
Although much research has revealed the ineffectiveness of disclosures due to various behavioral biases consumers possess, fiduciary duties generally impose the burden upon individual advisors to ensure that their clients understand when a conflict of interest is present, as well as understand the consequences of such conflict of interest. Hence, advisors who practice under B.I.C.E. will be confronted with an affirmative duty to ensure client understanding of disclosures that are both voluminous and onerous.
In the competition for clients, firms that use fee-based accounts will possess a huge marketing advantage over firms that utilize B.I.C.E.
Over the next several years many advisors will see a lot of “money in motion.” Triggered by changing fee and compensation structures, enhanced disclosures and the consumer press, clients will increasingly review their relationship with their current advisor and seek out second opinions.
As the distinctions between firms that utilize B.I.C.E. and those that don’t become known, the consumer press will steer their readers to firms that don’t use B.I.C.E. for IRA accounts. Additionally, savvy fee-only firms already provide questionnaires and checklists for prospective clients to utilize when shopping for new advisors. These questionnaires highlight the benefits of compensation structures that are more aligned with client interests.
As studies have demonstrated, the vast majority of consumers prefer fee-based compensation over commissions. Over the past two decades, more and more accounts have transitioned from commission-based to fee-based in reaction to consumer preferences. The DOL’s COI rule only accelerates this trend; fee-based accounts will rise from perhaps 40% of accounts today to 60% or greater within a short time.
In other nations, such as Australia, New Zealand, and England, regulation has progressed much further, in that commissions paid to financial advisors for investment management services are largely banned. While these developments have not yet reached U.S. shores, they are an indication of future policy changes that may occur.
More important, however, will be the adverse result of firms using B.I.C.E. Some firms may see the increased cost of doing business under B.I.C.E. – primarily in the form of increased litigation costs – as just a “cost of doing business.” As abuses take place, the DOL may well re-evaluate whether B.I.C.E. is an effective solution. Should the courts set aside the DOL’s prohibition on the inclusion of clauses in client agreements that negate the ability of the client to participate in class actions, the DOL may become more concerned that B.I.C.E.’s remaining enforcement mechanisms are insufficient to deter bad conduct. As a result, a future administration may seek to sunset B.I.C.E. and require all financial advisors to utilize level-fee compensation methods.
Finally, the most compelling reason to embrace “level-fee” compensation and to avoid B.I.C.E. is simply this – to serve the client in the best manner possible. Firms that embrace level fees, and eschew the receipt of product-based compensation, will truly act as representatives of the client.
Larger firms will use the collective purchasing power of their advisors and clients to squeeze asset manager’s compensation, in order to boost the returns their clients enjoy. These firms may also require annuity and other product manufacturers to create better and more transparent products.
As a result, products will compete – not on the basis of the amount of revenue sharing provided to the product’s distributors – but rather on the basis of each product’s individual merits. The real impact of the DOL’s Conflict of Interest Rule and its exemptions will be upon asset managers. Some financial advisors merely need to adjust the manner by which they receive their compensation.
In conclusion, here is my message to financial advisors (i.e., dual registrants and registered representatives): B.I.C.E. is a minefield that will generate a huge number of explosions. Don’t be around when the minefield starts to erupt. Rather, avoid B.I.C.E. and use a level-fee methodology. It’s the right thing to do – for the firm, its clients and especially for you, the financial advisor.
Ron A. Rhoades, JD, CFP® serves as director of the financial planning program for Western Kentucky University’s Gordon Ford College of Business. He is an assistant professor – finance, an attorney, an investment advisor and a frequent writer on the fiduciary standard as applied to financial services. A frequent speaker at national and regional conferences, he also serves as a consultant to firms on the application of the DOL Conflict of Interest Rules, fiduciary law and related issues. This article represents his views only, and not those of any institution, firm or organization with whom he may be associated. This article is believed to be correct at the time it is written; subsequent laws, regulations, and/or developments regarding the interpretation or enforcement of ERISA, the I.R.C., and DOL regulations should be consulted. Please direct all questions and requests via email: Ron.Rhoades@wku.edu.
“The phrase ‘without regard to’ is a concise expression of ERISA’s duty of loyalty, as expressed in section 404(a)(1)(A) of ERISA and applied in the context of advice.” 81 Fed.Reg. 21,026 (April 8, 2016).
81 Fed.Reg. 21,027 (April 8, 2016).
“Section II(f)(1) prohibits all exculpatory provisions disclaiming or otherwise limiting liability of the Adviser or Financial Institution for a violation of the [B.I.C.E.] contract's terms, and Section II(g)(5) prohibits Financial Institutions and Adviser from purporting to disclaim any responsibility or liability for any responsibility, obligation, or duty under Title I of ERISA to the extent the disclaimer would be prohibited by Section 410 of ERISA.” 81 Fed.Reg. 21,042 (April 8, 2016).
“[A] Financial Institution and Adviser act in the Best Interest of a Retirement Investor when they provide investment advice ‘that reflects the care, skill, prudence, and diligence under the circumstances then prevailing that a prudent person acting in a like capacity and familiar with such matters would use in the conduct of an enterprise of a like character and with like aims, based on the investment objectives, risk tolerance, financial circumstances, and needs of the Retirement Investor, without regard to the financial or other interests of the Adviser, Financial Institution or any Affiliate, Related Entity, or other party.’” 81 Fed.Reg. 21,053 (April 8, 2016).
Restatement (Third) of Trusts § 90 cmt. f(1), at 308; see id. § 88 cmt. a, at 256 (trustee has “a duty to be cost-conscious”).
Restatement (Third) of Trusts § 90 cmt. m, at 332.
Uniform Prudent Investor Act § 7 & cmt., 7B U.L.A. 37 (2006).
While the U.S. Department of Labor does not possess the ability to impose fiduciary standards on non-ERISA, non-IRA accounts, prudent investor rule experts Max M. Schanzenbach and Robert H. Sitkoff rightfully conclude that “proper diversification requires an assessment of the portfolio as a whole, including the other assets of the investor.” Schanzenbach, Max M. and Sitkoff, Robert H., Financial Adviser Can't Overlook the Prudent Investor Rule (August 1, 2016). Journal of Financial Planning (August 2016).
Schanzenbach, Max M. and Sitkoff, Robert H., Fiduciary Financial AdviserAdvisors and the Incoherence of a 'High-Quality Low-Fee' Safe Harbor (September 16, 2015). Northwestern Law & Econ Research Paper No. 15-18. Available at http://ssrn.com/abstract=2661833, citing see Restatement (Third) of Trusts § 78 cmt. c(2); Jesse Dukeminier & Robert H. Sitkoff, Wills, Trusts, and Estates 591, 593 (9th ed. 2013).
See Restatement (Third) of Trusts § 37 cmt. f(1); see also Dukeminier & Sitkoff, supra note 9, at 593.
81 Fed. Reg. 21,036 (Apr. 8, 2016).
81 Fed. Reg. 21,027 (Apr. 8, 2016). However, “[d]ifferential compensation between categories of investments could be permissible as long as the compensation structure and lines between categories were drawn based on neutral factors that were not tied to the Financial Institution’s own conflicts of interest, such as the time or complexity of the advisory work, rather than on promoting sales of the most lucrative products.” Id. at 21,037.
81 Fed. Reg. 21,028 (Apr. 8, 2016).
See Bearing of Distribution Expenses by Mutual Funds: Statutory Interpretation, Investment Company Act Release No. 9915 (Aug. 31, 1977) [42 FR 44810 (Sept. 7, 1977)] (quoting SEC, Future Structure of the Securities Markets (Feb. 2, 1972) [37 FR 5286 (Mar. 14, 1972)]).
81 Fed. Reg. 21,007 (Apr. 8, 2016). As stated by the DOL, “ERISA section 408(b)(2) and Code section 4975(d)(2) require that services arrangements involving plans and IRAs result in no more than reasonable compensation to the service provider. Accordingly, Advisors and Financial Institutions – as service providers – have long been subject to this requirement, regardless of their fiduciary status.” Id. at 21,029.
“[T]he standard simply requires that compensation not be excessive, as measured by the market value of the particular services, rights, and benefits the Advisor and Financial Institution are delivering to the Retirement Investor.” 81 Fed. Reg. 21,029 (Apr. 8, 2016).
Paraphrasing Tim Hauser, speaking with the author during a session entitled “Deconstructing the DOL Fiduciary Rule,” where both Tim Hauser and the author were panelists, at the Financial Planning Association’s BE Conference, September 16, 2016.
See, e.g. Brock v. Robbins, 830 F.2d 640 (7th Cir. 1987).
81 Fed. Reg. 21, 033 (Apr. 8, 2016). Under B.I.C.E. both the firm and the advisor possess a fiduciary duty of loyalty to the client. While the fiduciary duty of the advisor to the firm still exists, the duty to the client is paramount. In other words, there is an “ordering” of the fiduciary duties, and any duty of loyalty owed by the advisor to the advisor’s firm is subservient to the primary duty of loyalty owed to the client.
See, e.g., Akerlof, George, "The Market for Lemons: Quality Uncertainty and the Market Mechanism" (1970).
Michoud v. Girod, 45 U.S. 503 555 (1846). The U.S. Supreme Court also stated in that decision: “if persons having a confidential character were permitted to avail themselves of any knowledge acquired in that capacity, they might be induced to conceal their information and not to exercise it for the benefit of the persons relying upon their integrity. The characters are inconsistent. Emptor emit quam minimo potest, venditor vendit quam maximo potest.” [The buyer buys for as little as possible; the vendor sells for as much as possible.] Id. at 554.
Tisdale v. Tisdale, 2 Sneed 596 (Tenn. 1855).
Study on Investment Adviser and Broker-Dealers (As Required by Section 913 of the Dodd-Frank Wall Street Reform and Consumer Protection Act, by the Staff of the U.S. Securities and Exchange Commission (Jan. 2011).
The election of Donald Trump means that finance will get a new wave of deregulation that will (almost certainly) sweep away the DOL fiduciary rule. The watchword for RIAs in this new world: re-differentiation. But let’s first review how we got to this new world.
The challenge for fiduciaries is daunting. Tens of thousands of new fiduciary brokers will soon fly the fiduciary flag, as Merrill tells the country that the thundering herd will give all its customers – retirement and nonretirement accounts alike – ‘best interest’ treatment. The implications of these developments have barely been discussed in the advisory industry.
One exception. Schwab CEO Walt Bettinger took the bull by the horns at its 2016 IMPACT conference (in October). His message: fiduciaries must differentiate what they do. The great challenge is “To re-differentiate ourselves” from those “Wanting to look and act and to appear” to be like us. Merrill’s branding serves as a keen reminder of the relevance of Bettinger’s message.
The November presidential election has clear consequences for the DOL rule. “Historic” October was then overshadowed by the election. Advisors to the president-elect openly say they wish to repeal the rule. Though a rule repeal is neither quick nor easy, a number of possible tactics can be applied to postpone, undermine or eventually repeal the rule. The DOL rule is now on life support.
Meanwhile, BDs are preparing for the DOL rule. New platforms, policies and procedures are under construction in c-suites around the country. Some are transforming the fee-based best interest world. Others will keep commissions. These changes are significant and costly. The central question is how firms will implement these policies absent the DOL rule. The answer is unclear. There is no certainty as to implementation.
There is, however, much “certainty” that, irrespective regulations, firms will communicate their fidelity to customers’ best interests. Merrill has already started. Minor edits to its current communications on the DOL rule will suffice to meet its branding objectives in a world without the DOL rule.
For 20 years fiduciary advisors, regulators and researchers have documented, discussed and bemoaned how investors don’t understand that brokerage sales and product recommendations differ from fiduciary advice. From this perspective, confusion has defined the fiduciary discussion. Is it possible investor confusion could get worse?
With the elimination or dilution of the DOL rule and BICE (and deregulatory winds preventing SEC fiduciary rulemaking), industry voices will reach further. Some voices will be responsible. However, other influential voices will simply suggest fidelity to stringent standards, but lack sufficient policies and procedures to truly implement them. SIFMA and FINRA will communicate their concept of ‘best interest.’ Yet prior writings suggest their idea of ‘best interest’ simply does not comport with common law or trust law standards.
This lesson drives the Institute for the Fiduciary Standard’s Best Practices, which are crafted to raise standards and understanding of what fiduciaries do. The Best Practices affirmation program lets advisors show investors how fiduciary conduct differs from brokerage sales practices. Industry research suggests that the impact of following these practices can be more than clarifying what advice means. It suggests these practices can increase client trust and enhance advisor /client relationships.
“Re-differentiation” should be the ‘best practice’ of any advisor in the DOL/post-DOL fiduciary world that lies ahead.
The fate of the Department of Labor (DOL) fiduciary rules is clouded in uncertainty because of the presidential election win by Donald Trump. The new rules will become applicable — or as a practical matter, effective — on April 10, 2017. However, Mr. Trump will become President on January 20, 2017, and there are many who believe that the incoming administration will repeal, modify or delay the new rules. Without a clear statement from Mr. Trump, most industry professionals advise the regulated community to proceed as if the rule will apply as originally expected on April 10. But are there ways to minimize certain compliance costs under the Best Interest Contract (BIC) exemption while the uncertainty is sorted out?
The short answer is yes. Fortunately, the DOL staggered the applicability dates of many of the more onerous provisions of the BIC exemption in the final rules. The more cumbersome requirements are not applicable until January 1, 2018. Consequently, investment fiduciaries could focus their compliance efforts on the April requirements and defer compliance with the others until April when more may be known about the fate of the rules and who will lead the Employee Benefits Security Administration.
Best Interest Standard - The financial institution and advisor must act in the best interest of the plan, participant or investor.
Reasonable Compensation - The financial institution, its affiliates and the advisor must receive no more than reasonable compensation.
No Misleading Statements - The financial institution and the advisor must not make any materially misleading statements.
Abbreviated Disclosures – The financial institution must furnish certain abbreviated transition period disclosures . Notably, a written contract that may otherwise be required is not needed during the transition period.
BIC Exemption Officer - The financial institution must designate a BIC exemption compliance officer.
Records and Access - The financial institution must maintain records that enable a determination that the conditions of the exemption have been met, and such records must be reasonably available for examination by the DOL, IRS, plan fiduciaries, participants and certain other parties.
Full Disclosures and Contracts - All BIC exemption disclosures must be furnished and the written contract requirements (in the case of IRAs and other non-ERISA plans) must be satisfied, including the required warranties.
Web Disclosures - In addition to the disclosure and written contract requirements noted directly above, the financial institution must make certain additional web and transaction-based disclosures are published.
Policies and Procedures - The financial institution must have certain documentation, and written policies and procedures in place.
DOL Notice - The financial institution must notify the DOL of its intent to rely on the BIC exemption prior to receiving compensation.
As noted above, the January 1, 2018 requirements are among the most complex and potentially costly to implement. The additional time to comply originally provided by the DOL gives financial institutions the opportunity to prioritize their compliance efforts.
The Department of Labor's new fiduciary rule has inspired plenty of doom-and-gloom predictions from critics who warn that industry profits will suffer and small investors will lose their access to financial advice.
But for RIAs, it’s becoming clear the new rules may actually present significant growth opportunities.
When the new rule takes effect next April, the DoL will extend to IRAs the kind of best interest protections that have long governed 401(k)s and other workplace-sponsored retirement plans. The new rule also makes advice about rolling workplace retirement assets into an IRA as investment advice subject to best interest protections.
• Recent regulatory changes favor RIAs.
Fee-disclosure regulations finalized in 2012, combined with the new DoL conflicts rule, strengthen the wind in the sails of RIAs looking to compete in a $5 trillion marketplace, while creating a higher hurdle for commissioned brokers to advise retirement plans.
• RIAs can attract a greater share of 401(k) plan business.
We believe there is enormous, untapped opportunity for RIAs to advise 401(k) and other workplace retirement plans. Fewer than 10% of RIAs are actively involved in the retirement plan space, according to Cerulli & Associates. When you consider that some plans have tens of millions of dollars, with new money coming in with every paycheck, what’s not to like?
• RIAs can capture more IRA rollovers from 401(k) clients.
The DoL rule not only provides a clearer path for advising retirement plans, but also for advising employees on how to roll assets into IRAs managed by your firm when they leave an employer. If you can justify and document why a rollover is in their best interest, you have a better chance of providing a long-term experience for that client.
• Advisers can gain other business from plan participants.
If an RIA advises the workplace plan of an employee, and is able to retain that relationship when the individual leaves the employer, that RIA has a greater opportunity to discuss and, possibly, oversee assets outside the retirement account.
• Deeper relationships create a competitive advantage.
By developing a broader, more holistic relationship with retirement plan participants, RIAs can create a moat around the client that competitors will find more challenging to break through.
There are also potential challenges for RIAs, however.
Many commissioned brokers, for example, likely will continue serving retirement investors through a best interest contract exemption established under the new DoL rule. Discretionary RIAs have no need for such an exemption, but that important distinction may be lost on most investors.
IRA rollovers, meanwhile, will require some more work.
Before advising a retiree to roll over a 401(k) plan to an IRA account their firm would manage, RIAs will need to compare the investor’s current fund lineup, costs, services and other factors with their own offerings and then determine whether a rollover is truly in the investor’s best interest. And they must fully document that assessment.
• RIAs can be the better choice for the retirement investor.
Compared with the typical workplace plan, RIAs can offer more education and investment services. They also tend to offer access to a wider menu of funds through their custodian.
• More talent and clients shifting to the RIA channel.
RIAs may also benefit from increased movement of broker teams to the RIA world. There have been reports the new DoL rule is prompting more commissioned brokers to break away from their firms to become independent RIAs, creating an opportunity for RIA firms to grow by acquiring firms or tucking in breakaways.
By the same token, smaller RIA firms buckling under the weight of regulation may decide to sell. These firms can become acquisition targets that help other RIAs grow.
Ultimately, the DoL is trying to do the right thing by mandating stronger protections for the millions of Americans responsible for managing their own retirement savings outside the workplace protections of ERISA.
And that’s why I believe that over time, the DoL rule can spell opportunity for RIAs, a group of professionals that have been putting their clients’ interests first for decades under the Investment Advisers Act of 1940.
The Conflict of Interest Rule (Rule) promulgated by the U.S. Department of Labor on April 8, 2016, pertains to only one "kind" of the three kinds of fiduciaries described in section 3(21) of the Employee Retirement Income Security Act of 1974 (ERISA), which can be thought of as "Fiduciary Central." That one kind of fiduciary--an ERISA section 3(21)(A)(ii) fiduciary--is a non-discretionary advice-giver.
All three elements described in section 3(21)(A)(ii)--1) a fiduciary 2) that renders (non-discretionary) investment advice 3) for compensation--must be present in order for the Rule to apply to an advisor communicating with a plan participant or an IRA owner.
The Rule broadens the class of entities--which it defines as "Financial Institutions"--that will bear the "fiduciary" moniker come April 10. These include registered investment advisors, broker/dealers, banks, and insurance companies. This definition also includes any employees, contractors, agents, representatives, affiliates, or related entities of a given Financial Institution.
The Rule also broadens the definition of "investment advice." More precisely, "retirement investment advice" that's rendered to 1) participants in ERISA plans such as 401(k) plans, profit-sharing plans, money purchase pension plans, and defined benefit plans, as well as 2) owners of IRAs and participants in non-ERISA plans. Note that the Rule does not pertain to investment advice rendered to those investing in taxable accounts and non-retirement accounts. That retail environment remains within the purview of the SEC.
Determining whether an advisor has rendered "retirement investment advice" in a given situation requires posing a threshold question: Has the advisor made a "recommendation" as defined by the Rule? If there's no recommendation, then there's no investment advice, and since, as noted, investment advice is one of the three elements of ERISA section 3(21)(A)(ii), an advisor's communication will not make it a fiduciary subject to the Rule.
So how does the Rule define a "recommendation"?
4. Whether, in what amount, in what form, or to what destination a rollover, transfer, or distribution from a plan or IRA should be made.
Note that the test of whether a particular communication rises to the level of a "recommendation" is whether a reasonable person--not the recipient of the advice--will view the communication as being a recommendation.
The more individually tailored the communication is to the specific recipient of the advice, the more likely it will be judged to be a recommendation.
A series of actions may comprise a recommendation in the aggregate; it's possible, though, that if viewed individually, they would not.
It doesn't matter if a communication is initiated by a human being or a computer software program such as a robo-advisor.
An advisor's "hire me" communication in a marketing scenario will not be deemed a recommendation; that's true, though, if an advisor describes only its services and fees. If the advisor adds to that description by, for example, suggesting to an IRA owner that a particular product, investment, or platform should be used, then that leaves the realm of a "hire me" communication and enters that of a recommendation.
An advisor's suggestion to select other persons to provide advice is a recommendation.
3. By directing investment advice to a specific advice recipient(s) about the advisability of a particular investment decision or recommendation.
> Any fee or compensation received from any source in connection with, or as a result of, the recommended purchase or sale of a security or the provision of investment advice services.
Examples of fees or compensation include--but are not limited to--commissions, loads, finder's fees, revenue-sharing payments, shareholder servicing fees, marketing or distribution fees, underwriting compensation, payments to brokerage firms in return for shelf space, recruitment compensation paid in connection with transfers of accounts to a registered representative's new broker-dealer firm, gifts and gratuities, and expense reimbursements.
A fee or compensation is paid "in connection with, or as a result of" investment advice if the fee or compensation would not have been paid but for the recommended transaction or advisory service, or if eligibility for, or the amount of, the fee or compensation is based in whole or in part on the transaction or service.
Is any one of four different kinds of communication deemed a "recommendation?" If not, an advisor is not subject to the Rule.
If so, is the recommendation delivered by the advisor in one of three different contexts? If not, an advisor is not subject to the Rule.
If so, is the recommendation deemed "investment advice?" If not, an advisor is not subject to the Rule.
If so, is the investment advice rendered in exchange for "a fee or other compensation?" If not, an advisor is not subject to the Rule.
If so, "fiduciary" status is conferred on the advisor.
Wait, not so fast. If the recommendation is a safe harbor exception/exclusion designated in the Rule, it's not considered investment advice. And if there's no investment advice, one of the three elements of ERISA section 3(21)(A)(ii) is lacking. In that case, the Rule will not apply to an advisor. | 2019-04-18T22:50:37Z | http://retirementsolutionsnow.com/advisornews-february-2017.html |
Hoehn, Katherine Dudley was born 2 August 1955, is female, registered as Republican Party of Florida, residing at 2833 Park Square Pl, Fernandina Beach, Florida 32034. Florida voter ID number 124852353. Her telephone number is 1-904-624-7679. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Katherine I. was born 15 May 1970, is female, registered as Florida Democratic Party, residing at 10111 Sw 66Th St, Miami, Florida 33173. Florida voter ID number 109994039. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, KATHY LYNNE was born 30 July 1954, is female, registered as No Party Affiliation, residing at 1357 Irving Ave, Clearwater, Florida 33756. Florida voter ID number 118890829. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Katie Jo was born 12 June 1988, is female, registered as Florida Democratic Party, residing at 837 Yorkshire Dr, Deland, Florida 32724. Florida voter ID number 114711715. Her telephone number is 1-386-748-2957. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2014 voter list: Katie Jo Hoehn, 2270 Tropical Ter, DeLand, FL 32724 Florida Democratic Party.
31 May 2012 voter list: Katie Jo Hall, 2270 Tropical Ter, DeLand, FL 32724 Florida Democratic Party.
Hoehn, Kayli Ann was born 13 March 1988, is female, registered as Republican Party of Florida, residing at 10116 Sugar Maple Ln, Fort Myers, Florida 33913. Florida voter ID number 123074927. Her telephone number is 1-513-292-1764. Her email address is hoehnka17@gmail.com. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: Kayli Ann Hoehn, 15740 Portofino Springs Blvd, #106, Fort Myers, FL 33908 Republican Party of Florida.
Hoehn, Kelly Ann was born 19 January 1981, is female, registered as Republican Party of Florida, residing at 3445 Golden Eagle Dr, Land O Lakes, Florida 34639. Florida voter ID number 115265463. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2016 voter list: Kelly Ann Hoehn, 4488 Vermillion Sky Dr, Wesley Chapel, FL 33544 Republican Party of Florida.
31 October 2015 voter list: Kelly Ann Hoehn, 3518 Grassglen PL, Wesley Chapel, FL 33544 Republican Party of Florida.
31 August 2015 voter list: Kelly Ann Hoehn, 29812 Morningmist DR, Wesley Chapel, FL 33543 Republican Party of Florida.
31 May 2013 voter list: Kelly Ann Hoehn, 27145 Firebush Dr, Wesley Chapel, FL 33544 Republican Party of Florida.
31 May 2012 voter list: Kelly Ann Hoehn, 1409 Villa Capri Cir, APT 104, Odessa, FL 33556 Republican Party of Florida.
Hoehn, Kenneth Michael was born 29 August 1957, is male, registered as No Party Affiliation, residing at 842 Paz Pass, Mulberry, Florida 33860. Florida voter ID number 119978923. His telephone number is 1-813-440-9037. This is the most recent information, from the Florida voter list as of 31 March 2019.
28 February 2018 voter list: Kenneth Michael Hoehn, 1424 Vinetree Dr, Brandon, FL 33510 No Party Affiliation.
31 May 2014 voter list: Kenneth Michael Hoehn, 1501 Thistledown Dr, Brandon, FL 33510 No Party Affiliation.
Hoehn, Kiara A. was born 21 July 1995, is female, registered as Republican Party of Florida, residing at 1710 N 40Th Ave, Hollywood, Florida 33021. Florida voter ID number 126382145. Her telephone number is 1-954-478-0171. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Kiersten Marie was born 8 May 1997, is female, registered as No Party Affiliation, residing at 8749 Bella Vita Cir, Land O Lakes, Florida 34637. Florida voter ID number 123545085. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, KIMBERLY LYNN born 18 January 1969, Florida voter ID number 100515924 See Marshall, Kimberly Lynn. CLICK HERE.
HOEHN, KIM MARIE was born 1 November 1973, is female, registered as Florida Democratic Party, residing at 6277 72Nd Ave, #B, Pinellas Park, Florida 33781. Florida voter ID number 106958280. Her telephone number is 397-8557 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2018 voter list: KIM MARIE HOEHN, 12001 BELCHER RD S, #I138, LARGO, FL 337735036 Florida Democratic Party.
31 May 2017 voter list: KIM MARIE HOEHN, 11625 75TH AVE, SEMINOLE, FL 33772 Florida Democratic Party.
31 May 2012 voter list: KIM MARIE HOEHN, 10760 104TH ST, LARGO, FL 33773 Florida Democratic Party.
HOEHN, KRISTEN ANN was born 11 December 1962, is female, registered as Florida Democratic Party, residing at 4560 Sw 46Th Ave, Ocala, Florida 34474. Florida voter ID number 100483151. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Kurtis James was born 17 November 1973, is male, registered as No Party Affiliation, residing at 12124 Colony Lakes Blvd, New Port Richey, Florida 34654. Florida voter ID number 117841506. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: Kurtis James Hoehn, 11139 Ragsdale Ct, New Port Richey, FL 34654 No Party Affiliation.
HOEHN, KURT R. was born 23 January 1969, is male, registered as Republican Party of Florida, residing at 2289 Richard Lee St, Orange Park, Florida 32073. Florida voter ID number 102821698. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Kyle Donald was born 23 June 1990, is male, registered as No Party Affiliation, residing at 8525 Little Swift Cir, Jacksonville, Florida 32256. Florida voter ID number 122721004. His telephone number is 1-585-544-8600. His email address is kdhoehn@buffalo.edu. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: KYLE DONALD HOEHN, 1800 MICCOSUKEE COMMONS DR, APT 114, TALLAHASSEE, FL 32308 No Party Affiliation.
31 July 2016 voter list: KYLE DONALD HOEHN, 1560 HIGH RD, APT 228D, TALLAHASSEE, FL 32304 No Party Affiliation.
HOEHN, LANCE C. was born 30 April 1994, is male, registered as No Party Affiliation, residing at 1169 Allendale Dr, Oviedo, Florida 32765. Florida voter ID number 118679842. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2018 voter list: LANCE C. HOEHN, 520 SAINT DUNSTAN WAY, WINTER PARK, FL 32792 No Party Affiliation.
22 October 2014 voter list: LANCE C. HOEHN, 2418 DAKOTA TRL, FERN PARK, FL 32730 No Party Affiliation.
Hoehn, Larissa Marie was born 15 August 1991, is female, registered as No Party Affiliation, residing at 1622 Minerva Ave, Jacksonville, Florida 32207. Florida voter ID number 121077128. The voter lists a mailing address and probably prefers you use it: 3391 Harmon CV Memphis TN 38135-2502. This is the most recent information, from the Florida voter list as of 31 March 2019.
29 February 2016 voter list: Larissa Marie Hoehn, 11001 Old St Augustine RD, Jacksonville, FL 32257 No Party Affiliation.
HOEHN, LEONA MARIE was born 5 March 1998, is female, registered as No Party Affiliation, residing at 2289 Richard Lee St, Orange Park, Florida 32073. Florida voter ID number 121983287. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, LILBURN P. was born 17 September 1932, is male, registered as Florida Democratic Party, residing at 3140 Ne 49Th St, Ocala, Florida 34479. Florida voter ID number 105647997. This is the most recent information, from the Florida voter list as of 31 August 2016.
HOEHN, LINDA MAE was born 6 August 1944, is female, registered as Republican Party of Florida, residing at 13203 Dorchester Dr, Seminole, Florida 33776. Florida voter ID number 115075829. Her telephone number is 1-727-623-4351. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2015 voter list: LINDA MAE HOEHN, 15712 REDINGTON DR, REDINGTON BEACH, FL 33708 Republican Party of Florida.
HOEHN, LUCY was born 10 January 1941, is female, registered as Republican Party of Florida, residing at 9181 Bal Bay Pt, Boynton Beach, Florida 33473. Florida voter ID number 112006096. Her telephone number is 1-561-809-3214. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Lynn M. was born 23 July 1957, is female, registered as Republican Party of Florida, residing at 17407 Raintree Ct, Montverde, Florida 34756. Florida voter ID number 104871102. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, MARCUS ANTON was born 5 October 1996, is male, registered as Republican Party of Florida, residing at 3489 Nw Cr 348, Mayo, Florida 32066. Florida voter ID number 121969693. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2016 voter list: MARK ANTON HOEHN, 3489 NW CR 348, MAYO, FL 32066 Republican Party of Florida.
HOEHN, MARGARET CHRISTINE was born 13 April 1952, is female, registered as Republican Party of Florida, residing at 818 Carol St, Wildwood, Florida 34785. Florida voter ID number 108296271. Her telephone number is 1-352-748-5638. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: MARGARET C. HOEHN, 3742 CR 511A, WILDWOOD, FL 347858331 Republican Party of Florida.
HOEHN, MARILYN R. was born 30 January 1928, is male, registered as Republican Party of Florida, residing at 224 Eagleton Estates Blvd, Palm Beach Gardens, Florida 33418. Florida voter ID number 112389037. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, MARJORIE K. was born 11 June 1922, is female, registered as Florida Democratic Party, residing at 6951 Nw Hartney Way, Pt St Lucie, Florida 34983. Florida voter ID number 108148329. This is the most recent information, from the Florida voter list as of 31 August 2014.
HOEHN, MARK ANTON born 5 October 1996, Florida voter ID number 121969693 See HOEHN, MARCUS ANTON. CLICK HERE.
Hoehn, Mark J. was born 18 April 1968, registered as Republican Party of Florida, residing at 101 James Lee Blvd E, Crestview, Florida 32536. Florida voter ID number 120439271. The voter lists a mailing address and probably prefers you use it: 8405 Killians Greens Dr Las Vegas NV 89131-6717. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Martin Reginald was born 3 March 1921, is male, registered as Florida Democratic Party, residing at 7014 Nw 39Th Ave, Gainesville, Florida 32606-5724. Florida voter ID number 100417437. This is the most recent information, from the Florida voter list as of 31 March 2016.
HOEHN, MARVIL J. was born 6 January 1935, is female, registered as Republican Party of Florida, residing at 1219 Carolina Ave, Lynn Haven, Florida 32444. Florida voter ID number 100611214. This is the most recent information, from the Florida voter list as of 31 May 2012.
Hoehn, Marvil Jean was born 6 January 1935, is female, registered as Republican Party of Florida, residing at 11844 Hidden Stagecoach Ct, Jacksonville, Florida 32223. Florida voter ID number 121133955. This is the most recent information, from the Florida voter list as of 30 April 2017.
HOEHN, MARY E. was born 30 January 1934, is female, registered as Florida Democratic Party, residing at 8650 Sw 95Th St, #E, Ocala, Florida 34481. Florida voter ID number 105727590. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Mary Eleanor born 17 December 1944, Florida voter ID number 101186068 See Gasperino, Mary . CLICK HERE.
HOEHN, MELONY S. was born 1 December 1979, is female, registered as No Party Affiliation, residing at 107 Marlin Cir, Panama City Beach, Florida 32408. Florida voter ID number 100734304. This is the most recent information, from the Florida voter list as of 31 December 2014.
Hoehn, Michael E. was born 23 May 1949, is male, registered as Republican Party of Florida, residing at 17407 Raintree Ct, Montverde, Florida 34756. Florida voter ID number 104796369. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, MICHAEL GARY was born 24 January 1948, is male, registered as Florida Democratic Party, residing at 4957 Broadstone Cir, West Palm Beach, Florida 33417. Florida voter ID number 112345548. His telephone number is 1-561-640-9256. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2015 voter list: MICHAEL GARY HOEHN, 1161 TROPICAL DR, JUPITER, FL 33458 Florida Democratic Party.
HOEHN, MICHAEL JAMES was born 19 June 1958, is male, registered as Republican Party of Florida, residing at 9071 Tamiami Trl S, #41, Venice, Florida 34293. Florida voter ID number 122730074. The voter lists a mailing address and probably prefers you use it: PO BOX 17374 SARASOTA FL 34276. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Michael W. was born 18 January 1992, is male, registered as Republican Party of Florida, residing at 12730 Sw 31St Ave, Archer, Florida 32618. Florida voter ID number 120275796. His telephone number is 1-352-331-5635. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, MICHELE R. was born 12 September 1968, is female, registered as Florida Democratic Party, residing at 2289 Richard Lee St, Orange Park, Florida 32073. Florida voter ID number 102807701. Her telephone number is 1-904-276-6059. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, MICHELLE DAWN was born 9 January 1969, is female, registered as No Party Affiliation, residing at 4301 80Th Ave, Pinellas Park, Florida 33781. Florida voter ID number 107038518. This is the most recent information, from the Florida voter list as of 31 March 2019.
22 October 2014 voter list: MICHELLE DAWN HOEHN, 1401 39TH AVE N, ST PETERSBURG, FL 33703 No Party Affiliation.
HOEHN, MITCHELL EDWARD was born 16 January 1960, is male, registered as Republican Party of Florida, residing at 1000 Palos Verde Dr, Orlando, Florida 32825. Florida voter ID number 123141570. The voter lists a mailing address and probably prefers you use it: 1000 PALOS VERDE DR ORLANDO FL 32825-8339 UNITED STATES. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2016 voter list: MITCHELL EDWARD HOEHN, 332 STREAMVIEW WAY, WINTER SPRINGS, FL 32708 Republican Party of Florida.
HOEHN, MONICA ASHLEY was born 6 January 1985, is female, registered as Florida Democratic Party, residing at 19844 50Th St N, Loxahatchee, Florida 33470. Florida voter ID number 111919784. The voter lists a mailing address and probably prefers you use it: PO BOX 647 LOXAHATCHEE FL 33470. This is the most recent information, from the Florida voter list as of 31 May 2017.
Hoehn, Monica Lee was born 22 March 1944, is female, registered as Republican Party of Florida, residing at 15470 Los Reyes Ln, Naples, Florida 34110. Florida voter ID number 103150369. Her telephone number is 1-239-455-5003. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2018 voter list: Monica Lee Hoehn, 11926 HEATHER WOODS CT, Naples, FL 34120 Republican Party of Florida.
Hoehn, Morgan Joshua was born 15 October 1993, is male, registered as Republican Party of Florida, residing at 552 Bayberry Lakes Blvd, Daytona Beach, Florida 32124. Florida voter ID number 122541882. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2018 voter list: Morgan Joshua Hoehn, 100 Manatee XING, APT 307, Daytona Beach, FL 32119 Republican Party of Florida.
HOEHN, NANCY ANN was born 29 January 1958, is female, registered as Republican Party of Florida, residing at 13732 Meadowpark Ave, Orlando, Florida 32826. Florida voter ID number 107643179. The voter lists a mailing address and probably prefers you use it: APT 175 509 S CHICKASAW TRL ORLANDO FL 32825 UNITED STATES. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 December 2015 voter list: NANCY ANN HOEHN, 3415 BELLINGHAM DR, ORLANDO, FL 32825 Republican Party of Florida.
Hoehn, Nancy B. born 9 June 1942, Florida voter ID number 104693906 See Vanneck, Nancy B. CLICK HERE.
HOEHN, NANCY E. was born 18 May 1930, is female, registered as Republican Party of Florida, residing at 7126 Sw 91St Ct, Ocala, Florida 34481. Florida voter ID number 108304713. The voter lists a mailing address and probably prefers you use it: 2000 BOARDWALK PLACE DR, APT 466 O'FALLON MO 63368. This is the most recent information, from the Florida voter list as of 31 December 2017.
Hoehn, Patricia was born 24 May 1961, is female, registered as No Party Affiliation, residing at 238 Plumoso Loop, Davenport, Florida 33897. Florida voter ID number 125654987. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Patricia was born 24 May 1961, is female, registered as Republican Party of Florida, residing at 1531 Kish Blvd, Trinity, Florida 34655. Florida voter ID number 106616734. This is the most recent information, from the Florida voter list as of 30 June 2017.
Hoehn, Patricia K. was born 19 June 1946, is female, registered as Republican Party of Florida, residing at 103 Se 139 Ave, Old Town, Florida 32680. Florida voter ID number 107195331. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: PATRICIA K. HOEHN, 3503 58TH AVE N, #46, ST PETERSBURG, FL 33714 Republican Party of Florida.
HOEHN, PATRICK ALLEN was born 6 August 1985, is male, registered as No Party Affiliation, residing at 10524 Demilo Pl, Apt A10 301, Orlando, Florida 32836. Florida voter ID number 119051278. His telephone number is 1-773-837-7302. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2017 voter list: PATRICK A. HOEHN, 10836 MYSTIC CIR, APT 204, ORLANDO, FL 32836 No Party Affiliation.
HOEHN, PATRICK E. was born 18 October 1963, is male, registered as Republican Party of Florida, residing at 19844 50Th St N, Loxahatchee, Florida 33470. Florida voter ID number 120225917. His telephone number is 1-561-441-9547. The voter lists a mailing address and probably prefers you use it: PO BOX 647 LOXAHATCHEE FL 33470. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Patrick Joseph was born 1 June 1989, is male, registered as Republican Party of Florida, residing at 1430 Bartow Dr, #302S, Celebration, Florida 34747. Florida voter ID number 122764613. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Payton Thomas was born 5 February 2000, registered as Republican Party of Florida, residing at 6305 Bridgecrest Dr, Lithia, Florida 33547. Florida voter ID number 125487440. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Phillip R. was born 2 May 1969, is male, registered as No Party Affiliation, residing at 4495 White Rd, Melbourne, Florida 32934. Florida voter ID number 100915322. The voter lists a mailing address and probably prefers you use it: PO BOX 120646 W Melbourne FL 32912-0646. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 July 2018 voter list: Phillip R. Hoehn, 1820 Kansas Rd SE, Palm Bay, FL 32909 No Party Affiliation.
Hoehn, Rachael A. born 30 April 1984, Florida voter ID number 100302008 See Christie, Rachael Ann. CLICK HERE.
HOEHN, RAYMOND G. was born 15 July 1926, is male, registered as Republican Party of Florida, residing at 9181 Bal Bay Pt, Boynton Beach, Florida 33473. Florida voter ID number 117464610. His telephone number is 1-954-428-8510. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, REBECCA A. was born 23 August 1964, is female, registered as No Party Affiliation, residing at 2609 Sw Acco Rd, Pt St Lucie, Florida 34953. Florida voter ID number 108182334. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, RICHARD A. was born 21 February 1955, is male, registered as Florida Democratic Party, residing at 13203 Dorchester Dr, Seminole, Florida 33776. Florida voter ID number 116462046. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2015 voter list: RICHARD A. HOEHN, 15712 REDINGTON DR, REDINGTON BEACH, FL 33708 Florida Democratic Party.
HOEHN, RICHARD DONALD was born 16 October 1972, is male, registered as Florida Democratic Party, residing at 4009 Stonefield Dr, Orlando, Florida 32826. Florida voter ID number 113203166. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, RICHARD W. was born 6 July 1950, is male, registered as Republican Party of Florida, residing at 520 Saint Dunstan Way, Winter Park, Florida 32792. Florida voter ID number 107782453. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Rita was born 10 October 1919, is female, registered as Republican Party of Florida, residing at 200 Deer Lake Cir, Ormond Beach, Florida 32174-4261. Florida voter ID number 108436398. This is the most recent information, from the Florida voter list as of 31 May 2013.
Hoehn, Robert Andrew was born 24 December 1941, is male, registered as Republican Party of Florida, residing at 4731 Bonita Bay Blvd, #101, Bonita Springs, Florida 34134. Florida voter ID number 114177961. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Robert E. was born 5 December 1939, is male, registered as No Party Affiliation, residing at 18122 Webster Grove Dr, Hudson, Florida 34667. Florida voter ID number 106652343. His telephone number is 1-727-868-1070. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, ROBERT H. was born 19 June 1921, is male, registered as Republican Party of Florida, residing at 6043 Calle Del Mar, West Palm Beach, Florida 33415. Florida voter ID number 112363839. This is the most recent information, from the Florida voter list as of 31 May 2012.
HOEHN, ROBERT KEITH was born 10 December 1970, is male, registered as Republican Party of Florida, residing at 6043 Calle Del Mar, West Palm Beach, Florida 33415. Florida voter ID number 112017583. This is the most recent information, from the Florida voter list as of 31 May 2017.
Hoehn, Robin Lynn was born 26 August 1962, is female, registered as No Party Affiliation, residing at 2112 S Cypress Bend Dr, Apt 205, Pompano Beach, Florida 33069-4452. Florida voter ID number 117030964. Her telephone number is 1-954-531-3591. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2015 voter list: Robin Lynn Hoehn, 2112 S Cypress Bend Dr, APT 205, Pompano Beach, FL 33069 No Party Affiliation.
Hoehn, Ronald Louis was born 13 September 1952, is male, registered as Republican Party of Florida, residing at 764 Heathrow Ave, Lady Lake, Florida 32159. Florida voter ID number 124056667. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Ruby Marie Wolff was born 7 February 1944, is female, registered as Republican Party of Florida, residing at 2906 Sw 130Th Ter, Archer, Florida 32618. Florida voter ID number 100389487. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, SALLIE L. was born 15 May 1932, is female, registered as Florida Democratic Party, residing at 3140 Ne 49Th St, Ocala, Florida 34479. Florida voter ID number 105647996. This is the most recent information, from the Florida voter list as of 31 August 2015.
HOEHN, SARA A. was born 15 July 1981, is female, registered as Republican Party of Florida, residing at 3742 Cr 511A, Wildwood, Florida 34785-8331. Florida voter ID number 108308796. Her telephone number is 1-352-748-5638. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Sarah D. was born 24 August 1990, is female, registered as Florida Democratic Party, residing at 1531 Kish Blvd, Trinity, Florida 34655. Florida voter ID number 115607904. This is the most recent information, from the Florida voter list as of 30 June 2017.
Hoehn, Sarah Dulcie was born 24 August 1990, registered as Florida Democratic Party, residing at 238 Plumoso Loop, Davenport, Florida 33897. Florida voter ID number 125886758. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, SARA M. was born 9 December 1987, is female, registered as Republican Party of Florida, residing at 1409 S Berthe Ave, Panama City, Florida 32404-9671. Florida voter ID number 114054588. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Scott Robert was born 3 July 1982, is male, registered as No Party Affiliation, residing at 700 Front St, Welaka, Florida 32193. Florida voter ID number 118009530. This is the most recent information, from the Florida voter list as of 31 May 2013.
Hoehn, Sharon Dawn was born 6 February 1956, is female, registered as Florida Democratic Party, residing at 3206 45Th Way E, Bradenton, Florida 34203. Florida voter ID number 105497138. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, SHEILA MARIE LEA was born 14 August 1973, is female, registered as Florida Democratic Party, residing at 4009 Stonefield Dr, Orlando, Florida 32826. Florida voter ID number 112742348. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, Stephanie Nicole was born 29 December 1987, is female, registered as Florida Democratic Party, residing at 9737 Tranquility Lake Cir, Apt 405, Riverview, Florida 33578. Florida voter ID number 114052633. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 December 2018 voter list: Stephanie Nicole Hoehn, 238 Plumoso LOOP, Davenport, FL 33897 Florida Democratic Party.
30 November 2018 voter list: Stephanie Nicole Hoehn, 9737 TRANQUILITY LAKE Cir, APT 405, Riverview, FL 33578 Florida Democratic Party.
31 August 2016 voter list: Stephanie Nicole Hoehn, 1531 Kish BLVD, Trinity, FL 34655 Florida Democratic Party.
HOEHN, SUSAN LUELLA was born 30 December 1954, is female, registered as Republican Party of Florida, residing at 2324 Malysa Pl, Pensacola, Florida 32504. Florida voter ID number 104042604. Her telephone number is 1-850-434-6622. This is the most recent information, from the Florida voter list as of 31 March 2019.
28 February 2019 voter list: SUSAN LUELLA HOEHN, 15930 INNERARITY POINT RD, PENSACOLA, FL 325078314 Republican Party of Florida.
31 December 2018 voter list: SUSAN LUELLA HOEHN, 3821 SCENIC HWY, PENSACOLA, FL 32504 Republican Party of Florida.
HOEHN, TARA ANN was born 9 December 1987, is female, registered as Republican Party of Florida, residing at 10936 Johnson Blvd, Youngstown, Florida 32466. Florida voter ID number 114266582. This is the most recent information, from the Florida voter list as of 31 August 2017.
Hoehn, Taylor N. born 14 November 1991, Florida voter ID number 119447444 See SCHWARZ, TAYLOR NICOLE. CLICK HERE.
HOEHN, TERENCE M. was born 14 January 1963, is male, registered as Florida Democratic Party, residing at 15136 Nw 308Th St, Okeechobee, Florida 34972. Florida voter ID number 101717581. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2016 voter list: Terence M. Hoehn, 5651 NW 107th Ave, Coral Springs, FL 330763107 Florida Democratic Party.
31 May 2015 voter list: Terence M. Hoehn, 5651 NW 107th Ave, Coral Springs, FL 33076 Florida Democratic Party.
Hoehn, Terence W. was born 29 July 1963, is male, registered as Republican Party of Florida, residing at 9335 Meadow Crest Ln, Clermont, Florida 34711. Florida voter ID number 104958143. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, TERESA ANN was born 23 January 1963, is female, registered as Florida Democratic Party, residing at 3907 Dolphin Dr, Panama City Beach, Florida 32408. Florida voter ID number 100629545. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: TERESA ANN HOEHN, 17462 Front Beach RD, #16C BOX 122, PANAMA CITY BEACH, FL 32413 Florida Democratic Party.
HOEHN, THEODORE SCOTT was born 20 March 1958, is male, registered as Florida Democratic Party, residing at 1513 Atapha Nene, Tallahassee, Florida 32301-4738. Florida voter ID number 104995877. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, THOMAS J. was born 28 February 1954, is male, registered as Republican Party of Florida, residing at 1357 Irving Ave, Clearwater, Florida 33756. Florida voter ID number 106995943. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: THOMAS JOSEPH HOEHN, 1357 IRVING AVE, CLEARWATER, FL 33756 Republican Party of Florida.
Hoehn, Thomas James was born 26 November 1993, is male, registered as Republican Party of Florida, residing at 15470 Los Reyes Ln, Naples, Florida 34110. Florida voter ID number 119080559. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 December 2018 voter list: Thomas James Hoehn, 11926 HEATHER WOODS CT, Naples, FL 34120 Republican Party of Florida.
Hoehn, Thomas Joseph was born 23 March 1983, is male, registered as No Party Affiliation, residing at 238 Plumoso Loop, Davenport, Florida 33897. Florida voter ID number 106595266. His telephone number is 1-407-810-2966. His email address is TJHOE029@OUTLOOK.COM. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2018 voter list: Thomas Joseph Hoehn, 16340 Cagan Oaks, APT 308, Clermont, FL 34714 No Party Affiliation.
31 August 2016 voter list: Thomas Joseph Hoehn, 511 Avenida Cuarta, APT 212, Clermont, FL 34714 No Party Affiliation.
30 September 2015 voter list: Thomas Joseph Hoehn, 511 Avenida Cuarta, 212, Clermont, FL 34714 No Party Affiliation.
Hoehn, Thomas Walter was born 22 May 1960, is male, registered as Florida Democratic Party, residing at 1508 Michigan Ave, Apt 2, Miami Beach, Florida 33139. Florida voter ID number 126003757. His email address is thoehn@mac.com. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 January 2019 voter list: Thomas Walter Hoehn, 1535 Meridian AVE, APT 3, Miami Beach, FL 33139 Florida Democratic Party.
HOEHN, TIMOTHY D. was born 21 October 1959, is male, registered as Republican Party of Florida, residing at 4560 Sw 46Th Ave, Ocala, Florida 34474. Florida voter ID number 115444323. This is the most recent information, from the Florida voter list as of 22 October 2014.
HOEHN, TINA L. was born 23 October 1963, is female, registered as Republican Party of Florida, residing at 19844 50Th St N, Loxahatchee, Florida 33470. Florida voter ID number 112207368. The voter lists a mailing address and probably prefers you use it: PO BOX 647 LOXAHATCHEE FL 33470. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, William was born 24 September 1933, is male, registered as Republican Party of Florida, residing at 1022 Ne 39Th St, Apt 1, Oakland Park, Florida 33334-2950. Florida voter ID number 115451303. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2015 voter list: William Hoehn, 1022 NE 39th St, APT 1, Oakland Park, FL 33334 Republican Party of Florida.
Hoehn, William Henry was born 25 December 1942, is male, registered as Republican Party of Florida, residing at 2906 Sw 130Th Ter, Archer, Florida 32618. Florida voter ID number 100389488. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, William Joseph was born 18 January 1954, is male, registered as Republican Party of Florida, residing at 11545 Holmes Dr, Clermont, Florida 34711. Florida voter ID number 104916649. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn, William Michael was born 27 July 1945, is male, registered as No Party Affiliation, residing at 1530 S Ocean Blvd, Laud By The Sea, Florida 33062. Florida voter ID number 122967223. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHN, WILLIAM P. was born 8 April 1932, is male, registered as Republican Party of Florida, residing at 7126 Sw 91St Ct, Ocala, Florida 34481. Florida voter ID number 108304714. The voter lists a mailing address and probably prefers you use it: 2000 BOARDWALK PLACE DR UNIT 466 O FALLON MO 63368-3900. This is the most recent information, from the Florida voter list as of 31 October 2018.
31 May 2012 voter list: WILLIAM P. HOEHN, , , FL Republican Party of Florida.
HOEHN, ZOLA LOUISE was born 24 May 1998, is female, registered as Florida Democratic Party, residing at 1513 Atapha Nene, Tallahassee, Florida 32301. Florida voter ID number 122942523. This is the most recent information, from the Florida voter list as of 31 March 2019.
Hoehn-Bral, Susan Christine was born 1 July 1966, is female, registered as Republican Party of Florida, residing at 1240 Admirals Walk, Vero Beach, Florida 32963. Florida voter ID number 123862994. Her telephone number is 1-563-381-7633. The voter lists a mailing address and probably prefers you use it: 2715 W 66Th St Davenport IA 52806-1512. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 August 2017 voter list: SUSAN CHRISTINE HOEHN-BRAL, 6721 EASTPOINTE PINES ST, PALM BEACH GARDENS, FL 33418 Republican Party of Florida.
HOEHNDORF, NORMA SHONERD was born 10 November 1937, is female, registered as Republican Party of Florida, residing at 1910 Del Norte Dr, The Villages, Florida 32159. Florida voter ID number 108304929. Her telephone number is 1-352-753-6461. Her email address is 18271NHOEHNDORF@COMCAST.COM. This is the most recent information, from the Florida voter list as of 31 March 2019.
HOEHNDORF, WILHELM FRIEDRICH was born 27 May 1939, is male, registered as Republican Party of Florida, residing at 1910 Del Norte Dr, The Villages, Florida 32159. Florida voter ID number 108304930. His telephone number is 1-352-753-6461. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2015 voter list: WILHELM F. HOEHNDORF, 1910 DEL NORTE DR, THE VILLAGES, FL 32159 Republican Party of Florida. | 2019-04-22T18:25:02Z | https://flvoters.com/pages/h107838.html |
Screening for hyperaldosteronism should include assessment of plasma aldosterone and plasma renin activity or plasma renin (Supplemental Table S7).
For patients with suspected hyperaldosteronism (on the basis of the screening test; Supplemental Table S7, Item iii.), a diagnosis of primary aldosteronism should be established by demonstrating inappropriate autonomous hypersecretion of aldosterone using at least one of the manoeuvres listed in Supplemental Table S7, Item iv. When the diagnosis is established, the abnormality should be localized using any of the tests described in Supplemental Table S7, Item v.
In patients with primary hyperaldosteronism and a definite adrenal mass who are eligible for surgery, adrenal venous sampling is recommended to assess for lateralization of aldosterone hypersecretion. Adrenal vein sampling should be performed exclusively by experienced teams working in specialized centres (Grade C)..
If pheochromocytoma or paraganglioma is strongly suspected, the patient should be referred to a specialized hypertension centre, particularly if biochemical screening tests (Supplemental Table S8) have already been found to be positive (Grade D).
For patients with positive biochemical screening tests, localization of pheochromocytomas or paragangliomas should employ magnetic resonance imaging (preferable), computed tomography (if magnetic resonance imaging is unavailable), and/or iodine I-131 metaiodobenzylguanidine (MIBG) scintigraphy (Grade C for each modality).
An excess of aldosterone as a cause for hypertension (primary aldosteronism) has traditionally been considered relatively rare (approximately 1% of hypertensive patients). However, recent studies using improved diagnostic methods have suggested that forms of hyperaldosteronism are much more prevalent, perhaps occurring in up to 15.5% of hypertensive patients and even 1.5% of normotensive subjects (1-6). Primary aldosteronism, is often caused by an aldosterone-producing adrenal adenoma, idiopathic hyperaldosteronism/bilateral adrenal hyperplasia, unilateral hyperplasia, and less commonly adrenal carcinoma and familial hyperaldosteronism (glucocorticoid remediable or non-remediable). Differentiation between unilateral and bilateral forms of aldosterone hypersecretion has important treatment implications. Unilateral forms might be amenable to improvement or even cure with adrenalectomy. In contrast, mineralocorticoid receptor antagonists are the treatment of choice for bilateral hypersecretion and in patients who are not able or not willing to have surgery.
Hyperaldosteronism may be associated with the full spectrum of the hypertension severity, from mild to severe. Often, primary hyperaldosteronism is asymptomatic. Symptoms attributed to primary aldosteronism are nonspecific and have classically included weakness, cramps, and nocturia. While hypokalemia is suggestive of primary aldosteronism when present, its absence should not be relied on to exclude the diagnosis. In some reports, hypokalemia has been found in less than 50% of confirmed cases of primary aldosteronism (4,7). Although plasma and urinary aldosterone concentrations are elevated, and the plasma renin activity concentration is very low, individual values of these parameters have low sensitivity and specificity.
The ratio of plasma aldosterone concentration to plasma renin activity may be determined as a screening test (8-11). We express plasma aldosterone in pmol/L (conversion factor from ng/dL: multiply by 27.74) and plasma renin activity in ng/mL/h (conversion factor from direct renin/renin mass assay in ng/mL: multiply by 0.206; this conversion factor varies among laboratories). Standardization of units is further complicated because some laboratories now measure renin mass/direct renin rather than plasma renin activity. There is no easy conversion, because the percentage of active renin varies considerably. When analyzing the ratios, it is extremely important be familiar with locally used units so there is no confusion/errors in interpretation.
We selected a ratio (greater than 750 pmol/L/ng/ml/h (1)) for screening to be consistent with other organizations; therefore, we recommend confirmatory testing for those with higher ratios. The most appropriate method of measuring renin remains a contentious issue (12). It is increasingly common to measure direct renin/renin mass (or renin concentration) in place of plasma renin activity. While direct renin/renin mass measurements are considerably easier to perform, renin activity may be more precise, particularly when active renin concentrations are low. The test results and the units in which these results are expressed will depend on local laboratory services. The various units in which the results may be expressed may bewilder the clinician and as such, a table with estimated conversion rates is appended (Table 5). Because of possible laboratory-to-laboratory variation in technique and reference ranges, clinicians who use these conversion factors should confirm these conversion values with their local laboratories.
Uncorrected hypokalemia (K+ <3.3mmol/L), severe sodium restriction, and administration of renin-angiotensin inhibitors, diuretics and DHP-calcium channel antagonists may cause false-negative ratios and beta-blockers can cause a false positive (13). Other factors that can interfere with interpretation include renal dysfunction, oral contraceptives, NSAIDs, and in particular mineralocorticoid receptor antagonists. If possible, alpha blockers, hydralazine, and/or verapamil should be used for blood pressure control while testing since they have minimal interference with biochemical testing (but this may not be possible depending on the risk and clinical situation). The ratio should be measured in patients that have been ambulatory for at least 2 hours using morning specimens drawn after sitting for at least 15 min (1,4,14). The value of these ratios appears to be primarily in defining a subpopulation with a high rate of confirmed primary aldosteronism (29% to 93%). Aldosterone levels below 330 pmol/L are rarely associated with hyperaldosteronism, even if the ratio is elevated.
Options for confirmation of autonomy of aldosterone secretion include one or more of those cited in the recommendations above (4,15-17). This includes oral sodium loading, intravenous sodium loading, or captopril suppression testing. In all cases, aldosterone supressibility, ascertained through plasma or 24hr urine aldosterone, is a normal finding. Few studies have assessed the comparative utility among this repertoire of testing options (17). In the presence of familial hyperaldosteronism, glucocorticoid-suppressible hyperaldosteronism should be ruled out with genetic testing.
When the diagnosis of primary aldosteronism is confirmed, differentiation among possible causes should be attempted using functional assays and/or adrenal imaging (18-20). Regarding imaging, CT scanning is the first imaging test of choice due to sensitivity; specificity is reduced because of incidentalomas (22,23). Adenomas greater than 1 cm in diameter are more readily detected, but those smaller than 1 cm in diameter are difficult to detect. Regarding functional testing, direct measurement of aldosterone secretion using AVS is widely considered to be the gold standard technique to determine lateralization (24-27). If AVS is not available, localization with 131iodine-labelled iodocholesterol under dexamethasone suppression can be performed, but is not widely available and may yield false negative results if the lesion is < 1.5cm (23). Even so, use of AVS might be limited because of technical challenges and reportedly high procedural failure rates, because of difficulties in localizing the adrenal veins (especially on the right side) because of small vessel size and variations in anatomy (30). In a retrospective study of 5 centres using the German Conn’s registry, successful bilateral catheterization was only achieved in 30.5% of cases (31). Performance appeared to be related to technical proficiency. Accordingly, when strictly performed by experienced teams in specialized centres with high throughput, some have reported impressive AVS success rates of > 90% (28,33-38). Therefore, AVS should be exclusively performed at experienced centres to minimize the risk of potential failed catheterizations and unnecessary procedural complications.
Numerous studies have reported significant discordance between conventional cross-sectional imaging with CT and AVS.63-68 Accordingly, reliance on imaging alone to determine lateralization might result in inappropriate treatment decisions and both imaging and functional testing are recommended in most cases.
Aldosterone-producing adenonas can usually be removed by unilateral adrenalectomy, usually laparoscopically, with good surgical and hypertension outcomes along with normalization of potassium levels (41-43). However, a significant proportion of such patients remain hypertensive and, therefore, warrant close follow-up especially if strong family history of HTN, multiple medications required pre-op or BP control, older age, and longer duration of HTN (41,43-45). Aldosterone antagonists, particularly spironolactone in low to moderate doses, are quite effectivein idiopathic/bilateral hyperplasia hyperaldosteronism and moderately effective even in those who are not surgical candidates or refuse surgery for aldosterone producing adenomas (46), reducing both blood pressure, normalizing potassium, and the need for multiple drug therapy (12,46). Blood pressure lowering responses to other potassium-sparing diuretics, ACEIs, ARBs and calcium channel blockers are modest-to-moderate (47).
Pheochromocytomas and paragangliomas (PPGL) are an infrequent cause of hypertension (less than 0.3%) (37,38). The prevalence is greater among patients with adrenal incidentaloma (4%) (50,51). Because of the low incidence of pheochromocytoma/PPGL, the significant risk of severe adverse sequelae (stroke, myocardial infarction, arrhythmias, CHF, cardiomyopathy, and particularly abrupt onset of malignant hypertension), and specialized therapeutic interventions, we recommend referral of individuals suspected of having pheochromocytomas/PPGL to centres with experience in their management.
Pheochromocytoma/PPGL may present with a wide spectrum of clinical features, including those that are not generally attributed to excess catecholamines (41). Paroxysmal or severe sustained hypertension, labile hypertension, hypertensive crises triggered by beta-blockers or monoaminoxidase inhibitors, surgery, anesthesia, or symptoms such as severe headache, palpitations, sweating (a common triad of symptoms), pallor, tremulousness, syncope, weight loss, abdominal pain, paroxysmal hypertension with micturition, require investigation for pheochromocytoma/PPGL (49,52,53). Other suggestive signs include orthostatic hypotension, tachycardia, palpable flank mass, polycythemia, hypercalcemia, shock, port wine hemangiomas (von Hippel-Lindau disease), thyroid tumour, and mucosal neuromas, cafe au lait spots or the presence of several axillary freckles. It is important to note that persons with pheochromocytomas/PPGLs may also be normotensive and asymptomatic, particularly those with familial forms (about 10% of cases) (52). About 10% of Pheochromocytomas/PPGLs are extra-adrenal, bilateral, familial, malignant, recurrent, in children, and present with stroke (Rule of 10’s).
The differential diagnosis of pheochromocytoma/PPGL does include panic attacks, migraines, carcinoid, thyrotoxicosis, sepis, MI, dysautonomia, CNS lesions, certain drugs, cocaine, and drug/toxin withdrawal and a newer entity called pseudopheochromocytoma. However, these are diagnoses to consider once Pheochromocytoma/PPGL is ruled out.
Currently, the most widely used screening approach is a 24 h urine collection for the assessment of urinary fractionated metanephrines (catechol-0-methyltransferase metabolites of catecholamines), which are reported to have a sensitivity over 90% (48) and urinary catacholamines (sensitivity over 80%). Because of lower sensitivity, we advise against using urinary or plasma VMA measurements as screening tests. Concurrent collection of urinary creatinine concentration permits a creatinine correction to adjust for completeness of the 24 h collection (54,55).
However, in other cohorts of patients with pheochromocytoma/PPGL, urinary metanephrine testing has been reported to be less sensitive (56). Assays of plasma metanephrines measurements have exhibited a high sensitivity (56-58). However, this assay is not widely available. A negative plasma fractionated metanephrine measurement can be used in a low-risk setting to rule out pheochromocytoma. This is based on a systematic review (59) that demonstrated a pooled negative likelihood ratio of 0.02 (95% CI 0.01 to 0.07) for a negative plasma fractionated metanephrine measurement in predicting pheochromocytoma/PPGL in patients with sporadic pheochromocytoma (low-risk group) (60). Given the low specificity a positive result in a low-risk setting (refractory hypertension) should be interpreted with caution.
When borderline results are observed (only one panel of tests is abnormal, no hard clinical findings are present, mild elevation in results, false positive concerns), the 1st step is to repeat the testing. The clonidine suppression test is an option for differentiating pheochromocytoma from other conditions if the above approach is still equivocal. In three separate assessments, it was associated with sensitivity estimates of 73% to 100% and specificity estimates of 74% to 100% (61-53). Concerns regarding the glucagon stimulation test have included low sensitivity, false positives and the triggering of hypertensive episodes, and thus is seldom used or required (63,64).
Localization of pheochromocytomas/PPGLs should include CT +/- MRI imaging and if indicated, 123 or 131 iodine MIBG scintigraphy, octreotide scanning or PET scanning. MRI is associated with a sensitivity of 98% to 100% for adrenal pheochromocytomas and 88% for extra-adrenal lesions (65,66). While aggregate estimates for the sensitivity of CT and MIBG imaging are 89% and 81%, respectively, they are much lower for bilateral (66% and 62%) and extra-adrenal (64% and 64%) pheochromocytomas/PPGLs (65). A combination of anatomical (MRI or CT) and functional imaging (MIBG) may often be desired because of reported low specificity of MRI and CT (50%) and higher specificity of MIBG (88% to 100%) (67-69). MIBG/Octreotide/PET scanning may (70) be useful to detect metastatic disease for persons with malignant pheochromocytoma/PPGL (71-74).
The assessments of therapeutic interventions for managing pheochromocytomas/PPGLs are based on small case series, at times with comparisons with historical controls. While these reports are methodologically weak, it is important to note the historically high mortality rates associated with this diagnosis when untreated or unsuspected (75,76), particularly if resected before the use of perioperative alpha-blockade (mortality of 25% to 50%) or if surgery occurs in persons with unsuspected pheochromocytoma (77,78). This compares with the currently low perioperative complication rates and expectations of a cure when benign pheochromocytomas/PPGLs are laparoscopically resected (52,79-81). In addition to alpha blockade 10-14 days pre-operatively, it is vital to have adequate volume replacement and liberal sodium intake since volume contraction is common in this condition. Other anti-hypertensives can be added as necessary but diuretics should be avoided if possible. Oral beta-blockers, usually necessary, should only be started after a few days of adequate alpha blockade to control tachycardia and prevent arrhythmias during surgery.
Alpha-blockade with prazosin, doxazosin or phenoxybenzamine has been studied following diagnosis and as part of preparation during the preoperative period (82-85). While prasozin was associated with blood pressure reduction and diminished symptoms, it did not prevent blood pressure rises during surgery, and intravenous phentolamine was often required. Currently, phenoxybenzamine is the oral alpha blocker of choice pre-operatively (it is a non-selective, irreversible alpha blocker) but it has no DIN number and requires Health Canada special access (86-92). Three controlled case series have reported favourable effects on blood pressure control, need for intravenous phentolamine, blood loss and volume replacement of approximately one month of preoperative administration of the catecholamine synthesis blocker alpha-methyl-p-tyrosine (metyrosine) (93-95). Metyrosine can be considered if a inoperable/malignant Pheochromocytoma/PPGL is present and as an adjunct to alpha blockade pre-operatively in rare instances. Again, it has no DIN number.
Laparoscopic resections of pheochromocytomas/PPGLs, when compared with nonrandomized, conventional transabdominal adrenalectomy control subjects, have been associated with longer procedure times, comparable or less intraoperative cardiovascular instability, less blood loss and more rapid convalescence (80,81,96). Our recommendation to administer intravenous volume expansion in the perioperative period to avoid postoperative shock is supported by evidence from only small case series (97,98). However, it is also supported by pathophysiological rationale, including vasodilation after excision of the tumour, the residual effects of pre- and intraoperative alpha-blockers and intra- operative fluid loss.
Undetected pheochromocytoma during pregnancy carries a particularly high risk for both mother and fetus (99). Nuclear scanning and CT scanning is contraindicated so MRI is preferred for imaging/localization. Management depends on gestational age and should be individualized, but carried out in centres with experience in the management of both high-risk obstetrics and pheochromocytoma. In early pregnancy, if a decision is made to terminate the pregnancy, this should be carried out under alpha- and beta-blockade, followed immediately by tumour resection. In late pregnancy, alpha- and beta-blockade, followed by elective cesarean section and immediate tumour resection is recommended.
Patients with inoperable or metastatic malignant pheochromocytomas may be considered for treatment with combination chemotherapy and/or high doses of 131 iodine MIBG or Indium-111 labeled octreotide. The combination of cyclophosphamide, vincristine and dacarbazine has been associated with tumour and bio- chemical response rates of 57% and 79%, respectively, and improved performance status and blood pressure control (100,101). The possible but uncertain benefit of chemotherapy should be balanced against recognized chemotherapy-induced toxicity. High dose 131-Iodine MIBG has been associated with reduced symptoms, tumour size and possibly death (61). The methodology employed to assess the benefits of both of these approaches is not strong.
For patients with pheochromocytomas/PPGLs long-term follow-up studies measuring urinary or, where available, plasma metanephrines should be performed because recurrence after laparoscopic partial or unilateral adrenalectomy may occur and especially more frequent with the familial forms. Genetic testing of first degree family members for the familial forms should be considered for those with a family history of Pheochromocytoma/PPGL, <50 years in age, multiple lesions, malignant lesions, and bilateral Pheochromocytoma/PPGLs.
Loh KC, Koay ES, Khaw MC, Emmanuel SC, Young WF Jr. Prevalence of primary aldosteronism among Asian hypertensive patients in Singapore. J Clin Endocrinol Metab 2000;85:2854-9.
Lim PO, Rodgers P, Cardale K, Watson AD, MacDonald TM. Potentially high prevalence of primary aldosteronism in a primary- care population. Lancet 1999;353:40.
Lim PO, Dow E, Brennan G, Jung RT, MacDonald TM. High prevalence of primary aldosteronism in the Tayside hypertension clinic population. J Hum Hypertens 2000;14:311-5.
Fardella CE, Mosso L, Gomez-Sanchez C, et al. Primary hyperaldosteronism in essential hypertensives: prevalence, biochemical profile, and molecular biology. J Clin Endocrinol Metab 2000;85:1863-7.
Brown MA, Cramp HA, Zammit VC, Whitworth JA. Primary hyperaldosteronism: a missed diagnosis in ‘essential hypertensives’? Aust N Z J Med 1996;26:533-8.
Hiramatsu K, Yamada T, Yukimura Y, Komiya I, Ichikawa K, Ishihara M, Nagata H, Izumiyama T 1981 A screening test to identify aldosterone-producing adenoma by measuring plasma renin activity. Results in hypertensive patients. Arch Intern Med 1981;141:1589–93.
McKenna TJ, Sequeira SJ, Heffernan A, Chambers J, Cunningham S. Diagnosis under random conditions of all disorders of the renin-angiotensin-aldosterone axis, including primary hyperaldosteronism. J Clin Endocrinol Metab 1991;73:952–7.
Stowasser M, Gordon RD, Gunasekera TG, Cowley DC, Ward G, Archibald C, Smithers BM High rate of detection of primary aldosteronism, including surgically treatable forms, after ‘non-selective’ screening of hypertensive patients. J Hypertens 2003;21:2149–57.
Cartledge S, Lawson N. Aldosterone and renin measurements. Ann Clin Biochem 2000;37:262-78.
Mularero P, Rabbia F, Milan A, et al. Drug effects on aldosterone/plasma renin activity ratio in primary aldosteronism. Am J Hypertens 2003;16:593.
Gordon RD, Stowasser M, Tunny TJ, Klemm SA, Rutherford JC. High incidence of primary aldosteronism in 199 patients referred with hypertension. Clin Exp Pharmacol Physiol 1994;21:315-8..
Arteaga E, Klein R, Biglieri EG. Use of the saline infusion test to diagnose the cause of primary aldosteronism. Am J Med 1985;79:722-8.
Lyons DF, Kern DC, Brown RD, Hanson CS, Carollo ML. Single dose captopril as a diagnostic test for primary aldosteronism. J Clin Endocrinol Metab 1983;57:892-6.
Agharazii M, Douville P, Grose JH, LeBel M. Captopril suppression versus salt loading in confirming primary aldosteronism. Hypertension 2001;37: 1440-3.
Ganguly A. Primary aldosteronism. N Engl J Med 1998;339:1828-34.
Ganguly A, Dowdy AJ, Luetscher JA, Melada GA. Anomalous postural response of plasma aldosterone concentration in patients with aldosterone-producing adrenal adenoma. J Clin Endocrinol Metab 1973;36:401-4.
Melby JC, Spark RF, Dale SL, Egdahl RH, Kahn PC. Diagnosis and localization of aldosterone-producing adenomas by adrenal-vein catheterization. N Engl J Med 1967;277:1050- 6.
Satoh F, Morimoto R, Ono Y, Iwakura Y, Omata K, et al. Measurement of peripheral plasma 18-oxocortisol can discriminate unilateral adenoma from bilateral diseases in patients with primary aldosteronism. Hypertension 2015;65(5):1096-1102.
Doppman JL, Gill JRJr, Miller DL, et al. Distinction between hyperaldosteronism due to bilateral hyperplasia and unilateral aldosteronoma: reliability of CT. Radiology 1992;184:677-82.
Nocaudie-Calzada M, Huglo D, Lambert M, et al. Efficacy of iodine-131 6beta-methyl-iodo- 19-norcholesterol scintigraphy and computed tomography in patients with primary aldosteronism. Eur J Nucl Med 1999;26:1326-32.
Srowasser M. Primary aldosteronism: rare bird or common cause of secondary hypertension? Curr Hypertens Rep 2001;3:230-9.
McAlister FA, Lewanczuk RZ. Primary hyperaldosteronism and adrenal incidentaloma: an argument for physiologic testing before adrenalectomy. Can J Surg 1998;41:299-305.
Young WF, Stanson AW, Thompson GB, Grant CS, Farley DR, van Heerden JA Role for adrenal venous sampling in primary aldosteronism. Surgery 2004;136:1227–35.
Nwariaku FE, Miller BS, Auchus R, Holt S, Watumull L, Dolmatch B, Nesbitt S, Vongpatanasin W, Victor R, Wians F, Livingston E, Snyder WH, 3rd Primary hyperaldosteronism: effect of adrenal vein sampling on surgical outcome. Arch Surg 2006;141:497–502.
Young WF, Stanson AW, Thompson GB, et al. Role for adrenal venous sampling in primary aldosteronism. Surgery 2004;136:1227-35.
Kempers MJ, Lenders JW, van Outheusden L, et al. Systematic review: diagnostic procedures to differentiate unilateral from bilateral adrenal ab- normality in primary aldosteronism. Ann Intern Med 2009;151:329-37.
Daunt N. Adrenal vein sampling: how to make it quick, easy, and suc- cessful. Radiographics 2005;25(suppl 1):S143-58.
Vonend O, Ockenfels N, Gao X, et al. Adrenal venous sampling: eval- uation of the German Conn’s registry. Hypertension 2011;57:990-5.
Kline GA, Pasieka JL, Harvey A, So B, Dias VC. High-probability fea- tures of primary aldosteronism may obviate the need for confirmatory testing without increasing false-positive diagnoses. J Clin Hypertens (Greenwich) 2014;16:488-96.
Harvey A, Pasieka JL, Kline G, So B. Modification of the protocol for selective adrenal venous sampling results in both a significant increase in the accuracy and necessity of the procedure in the management of pa- tients with primary hyperaldosteronism. Surgery 2012;152:643-9 [dis- cussion: 649-51].
Doppman JL, Gill JR Jr, Miller DL, et al. Distinction between hyper- aldosteronism due to bilateral hyperplasia and unilateral aldosteronoma: reliability of CT. Radiology 1992;184:677-82.
Harper R, Ferrett CG, McKnight JA, et al. Accuracy of CT scanning and adrenal vein sampling in the pre-operative localization of aldosterone- secreting adrenal adenomas. QJM 1999;92:643-50.
Magill SB, Raff H, Shaker JL, et al. Comparison of adrenal vein sampling and computed tomography in the differentiation of primary aldoste- ronism. J Clin Endocrinol Metab 2001;86:1066-71.
Nwariaku FE, Miller BS, Auchus R, et al. Primary hyperaldosteronism: effect of adrenal vein sampling on surgical outcome. Arch Surg 2006;141: 497-502 [discussion: 502-493].
Giacchetti G, Ronconi V, Lucarelli G, Boscaro M, Mantero F. Analysis of screening and confirmatory tests in the diagnosis of primary aldosteronism: need for a standardized protocol. J Hypertens 2006;24:737–45.
Clinical Practice Guideline. J Clin Endocrinol Metab 2008;93(9):3266–81.
Lo CY, Tam PC, Kung AW, et al. Primary aldosteronism. Results of surgical treatment. Ann Surg 1996;224:125-30.
Lo CY, van Heerden JA, Grant CS, Soreide JA, Warner MA, Ilstrup DM. Adrenal surgery in the elderly: too risky? World J Surg 1996;20:368-73.
Favia G, Lumachi F, Scarpa V, D’Amico DE Adrenalectomy in primary aldosteronism: a long- term follow-up study in 52 patients. World J Surg 1992;16:680-3.
Sawka AM, Young WF, Thompson GB, et al. Primary aldosteronism: factors associated with normalization of blood pressure after surgery. Ann Intern Med 2001;135:258-61.
Meyer A, Brabant G, Behrend M Long-term follow- up after adrenalectomy for primary aldosteronism. World J Surg 2005;29:155–9.
Ghose RP, Hall PM, Bravo EL Medical management of aldosterone-producing adenomas. Ann Intern Med 1999;131:105–8.
Lim PO, Young WF, MacDonald TM. A review of the medical treatment of primary aldosteronism. J Hypertens 2001;19:353-61.
Plouin PF, Gimenez-Roqueplo AP, La Batide AA, Salenave S, Duclos JM. [Recent progress in the diagnosis, prognostic evaluation and treatment of pheochromocytomas]. Rev Med Interne 2000;2I:l075-85.
Bravo EL. Evolving concepts in the pathophysiology, diagnosis, and treatment of pheochromocytoma. Endocr Rev 1994;15:356-68.
Bernini GP, Vivaldi MS, Argenio GF, Moretti A, Sgro M, Salvetti A. Frequency of pheochromocytoma in adrenal incidentalomas and utility of the glucagon test for the diagnosis. J Endocrinol Invest 1997;20:65-71.
Mannelli M, Ianni L, Cilotti A, Conti A. Pheochromocytoma in Italy: a multicentric retrospective study. Eur J Endocrinol 1999;141:619-24..
Noshiro T, Shimizu K, Watanabe T, et al. Changes in clinical features and long-term prognosis in patients with pheochromocytoma. Am J Hypertens 2000;13:35-43.
Gifford RW Jr, Manger WM, Bravo EL. Pheochromocytoma. Endocrinol Metab Clin North Am 1994;23:387-404.
Heron E, Chatellier G, Billaud E, Foos E, Plouin PE. The urinary metanephrine-to-creatinine ratio for the diagnosis of pheochromocytoma. Ann Intern Med 1996;125:300-3.
Lenders et al. Guidelines on Pheochromocytoma and Paraganglioma. J Clin Endocrinol Metab 2014;99:1915–1942 .
Lenders JW, Keiser HR, Goldstein DS, et al. Plasma metanephrines in the diagnosis of pheochromocytoma. Ann Intern Med 1995;123:101-9.
Raber W, Raffesberg W, Bischof M, et al. Diagnostic efficacy of unconjugated plasma metanephrines for the detection of pheochromocytoma. Arch Intern Med 2000;160:2957-63.
Eisenhofer G, Lenders }W, Linehan WM, Walther MM, Goldstein DS, Keiser HR. Plasma normeranephrine and metanephrine for detecting pheochromocytoma in von Hippel-Lindau disease and multiple endocrine neoplasia type 2. N Engl J Med 1999;340:1872-9.
Sawka AM, Prebtani AP, Thabane L, Gafni A, Levine M, Young WF Jr. A systematic review of the literature examining the diagnostic efficacy of measurement of fractionated plasma free metanephrines in the biochemical diagnosis of pheochromocytoma. BMC Endocr Disord 2004;4:2.
Lenders et al Guidelines on Pheochromocytoma and Paraganglioma. J Clin Endocrinol Metab 2014;99:1915–1942.
Sjoberg RJ, Simcic KJ. Kidd GS. The clonidine suppression test for pheochromocytoma. A review of its utiliry and pitfalls. Arch Intern Med 1992;152:1193-7.
Bravo EL, Tarazi RC, Fouad FM, Vide DG, Gifford RW Jr. Clonidine- suppression test: a useful aid in the diagnosis of pheochromocytoma. N Engl J Med 1981;305:623-6.
Grossman E, Goldstein DS, Hoffman A, Keiser HR. Glucagon and clonidine testing in the diagnosis of pheochromocytoma. Hypertension 1991;17:733-41.
Kuchel 0, Hainer P, Buu NT, Larochelle P. Basis of false-positive glucagon tests for pheochromocytoma. Clin Pharmacol Ther 1981;29:687-94.
Jalil ND, Pattou FN, Combemale F, et al. Effectiveness and limits of preoperative imaging studies for the localisation of pheochromocytomas and paragangliomas: a review of 282 cases. French Association ofSurgery (AFC), and The French Association of Endocrine Surgeons (AFCE). Eur J Surg 1998;164:23-8.
Peplinski GR, Norton JA. The predictive value of diagnostic tests for pheochromocytoma. Surgery 1994;116:1101-9.
Maurea S, Cuocolo A, Reynolds JC, Neumann RD, Salvatore M. Diagnostic imaging in patients with paragangliomas. Computed tomography, magnetic resonance and MIBG scintigraphy comparison. Q J Nucl Med 1996;40:365-71.
Hanson MW, Feldman JM, Beam CA, Leight GS, Coleman RE. Iodine 131-labeled metaiodobenzylguanidine scintigraphy and biochemical analyses in suspected pheochromocytoma. Arch Intern Med 1991;151:1397-402. 98..
Berglund AS, Hulthen UL, Manhem P. Thorsson 0, Wollmer P, Tornquist C. Metaiodobenzylguanidine (MIBG) scintigraphy and computed tomography (CT) in clinical practice. Primary and secondary evaluation for localization of phaeochromocytomas. J Intern Med 2001;249:247-51..
Hoegerle S, Nitzsche E, Altehoefer C, et al. Pheochromocytomas: detection with 18F DOPA whole body PET–initial results. Radiology 2002;222:507–512.
Fujita A, Hyodoh H, Kawamura Y, Kanegae K, Furuse M, Kanazawa K. Use of fusion images of 1-131 meraiodobenzylguanidine, SPECT, and magnetic resonance studies to identify a malignant pheochromocytoma. Clin Nucl Med 2000;25:440-2.
Loh KC, Fitzgerald PA, Matthay KK, Yeo PP, Price DC. The treatment of malignant pheochromocytoma with iodine-131 metaiodobenzylguanidine (131I-MIBG): a comprehensive review of 116 reported patients. J Endocrinol Invest 1997;20:648-58.
Berglund AS, Hulthén UL, Manhem P, Thorsson O, Wollmer P, Törnquist C. Metaiodobenzylguanidine (MIBG) scintigraphy and computed tomography (CT) in clinical practice. Primary and secondary evaluation for localization of phaeochromocytomas. J Intern Med 2001;249:247–251.
Lumachi F, Tregnaghi A, Zucchetta P, et al. Sensitivity and positive predictive value of CT, MRI and 123I-MIBG scintigraphy in localizing pheochromocytomas: a prospective study. Nucl Med Commun 2006;27:583–587.
Sabria M, Cuevas J, Tallada N, et al. Pheochromocytoma and sudden death. Med Clin (Barc) 1979;73:371-3.
Cohen CD, Dent DM. Phaeochromocytoma and acute cardiovascular death (with special reference to myocardial infarction). Postgrad Med J 1984;60:111-5.
Sutton MG, Sheps SG, Lie JT. Prevalence of clinically unsuspected pheochromocytoma. Review of a 50-year autopsy series. Mayo Clin Proc 1981;56:354-60.
Platts JK, Drew PJ, Harvey JN. Death from phaeochromocytoma: lessons from a post-mortem survey. J R Coll Physicians Lond 1995;29:299-306.
Rabii R, Salomon L, Saint F, et al. Treatment of pheochromocytomas with rerroperitoneallaparoscopy. Prog Urol 2001;11:16-20.
Mobius E, Nies C, Rothmund M. Surgical treatment of pheochromocytomas: laparoscopic or conventional? Surg Endosc 1999;13:35-9.
Sprung J, O’Hara JF Jr, Gill IS, Abdelmalak B, Sarnaik A, Bravo EL. Anesthetic aspects of laparoscopic and open adrenalectomy for pheochromocytoma. Urology 2000;55:339-43.
Nicholson JP Jr, Vaughn ED Jr, Pickering TG, et al. Pheochromocytoma and prazosin. Ann Intern Med 1983;99:477-9.
Chojnowski K, Felrynowski T, Wocial B, Chodakowska J, Filipecki S, Januszewicz W. Prazosin in the preoperative management of patients with phaeochromocytoma. Pol Tyg Lek 1989;44:280-4.
Cubeddu LX, Zarate NA, Rosales CB, Zschaeck DW. Prazosin and propranolol in preoperative management of pheochromocytoma. Clin Pharmacal Ther 1982;32:156-60.
Miura Y, Yoshinaga K. Doxazosin: a newly developed, selective alpha 1 -inhibitor in the management of patients with pheochromocytoma. Am Heart J 1988;116:1785-9.
Weingarten TN, Cata JP, O’Hara JF, et al. Comparison of two preoperative medical management strategies for laparoscopic re- section of pheochromocytoma. Urology 2010;76:508.e6 – e11.
Ross EJ, Prichard BN, Kaufman L, Robertson AI, Harries BJ. Pre- operative and operative management of patients with phaeochromocytoma. Br Med J 1967;1:191–198.
Perry LB, Gould AB Jr. The anesthetic management of pheochromocytoma effect of preoperative adrenergic blocking drugs. Anesth Analg 1972;51:36 – 40.
Young WF Jr. Pheochromocytoma: 1926 –1993. Trends Endocrinol Metab 1993;4:122–127.
Malchoff CD, MacGillivray D, Shichman S. Pheochromocytoma treatment. In: Mansoor GA, ed. Secondary Hypertension. Totowa, NJ: Humana Press; 2004:235–249.
Pacak K. Preoperative management of the pheochromocytoma patient. J Clin Endocrinol Metab 2007;92:4069–4079.
Kinney MA, Narr BJ, Warner MA. Perioperative management of pheochromocytoma. J Cardiothorac Vasc Anesth 2002;16:359–369.
Steinsapir J, Carr AA, Prisant LM, Bransome ED Jr. Metyrosine and pheochromocytoma. Arch Intern Med 1997;157:901-6.
Perry RR, Keiser HR, Norton JA, et al. Surgical management of pheochromocytoma with the use of metytosine. Ann Surg 1990;212:621-8.
Sand J, Salmi J, Saaristo J, Auvinen 0. Preoperative treatment and survival of patients with pheochromocytomas. Ann Chir Gynaecol 1997;86: 230-2.
Agarwal G, Sadacharan D, Aggarwal V, et al. Surgical management of organ-contained unilateral pheochromocytoma: comparative outcomes of laparoscopic and conventional open surgical procedures in a large single-institution series. Langenbecks Arch Surg 2012;397:1109–1116.
Pinaud M, Desjars P, Tasseau F, Cozian A. Preoperative acute volume loading in patients with pheochromocytoma. Crit Care Med 1985;13:460-3.
Bergman SM, Sears HF, Javadpour N, Keiser HR. Postoperative management of patients with pheochromocytoma. J Urol 1978;120:109-12.
Freier DT, Thompson NW. Pheochromocytoma and pregnancy: the epitome of high risk. Surgery 1993;114:1148-52.
Averbuch SD, Steakley CS, Young RC, et al. Malignant pheochromocytoma: effective treatment with a combination of cyclophosphamide, vincristine, and dacarbazine. Ann Intern Med 1988;109:267-73.
Keiser HR, Goldstein DS, Wade JL, Douglas FL, Averbuch SD. Treatment of malignant pheochromocytoma with combination chemotherapy. Hypertension 1985;7:118-24. | 2019-04-20T00:37:06Z | https://guidelines.hypertension.ca/diagnosis-assessment/endocrine-hypertension/ |
None of us were born knowing how to control big emotions and our children will take a while to learn. This is okay – time is something they have plenty of. In the meantime, the job for us as the adults in their lives who care about them, is to nurture their ability to manage their emotional responses in healthy, adaptive ways.
Of course, it would be a lovely thing if the small humans in our lives were born knowing how to stay calm, or with the capacity to respond to disappointments with the adorability of a sleepy kitten, but that’s just not how it was meant to be. Young children don’t have the words to describe what they want, or to explain how they feel. The sheer frustration of this can make them vulnerable to being barreled by the big feelings that can overwhelm any of us from time to time.
Self-regulation is being able to manage feelings so they don’t intrude heavily on relationships or day-to-day life. This might involve being able to resist ‘losing it’ in upsetting or frustrating situations, or being able to calm down when big feelings start to take over.
Self-regulation is NOT about ‘not feeling’. Locking feelings away can cause as much trouble as any outburst. There is nothing wrong with having big feelings. All feelings are valid and it’s okay for kids to feel whatever they feel. What’s important is how those feelings are managed. The key is to nurture children towards being able to acknowledge and express what they’re feeling, without causing breakage to themselves, their friendships or other people.
When children are able to regulate their emotional responses, they become less vulnerable to the ongoing impact of stress. They are also more likely to have the emotional resources to maintain healthy friendships, and the capacity to focus and learn. Research has found that the ability to self-regulate is a strong predictor of academic success.
Every outburst is an opportunity to steer them in a different direction and to strengthen the skills they need to name and manage their emotions in a way that works for them, without the seismic fallout that can happen when kids are unable to regulate their emotions.
High emotion and tantrums are NOT a sign of bad parenting or bad kids. They are never that. Taking tantrums or wild behaviour personally can make it more difficult to use them as an opportunity to nurture valuable skills in your child. It can be easy to feel judged when our kiddos choose the top of the escalator on a busy Saturday morning to throw themselves on the ground because you peeled their banana all the way to the bottom and nothing – nothing – can ever be the same again, but you are raising humans, and it’s hard and it’s important and the path is a crooked one with plenty of uphills, downhills, and hairpin curves. Some people will never understand. Let that be their problem, not yours.
My child does body throw-downs like they invented the move. When is the lack of self-regulation a problem?
All kids are different, and they will develop according to their own schedules. As anyone who has small humans in their lives will know, there are some things they just won’t be hurried on – breakfast when you’re in a hurry, stories at bedtime, and of course, the potentially life-altering decision of what to have on their toast. And self-regulation – they won’t be hurried on that either. All good things take time, and when you’re trying to master an art, patience is required from your entire support crew.
By school age, most kids tend to have the foundations for self-regulation. This doesn’t mean they’ll get it right all the time – they won’t. What it means is that by about age five, most kids tend to be fairly able to regulate their emotions most of the time. By this age, they can generally wait a short while for something they want, take turns, focus on what’s being said to them, and they are less likely to bring out their wild side when things don’t go their way.
Not all kids will grow out of difficult emotional behaviour by school. Sometimes, difficulties with self-regulation are just a matter of emotional immaturity. Sometimes, it can be a sign that there might be an underlying issue. Some of the common ones are ADHD (difficulty focusing and frustration with not being able to complete certain tasks can lead to high emotion), anxiety (tantrums or aggressive behaviour can be driven by anxiety – it’s the fight part of the fight or flight response), or learning difficulties (again, driven by frustration).
Of course, just because your child might be struggling with self-regulation, that doesn’t necessarily mean there is an underlying issue. It’s just something to keep in mind if there is a constant struggle with self-regulation that doesn’t seem to show much improvement by school age. Remember though, all children will develop at a different pace, and all will struggle with self-regulation until they strengthen the skills. Regardless of age or stage of development though, opportunities to strengthen the capacity for self-regulation is something that all children and teens will benefit hugely from.
Gradually. And with plenty of support from a very dedicated and wonderful crew – modeling, coaching, and responding in a way that makes it safe for kids to explore and experiment with their own responses.
The part of the brain that is heavily involved in regulating big emotions and considering consequences – the pre-frontal cortex – won’t be fully developed until sometime in the early 20s. Until then, the brain is wide open and hungry for experiences that will strengthen it in a way that will support them as healthy, strong adults.
We can see signs of emotional regulation in babies, such as when the soothe themselves by sucking their thumb. By about age two, most toddlers are able to wait a little while for something they want, or listen when they are being spoken to. As children grow and experiment more with self-regulation, they will be more able to widen the gap between a feeling and response.
My teen is moody and explosive. What’s going on?
By adolescence, you might notice that your teens are having more difficulty than ever with self-regulation. This is a very normal part of adolescence. During adolescence, the teen brain is powered up with about a billion new neurons. This is to give them the brain power they need for the developmental mountain climbing they’ll do during adolescence – new skills, new experiences, new relationships, new milestones. With so many new brain cells looking to strengthen and connect, things can get a bit hectic up there, which can drive behaviour that is far from adorable. They probably wish it could be different too. Remind yourself that they are being driven by a brain under construction and gently hold the boundaries. (And I know this isn’t always easy!) And then write this on your mirror where you’ll see it every day or whenever you retreat to the bathroom for a deep breath or a chardonnay: ‘It’s a stage. It will end.’ Like all stages, when they have done the important developmental work they need to do, they’ll come back stronger, wiser, more wonderful and more capable than before. For more information on teenage flare-ups and how to deal with them, see here.
What can I do to help my child learn how to self-regulate?
Explain where their big emotions come from.
‘Feelings are important and it’s always okay for them to be there, but when feelings get too big, they can make the thinking, calming part of your brain take a little break until the big feelings are gone. That’s not good for anyone. This is when you can end up making silly decisions or doing things that land you in trouble. Your brain is strong, healthy and magnificent, but it’s important to learn how to be the boss of it, even when you have big feelings. To do this, you need to strengthen the thinking part of your brain at the front of your head. It does a fabulous job when it’s on, but we need to make it stronger so it stays in charge even when the big feelings come. This will take a little practice but for sure you can do it. You’re pretty amazing like that.
So how can you be the boss of your brain when big feelings take over? One of the most powerful ways is to breathe strong, deep breaths. Remember how big feelings can get a little bossy and tell the thinking, calming part of the brain that it’s not needed? Well thankfully, strong deep breathing relaxes your brain enough, so the thinking part can do the magical things it does – calm down your big feelings and help you to make sensible decisions. There’s a teeny problem though – it’s too hard to do new things when you’re really upset, so the way around this is to practice when you’re calm. The more you practice strong deep breathing when you’re calm, the easier it will be to do when you’re feeling upset. And the more you remember to do it when you’re upset, the stronger your brain will be.
Pretend that you have your hands wrapped around a mug of hot cocoa. Breathe in through your nose for three seconds, as though you’re smelling the deeeelicious chocolatey smell. Then breathing out through your mouth for three seconds, as though you are blowing it cool. Keep doing this four or five times, until you start to feel yourself relax.
Using your finger, imagine that you are writing the figure ‘8’. You can do it anywhere you like – on your arm, your leg, your tummy, a soft toy gorilla – anywhere. As you draw the top of the 8, breathe in for three. When you get to the middle, hold for one. Then, as you trace the bottom part, breathe out for three. Let it be a really smooth, relaxing movement, and repeat it a few times. Ahhhh … bliss.
And now to strengthen their brain … Mindfulness.
The research on benefits of mindfulness could fill a small city. Mindfulness works by changing the structure and the function of the brain. First, it strengthens the part of the brain that drives high emotion, so that reacts less automatically or impulsively. Second, it strengthens the pre-frontal cortex – the thinking part of the brain that is able to weigh in and calm big emotions and consider consequences. Finally, it strengthens the connections between the two, meaning that in times of high emotion, the pre-frontal cortex will be quicker and more able to work with the emotion centres of the brain to find calm.
It’s critical not to expect more of children than they are capable of, given their stage of development. Young children just don’t have the capacity to be calm and reasonable all the time. Punishing them for a lack of self-regulation is like punishing them for not being able to fly. It won’t help anything and will run the risk that shame will get in the way of them feeling safe enough to explore a different way to respond. Ideally, it’s best for them to learn the best way to respond by figuring out for themselves the best way to be. Doing something because they know it’s the right thing to do, will be a more enduring and more powerful response than anything that is driven by a fear of the consequences.
But don’t let them outsource the job.
It can be so tempting to smooth the rough edges for them when they have an outburst, but this won’t be doing them any favours. In fact, it will rob them of the opportunity to learn a valuable skill – how to manage their emotions themselves. When we move in too quickly to soothe it or ‘fix it’, we’re not giving them the space and opportunity they need to learn how to self-soothe. This doesn’t mean we leave them to it. What it means is not rushing in too quickly or working too hard to calm them when they get upset and behave poorly.
Let them ‘borrow’ your prefrontal cortex.
When things get wild, try to dampen things down with some pre-frontal cortex sensibility and calm. (The pre-frontal cortex is the calming, thinking part of the brain.) For young children, the pre-frontal part of the brain is still developing, which is one of the reasons it can be sent so easily offline when they are in high emotion. What you can do, is loan them yours. The way to do this is to stay calm, be a strong, supportive presence, and wait for them to catch up. Continue to have boundaries, but before you talk about a better way to do things, lead them gently out of the chaos and into a space that’s calm and settle.
There’s so much for our kiddos to learn, and they will all have their strengths and the things they need a little more coaching on. If your little person needs a hand learning how to regulate their emotions, think of this as just another skill that needs nurturing, rather than ‘bad behaviour’. Shifting the focus from ‘a bad behaviour that needs changing’ to ‘a skill that needs strengthening’ is more empowering for you and your child. It takes the shame away and makes it easier for your child to hear the important learnings you need them to know. It will set the scene for you to work on this more as a ‘team’ and less ‘you vs them’.
Provide a ‘scaffold’ between the behaviour that is and the behaviour you want.
The idea of a scaffold is to provide a bridge between what they know and are capable of, and the skills they need to learn. Give your child just enough to move them forward. Let’s say there is a clashing of minds between your child and a friend over – who’s going to be the policeman and who is going to be the baddie. Your child is getting upset because he has to be the baddie ALL THE TIME because the other child, ‘steals the police costume ALL THE TIME because she thinks she is the boss of the police costume, and I never get to be the police so I always have to be the baddie and that’s not fair because she thinks that the police are allowed to use the yellow cup but the yellow cup is MINE!’ Sounds reasonable.
In this situation, scaffolding might involve coaching the children on the words to use, as opposed to resolving the situation for them. This might not always go in a smooth steady line, but when you’re four and there’s a police costume on the line, it’s not just about who gets to wear the good gear, it’s about power, voice, feeling heard, fairness and feeling validated. If coaching on the conversation doesn’t lead to an outcome that both people are okay with, scaffolding might involve making suggestions, such as taking turns, or playing something else. The idea is that next time a conflict arises, the child can be encouraged to remember the things they tried last time. ‘Do you remember when you had the argument about the policeman’s costume? What were some of the things you did to work through that?’.
Expose them gently to manageable amounts of stress.
Gently expose them to situations that call on their need for self-regulation. The brain builds by experience, and the more experiences they have, the stronger they will be.
Teach them to ‘step back’.
This is a valuable skill for all kids and teens. Stepping back puts distance between them and their behaviour, enough to let the see the bigger picture, or parts of the picture that might be out of their close-up view. When there has been an incident of high emotion, and they are on their way to finding calm, ask them to imagine stepping back and watching what happened as though it was a movie. ‘If someone was doing what you were doing, what would you think of them.’ ‘What do you think they are feeling/thinking/needing?’ ‘What would you want to say to them?’This is a great skill that will build empathy and strengthen that part of the brain that can look logically and rationally at a situation. Don’t worry if they don’t get it straight away, or if they need a little coaching. The more opportunities they have to ‘switch it on’, the more likely it is that they will be able to do this themselves eventually.
Provide the opportunity and support for self-reflection.
Self-reflection is a skill that many adults haven’t yet mastered, but it’s such an important one. When children can explore their behaviour and their feelings in a safe, non-judgemental environment, they are going to find their own answers and wisdom. There are no lessons or learnings that are more meaningful than the ones we find ourselves. To nurture their capacity for self-reflection, calmly and gently, in a non-judgemental, non-critical way, help them to explore their experience. Encourage them to get a sense of what happened when things got out of control. At what point did things start feeling bad? What happened? What happened in their body? How can next time be different?
Accept where they are, but that’s not the ending.
This involves two things that seem to be opposed – acceptance on the one hand, and pushing for change on the other. When they are used together, they can be more powerful than each on its own. To do this, acknowledge that your child is doing his or her their best, ‘I know that you’re doing the best you can right now, and I also know that you can do better.’ The acceptance that comes with this provides a safe, non-judgemental space to experiment with a new way to be. The idea is to teach them the skills they need, while at the same time holding them strong with a gentle, loving acceptance and a belief in what they are capable of. This focuses on the strengths and the opportunity, not the deficiency.
Although some kids naturally have a more even temper, all kids will need a hand to build strong self-regulation skills. Nobody was born with these already established, and all kids will take time to build them up. Remember though, all kids are different. What they lack on one front, they’ll make up for in another. Being able to regulate their feelings and behaviour, self-soothe, and stop very valid feelings spinning out of control are big jobs for all kids, but important ones for them to learn.
You mentioned out-of-control worry. What guidance can you offer for a 6-year-old who feels life-numbing anticipatory anxiety? She fears thunderstorms, imaginary creatures under her bed, etc.
Annelle here is an article with some strategies to try. The fears your daughter has are quite appropriate for her age, but it sounds as though the degree of anxiety she has in relation to them are really intruding on her day to day life. Take your time over the article and try the strategies. Here is another one that can help her to understand what happen’s in her body when she feels anxious and why anxious thoughts can be so convincing https://www.heysigmund.com/anxiety-in-kids/. Hopefully this will help to bring your daughter some much needed comfort.
These articles are very helpful and well written, as well as backed up by research. I have raised 6 children, have 16 grandchildren and a great grandchild. I have worked in the field of early care and education for over 30 years and still do ECE professional development as a consultant. I pass these articles along to families and teachers and use them in my work. Thank you for your free newsletter.
You’re very welcome Carol. You have a world of experience on this. It means a lot to know that the articles are helpful. Thank you for passing them along.
I love your articles. I am a family outreach counsellor and use your articles direct with families as they are written in such a “down to earth” non jargonistic manner.
Thanks Helen. It’s important work you’re doing. I’m pleased the articles are helpful for you and the families you work with.
I really liked the way you described what happens when people aren’t regulated and how to explain it. Nicely done.
Wow! Why is life so challengingly easy?
This article is so thorough and spot on. These are great reminders, even for parents who know all of this stuff on an intellectual level but can forget on an emotional level when things get tough.
This is a great article and I will probably reread it a few times. I have an emotionally explosive 6 yo and have worked really hard with her, but I feel like I just can’t get past a certain point with her. I got a CBT workbook and went through it with her and her older sister, and we did see a reduction in her violence toward her sister and other kids (ie-she doesn’t bite people hardly ever anymore, and she was able to get through her birthday party without hurting any of her guests, which is a win). However, she still hurts her sister more than she should (whenever her sister disagrees with her and I am not in the room, basically), and when she is upset, I try to validate her feelings, ask her to blow on the hot cocoa, ask her to try going to a sit spot and take a few minutes to herself, etc, but she is usually so riled up that all she does is shriek at me, telling me to leave her alone, stop talking, etc, etc. We have a lot going on this year–we are homeschooling (she is in 1st grade), I am pregnant, and Daddy is deployed to Afghanistan. I understand this is tough, it is tough for all of us. I literally feel like if I am not with her at every moment of the day, I can count on her having some kind of altercation with her siblings (especially her older sister) and hurting them. This usually happens if I am upstairs putting the toddler down for his nap, and then I have to spend a half hour getting everyone to calm and understand what they could have done differently, etc. They are capable of having fun together, but they need constant supervision to prevent fights. I am exhausted. She has already sent her sister to urgent care twice since my husband left, with injuries. (Luckily, nothing too severe, but still, wraps and braces were required) This is just going to be a tough year. I am due at the end of January, my husband may or may not be able to be here, and within 3 weeks of his return in June, we have to hand over the keys to our landlord and move cross country. Any ideas to help me when she is in complete breakdown mode and can’t hear anything I’m saying? Thanks in advance!
It sounds like your daughter is going through a difficult time at the moment. When she is in complete breakdown mode, she won’t be able to hear anything you’re saying and will possibly get more frustrated if you try to reason with her. The part of her brain that can hear logical, rational information is ‘offline’ when big emotions take over. That doesn’t mean you don’t draw boundaries about angry, hurtful behaviour, but in the thick of that high emotion just isn’t the time to do it. When she is feeling big feelings, that’s the time to validate her, ‘I can see how angry/annoyed/frustrated are because your sister wanted to play with your toy.’ When you can name what they are feeling, it starts to calm the nervous system. If you can, take her away from the situation and stay with her until she calms down. In that moment, you don’t have to fix anything and you don’t have to change anything. When she is calm, that’s when you can put in place strategies like stepping back, or asking her what she thinks she might need to do to put things right, or talk to her about different ways she could handle things. Also let her give you her version of what happened when she is calm. Even if it is very one-sided, let her know that you hear her – her take on things is important too, even if it is missing some important pieces of information. This will open the way for her to hear you on the things she needs to know. Here is an article about anger and teaching kids how to be the boss of their brain that might be useful https://www.heysigmund.com/raising-kids-emotionally-intelligent-kids-teens-anger-how-to-be-the-boss-of-your-brain/.
Something else to keep in mind is that anger always has another emotion driving it. The common ones are fear, jealousy, anxiety etc. So, if your daughter gets angry at her sister because her sister takes her toy, it may be that she’s scared her sister will break the toy, never give it back etc. That doesn’t mean it’s okay to feel angry, but if you can get to the emotion that’s driving the anger and speak to that, it can be really powerful. For your daughter, there may be all sorts of different emotions driving her anger at different times. If her dad is away, she may be feeling anxious, sad, confused, scared – it’s difficult to know. Her biggest priority is feeling safe, and feeling as though her world is predictable and that the people she loves are okay. I understand the reality is that her world might be a little unpredictable, but whatever you can do to speak to those needs will help. ‘We’re okay. Daddy’s safe and happy and he misses us but he’ll be home soon.’ For kids, time can be difficult to understand. Six months doesn’t mean much, for example. It might help you have a calendar so she can see exactly when he is coming home, and can count down the days, if you think that might help. Here is an article that can help with when aggression is driven by anxiety https://www.heysigmund.com/anxiety-or-aggression-children/.
The most important thing is that you don’t take this personally. As a parent, I know that that feels impossible sometimes, but know that you are doing a great job. You are involved, open and so loving. At six, she is still learning how to deal with her big feelings. It takes time, and that’s okay. She sounds as though she has a very strong and wonderful spirit. You don’t want to shut that down, it’s just a matter of channelling it in the right direction.
Karen, I really appreciate your article. I teach sixth grade, a year when many children experience the challenges discussed here. Where I work now struggles between meting out various “behavioural” consequences for these difficulties and using something like the approach you have articulated so well above. My experience of trying to get from the one to the other is like someone blindfolded in a maze alone. I thank goodness that I keep trying, and I keep trying. Reading your article helps to sustain me and calm down once again. I am grateful for that.
I am missing one idea. A key understanding for me is that children first learn to sooth themselves as an infant and a toddler from the ways that adults sooth them through their daily experiences. I work with a population whose parents and grandparents went through experiences in their childhoods where they could not receive that very comfort and soothing they needed daily to deal with the all to normal ups and downs of their lives then. Some parents held onto these skills for soothing the young. Others are taking steps to relearn them. However, the loss of these experiences at such a young age is clear to me in the behaviour of some of my students. Blame is a useless avoidance. Compassion helps me to stay with a fellow human and not desert them in their moment of human need. It is a tall order and I am not that good at it. As I wrote above, I’m the blind man, alone in maze, trying to find my way out, step by step.
My effort is to find a way to support students who show these (I’ll learned to call them) “developmental delays.” Yet my experience tells me that the challenge of just establishing a rapport with a student, in order to begin this process, is challenge. Not impossible, however it demands patience. I must use the very self soothing that the student needs to learn, to move us along successfully. In that way, I model the very skills that I am encouraging the student to practice. I also try to partner with parents in this approach. Again, it takes patience and may or may not work out, however if it is successful, it makes the task much more successful.
Thanks again for your article Karen. Like I said, I am encouraged and heartened by it.
Michael this is such important work you’re doing. You are right about the importance of early experiences, but a loving, caring adult has enormous potential to make a difference later. The window to learn appropriate behaviours and ways to respond doesn’t close – it gets smaller, but it doesn’t close. When children are young they develop attachment styles. These are related to their feelings of safety in the world and they are established by learning that the adults in their lives will be responsive to their needs and will be there to support them when they start to explore the world outside of themselves, or when they feel big feelings – upset, scared, angry, uncertain.
The problem is that for these kids, there is likely to be some ‘unlearning’ that needs to happen first. Even if their parents love them deeply and are deeply committed to doing what is best, the children may have learned as little people that when they are frightened, uncertain, angry, sad, confused, that the level of support they need to feel safe and secure just isn’t there. As you’re seeing, this can make it difficult to learn the appropriate ways to respond and deal with big feelings later on. The good news is that this can be relearned. It takes time, because there is unlearning and new learning that needs to happen, but don’t underestimate the capacity of a loving, supportive adult to make a massive difference. Keep doing what you’re doing. As you said, sometimes you will see this working and sometimes you won’t. You can see the way that the experiences of one generation will play through in the next and you can never know how many lives you will be changing when you make a difference to one.
I grew up in a family that suppressed negative emotions. For example, I might have said to my mother ‘I feel sad or scared’ and she would encourage me to be happy and think of nice things – we never talked about being sad or scared and I learned not to express it. I’m sure she thought she was doing good but I feel as though as an adult I have difficulty not only expressing but also experiencing strong emotions – good or bad. Lots of emotions are towering and seem to engulf me – they can be difficult to handle and cause me anxiety – even lovely ones that I want more of like the love I feel for my spouse. Any insight on this and how I could tackle it, it does interfere with my life and relationships.
The techniques in this article would also work for you. Try getting into a regular mindfulness practice. Try for at least 10 minutes a day and if you can do two 10 minute sessions, that would really help to strengthen you. Try the Smiling Mind app, or here is an article about the most basic way to practice mindfulness https://www.heysigmund.com/mindfulness-what-how-why/. This will help you to start to recognise what you are feeling or thinking in a way that feels safe for you. In relation to expressing your emotions, try for baby steps – a little at a time. If you want to express love, start slowly, with with people you trust. To start to experience positive feelings more, here is an article that will help with that https://www.heysigmund.com/hardwiring-for-happiness-how-we-can-change-our-brain-mind-personality/. As with anything, learning how to safely express and feel big feelings takes time. Be patient and be gentle with yourself and start trying a couple of these strategies regularly. It is never too late to learn how to do the things that are good for us.
I will work on it gently. Thank you Karen, this is important work you are doing.
Thanks Franciska! Yes it can be a delicate line, but the main thing to remember is that when they are emotional, they’re just not able to take in the information they need for growth and learning. The best time to move in with explanations or teaching is when they are calm and when they feel reconnected to you. Rather than redirecting thoughts when you get a sense they are emotional, try hearing their thoughts so they can feel heard and validated. This will help to calm them and take away their need to defend their position, which can sometimes make them even more emotional. We can all be a bit like that. Once they are calm, that is the time to redirect. This can take time – if they feel strongly about something, they won’t necessarily change their mind by speaking it. When we validate their thoughts (I understand why you feel like that/ I can see how upset/angry/sad you are), it starts to open the way for them to feel safe enough to explore those thoughts and the consequences of what they do with them. It’s always okay for thoughts and feelings to be there – it’s what we do with them that matters. It’s time and patience, and feeling okay when things don’t quite go to plan. It’s all part of the adventure!
Hello. Thank you for the very informative article. I will definitely put it to use. I have an 8 year old son who witnessed the accidental death of his Father (his hero) at the age of 5yr 10mnths he was in Grade R at the time and living with his Father. He was forced to go through big changes in a short time as he had to come back to live with me his Mom, change schools and also deal with the memorial, the funeral and going for counseling. He received counseling for 6 months after which they told me he was healed. He was behind in Grade R n refused to work many days n broke down a lot yet they told me he was ready for Grade 1. Grade 1 did not go well at all n his teacher as well as the principal of the school were not understanding at all n in the end made matters much worse. In the end I took matters into my own hands n took him to an educational psychologist who found that he had shut off totally around his Father’s death n wasn’t keeping any information in. He couldn’t even remember what happened the day before. I then put him in a remedial school where he receives therapy once a week. He repeated Grade 1 this year and although we had many break down and total melt downs he is through to Grade 2. The problem is still his attitude towards work and also his motivation, I think the first year of Grade 1 in the first school did more damage than we all realized. He is such a bright happy boy most of the time and I really need help to help him. Can you please help?
Bronwyn your little man has been through so much, and it will take time for him to make sense of what has happened in a way that can feel okay for him. Does he talk very much about his father or any memories he has? Does he want to talk about it? Or has it been shut off? Don’t push him to speak if he doesn’t want to, but try to give him space to talk about it so he feels it’s okay to talk about his dad or the things they did together. (Maybe a photo of his dad if he’s open to this and if there isn’t one already so that he can feel that you’re okay with him talking about it?) If painful thoughts or memories come to him when he opens his mind a little, it makes sense that he would shut off all information. It sounds like it would be really important for him to speak to a counsellor who specialises with children and grief. A counsellor will help him to process the memories he has in a way that feels safe for him, so he doesn’t have to shut everything down. It’s important that this is done with someone experienced, as you don’t want to retraumatise him by having him talk about things before he is ready. Those early years are so important at school, but with the right support he can certainly catch up. To find the right support, there should be a professional body of psychologists or counsellors in your country. Speak to them, and they should be able to guide you to someone in your area. I hope this helps. Your son has been through a traumatic experience, but with time and support, he’ll get there.
I’m so pleased I found your article. Thank you so much.
I grew up in an emotionally abusive home, not that I knew this at the time, I was constantly gaslighted and used and it’s left me a bag of nerves, became agoraphobic at 21 (now 40) thankfully got into therapy at about 30 which changed my life, managed to do no contact with the parents through that, met a wonderful man and dispite my biggest fear of passing on all my fears to a child, had a gorgeous baby boy who is now 5 and we are expecting a little girl in May. My little boy is having some issues. I can’t tell if it’s my standard overthinking or wherther I should be as frightened as I feel for the signs of anxiety that he is showing.
He is bright, happy, thriving, outgoing, cheeky and super caring. He is literally over the moon that he has a little sister coming- we have had 5 miscarriages since he was born and although he didn’t know when we were going through them, he now knows that they happened.
He seems to have picked up my ways of being a worrier..has a big sense of right and wrong and can often sound like a little health and safety officer! The bit that’s got my fear rolling again is that he’s experiencing what I can’t decide whether to name panic attacks (the dreaded words that stole so much of my life and although I have more or less beaten them I still practice some avoidance.. planes, lifts… big crowds) or separation anxiety.
He adores staying at his nannys but, and he’s very good at explaining, out of the blue one day he got ‘that horrible feeling’ his heart pounds, while he was there and had to come home.. that happened the next two times too.. so he said he didn’t want to go back and only felt better when he got home. He got it when he thought he lost me in a shop for a second too.. and when I was a couple of minutes late collecting him from swimming.
He’s happy at school and loves other parents picking him up for play dates etc.
I told him, I know that feeling and it’s horrid isn’t it! But it is only a feeling and feelings can’t hurt us! Why you feel that Boom Boom! Of your heart .. that is your mummy saying I love you love you love you!! This made his smile. I promised him if he gets that feeling he can call me and I’ll come and get him. Anyway he has stayed all night and had a ball and I’m going to collect him in a minute.. and I’m so proud of him faving his fear like that I could burst!
Do you think I’m doing things right? Is there anything else I can do?
My worst fear is that he would be like me and live in fear.
Pru you are doing everything right! What a beautiful way to explain his racing heartbeat. It is the physical feelings that come with anxiety or panic that can feel so scary – for kids and adults. It’s great that he is able to tell you what he is feeling. Here is an article that might help. It explains where anxiety comes from and helps to normalise it for them. It can be really empowering for kids to understand this, because it stops it feeling so scary. Here is the link https://www.heysigmund.com/anxiety-in-kids/. Here is another article about what to do when he is feeling anxious, and to help your own feelings of anxiety or worry from getting in the way https://www.heysigmund.com/building-emotional-intelligence-what-to-say-to-children-with-anxiety/. And finally, some things he needs to know to realise the many wonderful strengths that are in him https://www.heysigmund.com/kids-with-anxiety-need-to-know/. I hope these help. Keep doing what you’re doing though – you sound as though you’re doing a wonderful job.
What about a 5 year old child who is quite sensitive, but *hates* feeling out of control, and redirects any feeling like fear, anxiety, or sadness into anger? He would rather be angry than cry. For instance, when he watches a new movie or reads a new book, and the main character (who isn’t a strong hero kind of character, maybe just a regular kid or a small animal) gets into a scary or sad situation, he will leap off the couch and yell at me that the book needs to stop, the movie needs to be turned off; that he hates it and hates me for reading it to him.
He attacks me with his fists and his words when he is emotionally upset. No matter how I try to reassure him that it all turns out all right in the end and I will hug him through it.
Or if he is upset about a real life situation (like having to go home from a friend’s house, or being scared of a new environment) and I ask him to use his words to talk it out, he would rather lash out in anger and bury the sad or anxious feeling instead of feeling it. We have him go to his room and practice taking deep breaths until he is calm (he decides when he is OK to come out again). Because if we stay with him and try to help him through his big emotions, it escalates into a tantrum.
We tell him it is OK to be angry, or sad, or upset, but it isn’t OK to hurt other people with his body or his words.
I am just worried about him burying his emotions like that. I want him to know it is OK to cry and be sad, and that I won’t judge him for it. But he would rather redirect it into anger.
Here is an article that might help https://www.heysigmund.com/anxiety-or-aggression-children/.
I am a mother to a 5 year old. I struggle with serious and persistent mental illness myself and emotion regulation is a serious battle for me often. I have heard him say things like “why cant I act like that if you do” etc. It is difficult to explain. But I am trying my best to model appropriate actions to big emotions. I often used to find myself pushing through my emotional pain to keep him entertained. Even though I was suffering I kept playing with him or doing whatever needed to be done. Now I am learning that it is OK for me to say “Mommy needs a break so I can feel ok” so that I can sit in silence to breath or do some sensory deprivation which can be helpful to me. Im trying to allow him time to use imaginary play while I decompress while also letting him see that it is ok to take some time for yourself. We also listen to the Bedtime FM “Peace Out” Childrens guided meditations podcast nearly every day. It is my favorite guided meditation ever, even as an adult, because my inner child is a very real part of me and this podcast is so helpful for me as well. We are learning and growing together and I am so blessed with my boys presence.
Thank you for sharing this information. I often wonder how my life could have been different had I learned effective coping mechanisms as a child.
Great article, Karen. There’s so much to like about it. I particularly focused on the 2 breathing techniques regarding hot chocolate and the figure 8.
I will be sharing this fine article on my social media sites.
Thanks so much for this valuable article. I’d like to share it on email with my cohort, how can I do that?
Thanks Mary. If you copy the link and paste it into your email, it will direct your cohort to the page.
Thank you for this article! I have a 6 year old who is very affectionate, compassionate and smart. He started the first grade last September and started having angry tantrums at school. He has always been very jealous of his younger brother, and we have sort of worked towards the conclusion that he is really unhappy not being the center of attention.
Since the early months of school we have been able to get him to have these tantrums less frequently, but they still occur. He seems to have an anger scale of 0 or 10 with nothing in between.
Often if kids at recess aren’t playing the way he wants to, like they don’t let him control the game, or he doesn’t like the rules they are using, he will walk off and play alone. This seems like self regulation but I worry that he is isolating himself and not learning compromise and middle ground.
Could you please reference some further reading that you think might help me better understand how to help him navigate these emotions, and where they might be coming from?
How would you recommend assisting a 9 year old boy whom I believe is prepubescent cope with his feelings of not being good enough. His negativity is so strong right now. He believes nothing is good enough, people are picking on him (parents, siblings, peers), etc. | 2019-04-26T14:39:14Z | https://www.heysigmund.com/how-to-self-regulate/ |
Apicomplexan parasites employ a unique form of movement, termed gliding motility, in order to invade the host cell. This movement depends on the parasite’s actomyosin system, which is thought to generate the force during gliding. However, recent evidence questions the exact molecular role of this system, since mutants for core components of the gliding machinery, such as parasite actin or subunits of the MyoA-motor complex (the glideosome), remain motile and invasive, albeit at significantly reduced efficiencies. While compensatory mechanisms and unusual polymerisation kinetics of parasite actin have been evoked to explain these findings, the actomyosin system could also play a role distinct from force production during parasite movement.
In this study, we compared the phenotypes of different mutants for core components of the actomyosin system in Toxoplasma gondii to decipher their exact role during gliding motility and invasion. We found that, while some phenotypes (apicoplast segregation, host cell egress, dense granule motility) appeared early after induction of the act1 knockout and went to completion, a small percentage of the parasites remained capable of motility and invasion well past the point at which actin levels were undetectable. Those act1 conditional knockout (cKO) and mlc1 cKO that continue to move in 3D do so at speeds similar to wildtype parasites. However, these mutants are virtually unable to attach to a collagen-coated substrate under flow conditions, indicating an important role for the actomyosin system of T. gondii in the formation of attachment sites.
We demonstrate that parasite actin is essential during the lytic cycle and cannot be compensated by other molecules. Our data suggest a conventional polymerisation mechanism in vivo that depends on a critical concentration of G-actin. Importantly, we demonstrate that the actomyosin system of the parasite functions in attachment to the surface substrate, and not necessarily as force generator.
Apicomplexan parasites employ a unique form of movement, termed gliding motility, to disseminate and invade host cells. The current model for gliding motility is centred on the actomyosin system of the parasite in force generation during this process. According to the ‘linear motor’ model, micronemal transmembrane proteins, such as MIC2, are secreted at the apical pole of the parasite and act as force transmitters by interacting with the substrate surface and the actomyosin system, similar to the role of integrins in other motility systems . Accordingly, this model predicts a smooth actomyosin dependent rearwards translocation of the microneme-substrate complex, which results in forward gliding on the substrate or into the host cell . However, recent reverse genetic approaches demonstrated that parasites remain motile in the absence of what were thought to be key components of the motility machinery, including parasite actin [3–6]. In an attempt to reconcile these data, we proposed a novel, hypothetical model based on gelation/solation , where actin/myosin is required for force transmission rather than force production . This model predicts the generation of an osmotic gradient that results in membrane tension and retrograde membrane flow. In order to regulate membrane balance, the parasite then either sheds membrane at the posterior end, as previously observed , and/or recycles the membrane via endocytosis, as suggested for other systems [8, 9].
Many other eukaryotic cells move by crawling, a process powered by the controlled assembly and disassembly of the actin cytoskeleton in proximity to the plasma membrane [10, 11]. While it was previously assumed that the majority of the force for the retraction of the cell rear is powered by myosins, several alternative mechanisms can operate within the cell that also power motility [10, 11]. For example, the motility of Caenorhabditis elegans sperm occurs in the absence of any actin and therefore myosin activity ; instead, force is generated by controlled polymerisation of the major sperm protein. Furthermore, when tumour cells are confined within a microenvironment, motility depends on an osmotic engine and can be independent of actomyosin activity . Finally, migrating cells can employ various migration modes in response to their microenvironment , which allows them to move even in the absence of adhesive coupling . For example, crawling cells, such as Dictyostelium and human leukocytes, can swim efficiently when suspended in a viscous medium [16, 17], demonstrating that adhesion to a solid substrate is not always necessary for movement . It is thus possible that motility can be driven purely by surface membrane flow, which itself results from a secretory-endocytic cycle acting as a fluid drive from the anterior to the posterior end of the cell . In support of membrane flow, many motile cells show a distinct capping activity of surface ligands . Furthermore, surface capping depends on vesicular transport, and both on actin and microtubule function . In good agreement with these observations, numerous modulators of endocytic and secretory trafficking have been demonstrated to be key regulators of cell motility , leading to the hypothesis that membrane transport and retrograde flow during motility are rate-limiting for cell forward translocation .
In the case of apicomplexan parasites, a recent study demonstrated that retrograde membrane flow of malaria sporozoites occurs even at relatively high concentrations of the actin-disrupting drug Cytochalasin D (CD) . Furthermore, biophysical studies on malaria sporozoites have demonstrated the discrete, localised turnover of attachment sites that are not evenly translocated along the surface of the parasite . This involves the formation/disengagement of adhesion sites at the front and rear ends of the zoite, while the sporozoite undergoes a stretching phase. Interestingly, actin is important for the definition and release of the attachment sites , raising the possibility that apicomplexan motility may be similar to amoeboid-like crawling.
In T. gondii, an alternative explanation for the observed phenotypes for mutants of the actomyosin system is the possibility of functional redundancy of actomyosin components . While redundancies cannot be ruled out, in particular for myosins and micronemal proteins [3, 4], even the removal of ostensibly critical structural proteins does not completely block gliding motility or host cell invasion. For example, removal of the gliding-associated protein GAP45 results in the relocation of the remaining MyoA-complex components to the cytosol and severe disruption of the inner membrane complex (IMC), within which the motor complex is normally anchored [3, 25]. While these gap45 conditional knockout (cKO) parasites are completely blocked in host cell egress, they remain motile and can invade host cells . These surprising findings have led to a reassessment of the mechanisms underlying parasite motility and host-cell invasion, as recently reviewed . In fact, not only do the roles of the individual components need to be reanalysed, but also their orientation and organisation within the parasite .
Here, we show that, during motility, the actomyosin system of the parasite functions in attachment to the surface substrate, and may, therefore, act as force transmitter rather than a force generator. We provide evidence that retrograde membrane flow, which may play a role in force generation and motility, does not depend on an intact actomyosin system.
We previously reported that ACT1 is undetectable in act1 cKO parasites 72 h after rapamycin-induced removal of act1 . A subsequent study suggested that residual actin may, in fact, be present in some of these parasites as long as 5 days after rapamycin treatment . This led us to re-address the question of residual actin levels in the act1 cKO parasites, using additional antibodies and additional controls.
We began by comparing the specificity of different antibodies, from various labs, raised against apicomplexan actin (Additional file 1: Figure S1). While immunoblot analysis suggested that all antibodies are highly specific for T. gondii actin without recognising host cell actin (Additional file 1: Figure S1A), some of the tested antibodies demonstrated significant cross-reactivity within the parasites when used for immunofluorescence analysis, as previously reported . We performed IFAs at 4 days (96 h) and 8 days (192 h) after rapamycin induction (Fig. 1b, c and ). Notably, we found that the polyclonal antibodies employed previously to quantify actin levels in the act1 cKO parasites showed a strong and persistent signal in proximity to the IMC of the parasite. This signal remained unchanged between 4 and 8 days after rapamycin treatment, even though the parasites are no longer expressing levels of actin above background within 4 days of induction (see below). Since this apparent cross-reactivity would interfere with accurate quantification of actin levels, we focused on two other antibodies that were highly specific and showed no cross-reactivity (Additional file 1: Figure S1).
Consistent with other studies, we found that actin levels in wildtype (wt) parasites were somewhat variable (Fig. 1a, b). Similar results were obtained with other housekeeping genes such as myosin light chain 1 (MLC1, Fig. 5a) and aldolase (not shown). Importantly, no overlap of actin levels could be observed between controls and act1 cKO parasites as early as 48 h after rapamycin-induced excision of act1 (Fig. 1a, b). At earlier time points (24–36 h) post induction, significant amounts of ACT1 were still detectable and protein levels were highly variable between vacuoles (Fig. 1a, b). Nevertheless, ACT1 levels were significantly reduced in comparison to control vacuoles. Importantly, 96 h after rapamycin induction, no ACT1 was detectable in YFP+ parasites. Lack of ACT1 detection by IFA correlates well with a recent study suggesting that no F-actin can be formed approximately 48 h after the removal of act1 , the inference being that G-actin levels fall below the critical concentration required for polymerisation.
In good agreement with this result, quantitative immunoblotting of act1 cKO parasites at different time points post-induction demonstrated the loss of all or nearly all of the ACT1 as early as 72 h post induction (Fig. 1c, d), confirming previous results .
In summary, our quantification demonstrates that actin is depleted in the act1 cKO parasites between 72 and 96 h post induction. Based on these observations, assays were performed in a time course up to 96 h after addition of rapamycin to adequately readdress the effects of ACT1 loss.
We previously demonstrated that parasite actin is required for apicoplast maintenance and host cell egress . These phenotypes were followed over time after act1 excision to estimate the time when G-actin levels are below the critical concentration in order to form F-actin. Significant numbers of act1 cKO parasites started to lose their apicoplasts as early as 24 h post-induction, indicating that once G-actin levels drop below a critical concentration, the apicoplast cannot be maintained during parasite replication (Fig. 2a, b). By 96 h after rapamycin induction of act1, we were unable to see any parasitophorous vacuoles that had a normal number of apicoplasts (Fig. 3b). Similar to apicoplast maintenance, host cell egress is significantly decreased as soon as 36 h post induction and was completely blocked 96 h post induction (Fig. 2c, d).
Next, we analysed the capability of act1 cKO parasites to move by gliding motility and to invade the host cell at different time points after rapamycin induction (Fig. 2e, f). In good agreement with previous results , overall motility and host cell invasion were significantly reduced in the act1 cKO parasites, with less than approximately 25% being motile and capable of invading host cells compared to control parasites (Fig. 2e, f). This phenotype was observed as early as 48 h after rapamycin induction, at a time point when significant amounts of actin were still detectable (Fig. 1). Interestingly, and in striking contrast to the results with apicoplast inheritance and egress, gliding and invasion rates remained constant at 48–96 h post induction, suggesting that once actin levels fall below a critical concentration, these phenotypes are not further affected. The simplest explanation for this result is that apicoplast maintenance and egress are completely dependent on actin, whereas gliding and invasion can occur independent of actin, albeit at significantly reduced efficiencies.
A recent study demonstrated the essential role of actin and the unconventional myosin F (MyoF) in directed dense granule transport . To assess if potential, residual F-actin in act1 cKO parasites is capable of serving as a track for MyoF-dependent dense granule transport, dense granule motions were tracked at various times after actin excision. In good agreement with the results obtained for apicoplast replication, parasite egress, parasite gliding and invasion, we observed an approximately 50% reduction in the percentage of granules moving in a directed manner from 37% in control to 14% as early as 18 h post excision (Fig. 3a, b). At 36 and 72 h post excision, directed granule motion was completely ablated (Fig. 3b, c) given that the percentage of trajectories in each population was indistinguishable from simulated pure 2D diffusion analysed using the changepoint algorithm (See Methods for details) (Fig. 3b; hashed bars).
The observation of diminished granule movement soon after induction provides further evidence that apicomplexan actin in vivo requires a critical monomer concentration (G-actin) in order to form sufficient F-actin to serve as a substrate for myosin motors such as MyoF. We therefore conclude that act1 cKO parasites are a powerful tool to analyse actin-independent motility and invasion processes.
Intriguingly, the phenotypes described above differ significantly from the effects caused by incubating parasites in the presence of drugs used to modulate F-actin turnover, such as CD or Latrunculins. For example, treatment of intracellular parasites with CD results in the formation of huge residual bodies, where organelles such as the apicoplast or secretory organelles accumulate [30, 31], which is not observed in the case of the act1 cKO parasites .
Our finding that parasites remain motile in the absence of ACT1 further suggests that CD might act on an unknown target, a hypothesis supported by an earlier study in which CD resistant parasites were isolated that do not have any mutations in TgAct1 . To test this hypothesis, we generated a parasite line where endogenous actin has been replaced with a LoxP-flanked copy of act1 containing a mutation (Ala136Gly) that confers CD resistance and can be excised in a DiCre-dependent manner (Fig. 4a). Consequently, these parasites only express CD resistant actin before removal of act1 CDr . We compared the CD sensitivity of this new parasite line, called act1 CDr cKO, to that of control (RH) parasites, CytDr parasites and the act1 cKO parasites. Interestingly, the gliding rates of all parasite lines, including CytDr parasites, were significantly reduced at higher concentrations of CD (1–4 μM) and it appeared the ACT1-specific effect was limited to ≤ 0.5 μM CD (Fig. 4b). The observed reduction in motility of CytDr parasites is consistent with a previous study, demonstrating loss of motility in the presence of 1 μM CD . Importantly, in the absence of ACT1 or ACT1CDr, parasites remained sensitive to CD (Fig. 4b); in both cases, the gliding rate was reduced from approximately 20% in untreated parasites to 1% in the presence of high CD concentrations, indicating that CD was acting on (a) yet unidentified target(s) in a non-ACT1 specific manner in T. gondii. Conclusions drawn from experiments using high concentrations of CD should, therefore, be interpreted with caution. Next, we tested the parasites’ ability to glide in the presence of the F-actin polymerisation drug Jasplakinolide (Jas). Jas was previously found to block attachment and motility of P. berghei sporozoites . At lower concentrations, T. gondii tachyzoites are inhibited in both circular and helical gliding but exhibit a counter-clockwise twirling motion . In agreement with previous findings, we found that forcing polymerisation blocks motility in wt parasites, whereas no significant reduction is observed for the act1 cKO (Fig. 4c). We also tested latrunculins A and B, independent F-actin disrupting drugs that have been previously described to act on apicomplexan actin . Surprisingly, even at 1 μM, we were unable to observe any significant effect on gliding rates (Fig. 4d), demonstrating that latrunculins are not acting on Toxoplasma tachyzoite actin. This conclusion supports previous observations for Plasmodium berghei gliding motility . In addition, the PfACT1 crystal structure suggests that latrunculins should not effectively bind apicomplexan ACT1 .
In summary, the experiments presented above demonstrate that, in the absence of actin, less than 25% of parasites remain capable of gliding motility and host cell invasion and establish act1 cKO parasites as a valuable tool for understanding the role of actin in the invasion and gliding mechanisms of T. gondii. The observed phenotype for the act1 cKO parasites is very similar to the phenotype observed for a clonal knockout for myoA . We therefore re-addressed the role of myosins during gliding motility.
It was previously suggested that MyoC can compensate for MyoA motor function in myoA KO parasites [3, 39]. In addition, it has been shown that MyoA and MyoC can interact with the same light chain, MLC1, and expression of MyoC from a heterologous promoter demonstrated a certain degree of MyoC association with the parasite pellicle in the absence of MyoA .
In order to address if the localisation of MyoC at the IMC in the myoA KO parasites depends on the level of MyoC expression, we expressed a second copy of TyMyoC under the control of either a strong promoter, p5RT70 , or its own promoter, pMyoC, and compared its localisation with that of an endogenously tagged version (Fig. 5a).
While strong expression of MyoC results in efficient relocalisation from the parasite basal end to the periphery of the myoA KO parasites (Fig. 5a, b), as previously reported , expression of MyoC under its own promoter or endogenously-tagged MyoC showed only slight relocalisation, with the majority of the protein being correctly localised to the basal ring of the parasites. This demonstrates that the localisation of MyoC to the IMC is critically dependent on strong expression levels of the protein, which are not reached with native MyoC expression levels in the myoA KO parasite (Fig. 5b). We next analysed propagation of these parasite strains using plaque assays and found that the relative plaque size is larger in myoA KO parasites strongly overexpressing MyoC compared to parasites expressing MyoC under the control of pMyoC (Fig. 5c). This demonstrates that overexpression of MyoC can partially complement the phenotype of the myoA KO parasites (Fig. 5c). Since the localisation of MyoC to the IMC is apparently critical for complementation of the myoA KO parasites, we decided to analyse mlc1 cKO in more detail, given that MLC1 is thought to be required to anchor both MyoA and MyoC to the pellicle [3, 39].
We previously analysed the mlc1 cKO 96 h after rapamycin induction; based on qualitative immunofluorescence analysis, no MLC1 was detectable at this time point . To verify that MLC1 is depleted at 96 h, we quantified MLC1 protein levels by IFA, analogous to ACT1 quantification described above (Fig. 6a). We confirmed that, as early as 48 h after induction, no MLC1 can be detected in the cKO parasites; this was also confirmed using immunoblot analysis (Fig. 6a, b). We succeeded in keeping mlc1 cKO parasites in cell culture for several weeks by mechanically releasing parasites and enriching the culture using FACS, demonstrating that MLC1 is essential for egress but dispensable for the following rounds of invasion and replication (Fig. 6c).
Next, we were interested in the localisation of MyoA and MyoC in mlc1 cKO parasites. To determine this, we generated two independent lines for colocalization studies, one expressing Ty-tagged MyoA under the control of its endogenous promoter (pMyoA) and another with endogenously Ty-tagged MyoC (Fig. 6d–f). MyoA is completely undetectable at the parasite’s pellicle 72 h after rapamycin-induced excision of mlc1 (Fig. 6d, e), demonstrating that MLC1 is crucial for the localization and stability of MyoA. In contrast, MyoC remains present and shows a normal localization at the basal end of the parasite in the absence of MLC1 (Fig. 6f).
In summary, we have generated and validated important parasite strains that can be used to analyse the role of the actomyosin system during gliding motility and host cell invasion and to investigate alternative mechanisms for these essential processes.
We previously demonstrated that conditional mutants for act1, mlc1 and myoA invade the host cell via the tight junction, demonstrating that these parasites still use an active invasion mechanism and are not passively taken up by the host cell via phagocytosis . However, kinetic analysis of myoA KO parasites demonstrated that both gliding speed and penetration times are significantly reduced, validating a direct function of MyoA during these processes. We were interested how act1 cKO, mlc1 cKO and myoA KO would compare during gliding motility and invasion.
To date, characterisation of gliding motility mainly depends on trail deposition assays, which allow a good estimate of overall motility rates. However, motility rates can be reduced by several factors, such as reduced or increased parasite attachment to the surface, and does not allow a firm conclusion regarding the function of a protein during this process. We speculated that parasites depleted in crucial parts of the actomyosin system should move significantly differently in terms of gliding speed and/or average distance travelled.
Therefore, we performed time-lapse analysis of gliding parasites (Additional files 2–7: Movies S1–S6; Fig. 7a–c) to assess the ability of parasites to generate the necessary force for motility in the presence and absence of the actomyosin system of the parasite. We confirm that myoA KO parasites show significantly lower trajectory length (~7 μm, corresponding roughly to one parasite length) and an average speed of approximately 0.3 μm/sec, as reported previously . Intriguingly, in the case of act1 cKO and mlc1 cKO parasites both average trajectory length and speed are increased compared to myoA KO parasites (Fig. 7a, b). While helical motility was significantly affected, with shorter average trajectories and reduced speed, circular gliding motility appeared relatively normal for mlc1 cKO and act1 cKO parasites (Fig. 7a–c). In good agreement with the gliding data, we found that host cell invasion can occur rapidly in act1 cKO and mlc1 cKO parasites, though several slow invasion events can be observed (Additional files 8–11: Movies S7–10; Fig. 7d, e). As is the case for gliding motility, the invasion of myoA KO parasites appears to be more strongly affected, with slower invasion events compared to act1 cKO and mlc1 cKO. This demonstrates that the parasite is capable of producing the force for motility and invasion in the absence of the actomyosin motor and suggests that actomyosin may instead be required to coordinate the force, most likely by regulating attachment sites, as observed in Plasmodium sporozoites [22, 34] and other diverse motility systems .
Next, we employed a Matrigel-based 3D motility assay to characterise the motility phenotypes of the mutants generated under more physiological conditions. In good agreement with the time-lapse analysis of parasites gliding in 2D , a significantly decreased proportion of the myoA KO parasites was able to move in Matrigel compared to the parental line (39.5 ± 2.5% for LoxPMyoA parental, n = 2795 trajectories analysed vs. 5.1 ± 0.9% for myoA KO parasites, n = 3825 trajectories analysed) (Fig. 8a, b). Of the myoA KO parasites that were classified as motile, there was also a significant reduction in mean trajectory displacement and mean instantaneous speed compared to the parental line. Overexpression of Ty-tagged MyoC driven by the p5RT70 promoter in the myoA KO parasites was able to restore the percentage of moving parasites to wt levels and produce a modest increase in the mean trajectory displacement but not instantaneous speed (Fig. 8a, b; see also Additional file 12: Figure S2 for a comparison of the trajectory displacement distributions for the three lines). When we extended the analysis to examine mlc1 cKO and act1 cKO parasites, the results likewise closely mirrored those of the 2D assay (Fig. 7) – excision of mlc1 or act1 significantly reduced the percentage of moving parasites and mean trajectory displacement, but did not affect the mean instantaneous speed compared to their respective parental lines (Fig. 8c–f). Of note, it appears that mean trajectory displacement is more impacted in a 3D environment than in 2D, with few mutant parasites showing a displacement of more than one parasite length (Additional file 12: Figure S2), perhaps because they have to overcome more resistance in order to move in the Matrigel.
To test the role of actin and the glideosome in attachment to surfaces, we employed flow chambers coated with collagen (Fig. 9). To this end, we tested the ability of the myoA KO, mlc1 cKO and act1 cKO parasites to withstand shear flow stress. While surface attachment of myoA KO parasites was similar to wt controls, both the mlc1 cKO and act1 cKO parasites were unable to promote efficient attachment to the surface and were removed even at very low shear flow rates (Fig. 9a–d). Only RH and the myoA KO can withstand shear forces up to 15 dyn/cm2, which is within the range of arterial shear stress . These results suggest that the reason many act1 cKO and mlc1 cKO parasites cannot initiate gliding (Fig. 7c–f) is that they cannot attach sufficiently to the surface. These data suggest that the actomyosin system is required to coordinate the formation and release of attachment sites observed in a variety of other motility systems , including Plasmodium sporozoites [22, 34].
Apicomplexan parasites are known to translocate beads from the apical to the basal end and such ‘capping activity’ has been directly implicated in the motility of many cell types, including Plasmodium sporozoites . Interestingly, treatment of sporozoites with CD had no significant effect on the speed of retrograde flow, while the force generated at the attached bead was reduced . This could also be explained by the reduced formation of attachment sites, meaning a failure in force transmission rather than production. We therefore wished to analyse if retrograde membrane flow can occur in absence of the actomyosin system.
We modified a bead translocation assay first developed by King et al. over 30 years ago . Incubation of parasites with latex nano-beads leads to efficient binding of beads along the surface of the parasites and, within 10 min, 51% of parasites translocated beads to the parasite’s basal end (Fig. 10a). We next tested the role of the actomyosin system in the process of bead translocation, using either pharmacological perturbation or parasite mutants. In these experiments, we classified parasites as either ‘unbound’, ‘bound-uncapped’ or ‘capped’ (Fig. 10a). When parasites were kept in Endo buffer, which is known to diminish microneme secretion and motility , we found that a significant number of parasites were incapable of binding and translocating beads (Fig. 10c). When we tested the role of the actomyosin system in bead translocation (Fig. 10b, c), no abrogation of bead translocation was observed, suggesting the presence of retrograde flow in absence of the actomyosin system. Interestingly, in the mlc1 cKO, myoA KO or parasites treated with CD, fewer beads appeared to bind to the parasite surface (Fig. 10c), confirming a role of the actomyosin system in attachment. Nevertheless, capping in the act1 cKO occurred normally compared to RH when we assume that capped beads must have firstly bound. Similarly, the addition of CD had only minor effects on capping in the wt parasites. Overall, this demonstrates that bead translocation, and therefore the establishment of retrograde membrane flow, can occur independently of the actomyosin system of the parasite.
In this study, we set out to reconcile currently conflicting interpretations regarding the role of the apicomplexan actomyosin system during gliding motility and host cell invasion . While there is no doubt about a critical role of the actomyosin system during motility and invasion, alternative models and mechanisms regarding the exact function of this system have been put forward based on biophysical, reverse genetic and inhibitor studies [3, 21, 22, 26, 38]. Indeed, several observations cannot be easily reconciled with the canonical linear motor model: (1) Biophysical studies on malaria sporozoites demonstrate the discrete, localised turnover of attachment sites that are not evenly translocated along the surface of the parasite . Adhesion sites are formed/disengaged at the front and rear ends of the zoite, while the sporozoite undergoes a stretching phase. Interestingly, actin is important for the definition and release of the attachment sites , raising the possibility that apicomplexan motility is similar to amoeboid-like crawling. (2) Eimeria sporozoites show different types of motility (bending and pivoting). While pivoting appeared substrate- and actin-dependent, bending showed resistance to the actin-disrupting drug Cytochalasin B . (3) A recent study demonstrates that retrograde membrane flow of malaria sporozoites occurs even at relatively high concentrations of the actin-disrupting drug CD . (4) Reverse genetic approaches demonstrated that parasites remain motile in the absence of molecules thought to be key components of the motor machinery, including parasite actin [3–6].
In the case of reverse genetic studies, other groups have suggested that the observed phenotypes are due either to the presence of redundancies within the repertoire of genes involved in motility and invasion or to an unusually stable actin (encoded by a single copy gene ), which persists many days and parasite generations after gene excision and can polymerize via an unusual isodesmic process that does not require a critical monomer (G-actin) concentration [27, 48]. While isodesmic polymerisation has been demonstrated in vitro, its in vivo relevance is unclear . Previous polymerisation studies used G-actin produced in heterologous protein expression systems. However, a recent study demonstrated that apicomplexan actin is not properly folded when heterologously expressed due to differences in the chaperonin T-complex . Furthermore, a recent study suggests that Toxoplasma actin is capable of forming F-actin structures in vivo that depend on a critical monomer concentration and demonstrates that F-actin is involved in multiple essential processes during intracellular parasite growth such as daughter cell assembly, vacuole organisation and parasite egress . Using a conditional knockout for act1 it was demonstrated that no ACT1 filament formation can occur as early as 48 h after removal of act1 . Finally, although apicomplexans possess actin-like proteins, it is unlikely that they can compensate for ACT1 and form filaments [27, 51]. Here, we performed a careful quantification of actin levels at different time points in the act1 conditional knockout and find that actin is still detectable at 48 h, but fully depleted by 96 h after induction with rapamycin.
In good agreement with previous studies [3, 29], we observed essential roles of actin in apicoplast segregation, host cell egress and dense granule motility upon deletion of act1, while parasite motility and host cell invasion still occur, albeit at significantly reduced levels. Since these findings were in direct conflict with a number of studies that use actin-modulating drugs to probe for actin function, we also performed an analysis of the effects of the actin-disrupting drugs CD, LatA, and LatB, and the actin-stabilising drug Jas on wt and act1 cKO parasites. While the effect of Jas appears to be specific for actin, since treatment of act1 cKO parasites showed no effect of this drug, we find that CD is not uniquely specific for actin, since similar effects on parasite motility can be observed irrespective if wt, act1 cKO or parasites expressing ACT1CDr were analysed. While CD is certainly acting on parasite actin, as indicated by the significant differences between wt and CytDr parasites, we find that concentrations above 0.5 μM CD lead to significant, non-actin-dependent effects on parasite motility, confirming previous studies . In contrast, latA and latB, previously used to analyse the role of apicomplexan actin , appear to have no effect on tachyzoite actin, as noted previously. Together, these data indicate great care should be taken in choosing the correct concentration for actin-modulating drugs, especially when using CD, where an independent, unknown target(s) appears to be present in T. gondii .
Though all myosins are thought to depend on F-actin to function as a motor and, therefore, the act1 cKO likely reflects the cumulative phenotype of all myosins, we were interested in the extent of redundancy between MyoA and MyoC, since previous studies indicated that MyoC can complement a MyoA deficiency [3, 39]. While we confirm that MyoC can partially complement for MyoA function, this complementation appears to depend on overexpression and consequent localisation of MyoC at the IMC. Indeed, our localisation analysis of MyoC in wt and myoA KO parasites demonstrates that, under physiological conditions, no significant relocation of MyoC to the IMC can be detected. In contrast, strong overexpression leads to redistribution of MyoC to the IMC, as described previously . This redistribution appears to be also critical for functional complementation, leading to a higher ratio of motile parasites and host cell invasion. However, MyoC cannot compensate for MyoA function completely, since the parasites overexpressing MyoC remain as slow as uncomplemented myoA KO parasites. These results are also in good agreement with a recent study demonstrating that MyoA is the central myosin involved in host cell invasion and that, in the absence of MyoA, host cell membrane dynamics play an important role in invasion . Importantly, deletion of mlc1 results in a complete loss of the motor complex at the IMC, therefore representing a functional double KO for MyoA and MLC1. This mutant can be kept in cell culture indefinitely when the strong egress phenotype is bypassed by artificially releasing the parasites, followed by enrichment of the population using FACS, demonstrating that MLC1 is not essential for motility and host cell invasion per se. Indeed, mlc1 cKO parasites behave similarly to act1 cKO regarding motility and attachment to the surface.
Together, this analysis suggests a role for the actomyosin system during parasite motility that is distinct from the canonical linear motor model. We hypothesise that, rather than being the force generator during motility, the actomyosin system is instead involved in the regulation of attachment sites that are required to transmit the motility force to the substrate. To address this hypothesis, we used the above mutants to analyse different parameters that are likely crucial for efficient parasite motility such as attachment strength and retrograde membrane flow. We found that most act1 cKO and mlc1 cKO parasites remain immobile. However, those that move do so at speeds similar to wt parasites, albeit with shorter trajectories, suggesting that the actomyosin system is required to initiate and maintain motility. In a 3D environment the motility defects are stronger than in a 2D environment, with most parasites showing a displacement of less than one parasite length (7 μm). In contrast, these mutants are virtually unable to attach, as measured under flow conditions, indicating an important role in the formation of attachment sites, as previously suggested . Unlike the mlc1 cKO and act1 cKO, myoA KO parasites show strong attachment to the surface, but significantly reduced speeds that cannot be compensated by overexpressing MyoC. We interpret these data to indicate that actin is required to form attachment sites, whereas MyoA might be required for the regulated release of these sites, leading to efficient force transmission during motility. A role for myosins in regulating adhesion and thereby traction force has recently been demonstrated . Here, the balance between myosin contraction and adhesion strength determines the frequency of motility initiation . A similar regulation of myosin contraction might occur in the case of apicomplexans in order to initiate motility and failure to do so could result in reduced motility rates. In this scenario, how is the motility and invasive force produced by the parasite? Previous studies implicated the generation of a retrograde membrane flow in parasite motility . Interestingly, the flow itself is relatively resistant to actin-modulating drugs. Here, we modified a bead translocation assay as an indicator of retrograde membrane flow to analyse the role of ACT1, MLC1 and MyoA in establishing membrane flow. Surprisingly, while fewer beads bind to the surface of the parasite in the absence of these proteins, bead translocation itself appears to be not significantly affected, again indicating a role of the actomyosin system in the formation of attachment sites (in this case for latex beads), but not in bead translocation. Future experiments and tools will be required to carefully address the role of retrograde membrane flow in force production and its exact role, if any, during motility and invasion.
In conclusion, our study demonstrates the importance of the actomyosin system during motility and invasion. It is worth noting that, in physiological settings, this system is absolutely essential for parasite viability. In fact, in vivo experiments with myoA KO parasites demonstrate the complete inability of these parasites to establish an infection or to induce an adaptive immune response (our unpublished results). However, it is important to understand the molecular functions of the components of the gliding and invasion machinery in order to obtain a clear picture of how the individual components of this fascinating system work together to allow the parasite to move, invade into and egress from the host cell.
All primers used in this study are listed in Additional file 13: Table S1 and were synthesised from Eurofins (UK).
The act1 ORF containing the mutation C408G at the nucleotide level which confers the amino acid mutation of A136G was synthesised by GenScript (USA). Both the original LoxPAct1 geneswap vector and the synthesised plasmid were digested with XmaI and PacI to replace act1 cDNA.
To generate p5RT70-Ty-MyoC, the myoC ORF was amplified from cDNA using the primers myoC ORF fw/rv. The fragment was cloned via AvrII and PacI into the parental plasmid p5RT70-Ty-KillerRed. To put myoC under its endogenous promotor a 1 kb fragment upstream of the start codon of myoC was amplified from genomic DNA using oligos pmyoC fw/rv and cloned using as template vector p5RT70-Ty-MyoC via KpnI and AvrII.
This vector was generated by cloning two 5’UTR fragments obtained by amplifying genomic DNA and a fragment of myoC gene using pBSSK + pSag1-Ble-Sag1 as a template vector. Fragment 1, pMyoC, was obtained by amplification of a 1 kb fragment upstream of the start codon of myoC, via HpaI-NotI sites using oligos pmyoC 2 fw/rv. Fragment 2, 5’UTR myoC, was obtained by amplifying a region of approximately 1.5 kb located 1 kb upstream of the myoC start codon. Amplification was done using primers 5’UTR myoC fw/rv and cloned via Kpn1-XhoI. Finally, a 2.2 kb fragment of myoC was amplified using primers myoC gene fw/rv with a Ty-tag included in the forward primer. Subsequently, cloning was performed using enzymes SpeI/NotI.
To express myoA under its endogenous promotor a 2 kb fragment upstream of the start codon of myoA was amplified from genomic DNA using oligos 5’UTR myoA fw/rv and cloned using as template vector p5RT70-Ty-MyoA via KpnI and EcoRI.
Human foreskin fibroblasts (HFFs) (SRC-1041, ATCC®) were grown on tissue culture-treated plastics and maintained in Dulbecco’s modified Eagle’s medium (DMEM) supplemented with 10% foetal bovine serum, 2 mM L-glutamine and 25 mg/mL gentamycin. Parasites were cultured on HFFs and maintained at 37 °C and 5% CO2. Cultured cells and parasites were regularly screened against mycoplasma contamination using the LookOut® Mycoplasma detection kit (Sigma) and cured with Mycoplasma Removal Agent (Bio-Rad) if necessary.
To generate stable expressing parasites, 1 × 107 of freshly lysed RH ∆hxgprt or RH-DiCre ∆ku80 parasites were transfected with 20 μg DNA by AMAXA electroporation. Selection was based on mycophenolic acid and xanthine, as described previously , or bleomycin.
The conditional act1 KOCDr strain (RH-DiCre ∆ku80/endogenous act1::loxPact1 CDr loxP, referred to as loxPAct1 CDr ) was generated by replacing the act1 cassette in the LoxPAct1 geneswap vector with a synthesised act1 cassette containing the mutation Ala 136 Gly . Integration after transfection was confirmed by PCR using primer sets (1-1’) for act1 ORF (gDNA vs. cDNA), 5’UTR integration and cre-mediated recombination with primer sets (2-2’) and 3’UTR integration (3-3’).
For stabilisation of p5RT70-Ty-MyoC, pMyoC-Ty-MyoC and pMyoA-Ty-MyoA, RH ∆hxgprt and myoA KO parasites were selected using bleomycin. The vector pBSSK + pSag1-Ble-Sag1 was co-transfected with each respective construct in the proportion (2:1), and selection was carried out as described previously .
act1 cKO and mlc1 cKO were obtained by addition of 50 nM and 100 nM of rapamycin to the parental lines, respectively. Strains were incubated for 4 h at 37 °C and 5% CO2, and cultured as described previously . To increase the population of these lines since they have an egress phenotype, act1 cKO and mlc1 cKO parasite media was swapped for DMEMcomplete supplemented with 2.5% dextran sulphate after 24 h to enrich egress mutants .
Immunofluorescence analysis was carried out as previously described . Briefly, parasites were allowed to invade and replicate in an HFF monolayer grown on glass coverslips. The intracellular parasites were fixed in 4% paraformaldehyde for 20 min at room temperature. Afterwards, coverslips were blocked and permeabilised in 2% BSA and 0.2% Triton X-100 in PBS for 20 min. The staining was performed using the indicated combinations of primary antibodies (Additional file 14: Table S2) for 1 h. Followed by the incubation with secondary AlexaFluor 350, AlexaFluor 488, AlexaFluor 594 or AlexaFluor 633 conjugated antibodies (1:3000, Invitrogen – Molecular Probes) for another 45 min, respectively.
Super-resolution SIM was carried out using an ELYRA PS.1 microscope (Zeiss). Images were acquired using a Plan Apochromat 63×, 1.4 NA oil immersion lens, recorded with a CoolSNAP HQ camera (Photometrics), and analysed using ZEN Black software (Zeiss) and ImageJ software.
Extracellular parasites were pelleted and then resuspended in RIPA buffer (50 mM Tris-HCl pH 8; 150 mM NaCl; 1% Triton X-100; 0.5% sodium deoxycholate; 0.1% SDS; 1 mM EDTA), incubation for 5 min on ice was used to lyse the cells. Afterwards, samples were centrifuged for 60 min at 14,000 rpm at 4 °C and laemmli buffer was added to the supernatant. A total of 5 × 106 parasites were loaded onto an SDS acrylamide gel while, for act1 cKO down-regulation, only 1 × 105 parasites were loaded. Western blotting was performed as described previously using IRDye680RD or IRDye800RD (Li-Cor) secondary antibodies.
Proteins were detected using the Li-Cor Odyssey and quantified using infrared detection of the protein of interest on Image Studio 5.0 (Li-Cor).
Wt and parental LoxP strains were used as controls. For knockout lines, parasites were induced with rapamycin as described previously and cultured for 24 h on HFFs prior to fixation. An IFA was conducted using the respective primary antibody; TgACT1 (Soldati, 1:100) or TgMLC1 (Soldati, 1:2000) and AlexaFlour 594 (Molecular Probes, 1:3000) as the secondary antibody. Images were obtained using a DeltaVision® Core microscope equipped with a CoolSNAP HQ2 CCD camera and were saved as single red and green channel files. Freeware CellProfiler 2.1.1 software (www.cellprofiler.org) was used to analyse and quantify fluorescence intensities. Greyscale images were imported to the program for analysis. The pipeline was adjusted to detect objects within the range of 5 to 40 pixels. Objects were identified using a global threshold strategy with a three class-Otsu threshold and weighted variances. Under these parameters, we identified in each image YFP-expressing parasites (generated by the DiCre cassette after correct gene excision) and the red coloured region of interest (corresponding to ACT1 and MLC1, respectively). The red signal was quantified on the basis of the total pixel occupied by the YFP expressing objects. The intensity of the red channel was measured for each object and exported to an Excel spreadsheet. The data obtained was filtered manually using area and integrated intensity parameters to include all parasites in a vacuole and exclude clustered vacuoles or random objects. Intensities from 60 vacuoles per time point were quantified and processed to remove the calculated internal background. The background fluorescence of the host cells was calculated using a YFP+ strain that was allowed to replicate under the same conditions as the tested parasites. However, no antibodies were added to the coverslips and, from this, the auto-fluorescence of the host was calculated and plotted as a horizontal dotted line.
An IFA was performed in myoA KO and RH ΔKu80 lines expressing MyoC under different levels (p5RT70-Ty-MyoC, pMyoc-Ty-MyoC and endogenous tagged MyoC). Primary antibody against Ty-tag was used to localise MyoC and DAPI as a DNA marker. Images were obtained using ELYRA PS.1 microscope (Zeiss). All 3D SIM images were collected at the same exposure and resolution parameters. Images were obtained using Zen Black (Zeiss) and analysed using ImageJ. Vacuoles to be analysed were visually identified and traced using the drawing tool. Measurements obtained were area, integrated density and mean grey value. Background measurements were obtained by selecting a portion of the image with no signal. Data was plotted by using the corrected total cell fluorescence (CTCF) which was calculated using the following formula: [CTFC = Integrated density – (Area of selected cell × Mean fluorescence of background readings)] .
Was conducted as described previously . Briefly, 1 × 103 parasites were inoculated on a confluent layer of HFFs and incubated for 5 days, after which the HFFs were washed once with PBS and fixed with ice cold MeOH for 20 min. HFFs were stained with Giemsa with plaque area measured using Fiji software. Mean values of three independent experiments ± standard deviation were determined.
Gliding assays were performed as described before . Briefly, freshly lysed parasites were allowed to glide on FBS-coated glass slides for 30 min before they were fixed with 4% paraformaldehyde (PFA) and stained with α-SAG1 under non-permeabilising conditions. Mean values of three independent experiments ± standard error of the mean (SEM) were determined. Where actin-modulating drugs were used, parasites were pre-incubated for 10 min in the respective concentration before the start of the assay.
For the assay, 5 × 104 freshly lysed parasites were allowed to invade a confluent layer of HFFs for 1 h. Subsequently, five washing steps were performed for removal of extracellular parasites. Cells were then incubated for a further 24 h before fixation with 4% PFA. Afterwards, parasites were stained with the α-IMC1 antibody . The number of vacuoles in 15 fields of view was counted. Mean values of three independent experiments ± SEM were determined.
Egress assays were performed as described previously . Briefly, 5 × 104 parasites were grown on HFF monolayers for 36 h. Media was exchanged for pre-warmed, serum-free DMEM supplemented with 2 μM A23187 (in DMSO) to artificially induce egress. After 5 min, the cells were fixed with 4% PFA and stained with a-SAG1 antibody; 200 vacuoles were counted for their ability to egress out of the host cells. Mean values of three independent assays ± SEM were determined.
Prior to sorting, mlc1 cKO parasites were scratched, syringed through a 25-G needle and filtered through a 3-μm Millipore filter (Millipore Merck) for purification of the sample. An S3e™ Cell Sorter (Bio-Rad Laboratories, Inc.), equipped with 488, 561 and 640 nm lasers, was used to sort mlc1 cKO/YFP expressing parasites. Parasites were sorted into 5 mL tubes. The temperature for sample loading stage and collection area was set at 37 °C for culturing parasites and at 4 °C for western blot analysis. Before sorting parasites, the equipment was calibrated using ProLine™ universal calibration beads (Bio-Rad Laboratories, Inc.). Gates were adjusted to separate and collect YFP expressing population (mlc1 cKO). For the long-term culturing parasites experiment, sorting was performed in single cell mode in order to obtain the purest population possible. After sorting, parasites were cultured under standard conditions described above. For western blot analysis, sorting was performed in enrichment mode to obtain the highest number of parasites possible.
Time-lapse video microscopy was used to analyse the kinetics over a 2D surface similarly to as previously described . Briefly, Ibidi μ-dish35mm-high were coated in 100% FBS for 2 h at room temperature. Freshly egressed parasites were added to the dish. Time-lapse videos were taken with a 20× objective at one frame per second using a DeltaVision® Core microscope. Analysis was made using ImageJ wrMTrckr tracking plugin. For analysis, 20 parasites were tracked during both helical and circular trails with the corresponding distance travelled, average and maximum speeds determined. Mean values of three independent experiments ± standard deviation were determined.
Parasites contained in heavily infected HFFs were scratched and passed through a 26-G needle three times to release parasites artificially. Parasites were added to HFFs grown in Ibidi m-Dish35mm-high. Invasion events were observed after approximately 5 min when parasites had settled and penetration time was determined. Time-lapse videos were recorded at 40× objective at a rate of one frame per second using DeltaVision® Core microscope. Invasion events and time were manually tracked and calculated.
Tachyzoites were prepared and assayed as previously described . Briefly, the rapamycin-induced populations were harvested by syringe release of infected HFF monolayers using a 27-G needle, filtered through a 3-μm Nuclepore filter, and gently centrifuged at 1000 × g for 4 min. The tachyzoite pellet was washed and resuspended at a final concentration of 1–2 × 108 tachyzoites/mL in 3D Motility Media (1× Minimum Essential Medium lacking sodium bicarbonate, 1% (v/v) FBS, 10 mM HEPES pH 7.0 and 10 mM GlutaMAX L-alanyl-L-glutamine dipeptide) supplemented with 0.3 mg/mL Hoechst 33342. The tachyzoite suspension was then mixed with three volumes of 3D Motility Media and three volumes of Matrigel (BD Biosciences, San Jose, CA), pre-chilled on ice. Motility in Matrigel was imaged, tracked and processed using Imaris × 64 v. 7.6.1 software (Bitplane AG, Zurich, Switzerland), as previously described . Three independent biological replicates, each with three technical replicates, were performed. Parameters calculated from 3D motility assays were analysed using two-way ANOVA with Sidak’s multiple comparisons test and with the Kolmogorov–Smirnov test using GraphPad Prism v. 6.01 (La Jolla, CA). Under our imaging conditions, trajectory displacements less than 2 μm (i.e. slightly less than one-third the body length of a parasite (~7 μm)) cannot be distinguished from Brownian motion as measured empirically with heat-killed parasites , and so a cut-off of 2 μm was applied to exclude stationary parasites. Longer displacements were considered parasite-driven and used for more detailed analysis of motility parameters.
Ibidi live cell dishes (29 mm) were coated with 0.1% poly-L-lysine for 30 min and washed with MilliQ water. Fluorescent latex beads (FluoSpheres®, 0.04 μm, Invitrogen) were diluted with 5 μL in 400 μL Hanks Balanced Salt Solution + HEPES (25 mM) (described hereafter as H-H buffer) and sonicated twice for 2 min. After a short spin (10 s, 6000 × g), the supernatant was recovered and left on ice for 30 min before use. Parasites of interest were harvested (by scratch, syringe and filtration). Parasites were pelleted for 5 min at 3000 × g, washed and resuspended in cold 250 μL H-H buffer to achieve 107 parasites/mL. Parasites were then transferred to poly-L-lysine-coated dishes and left on ice for 20 min; 5 μL of diluted beads were added to 250 μL of H-H buffer and added to the parasites. Immediately, the dish was incubated at 37 °C for 15 min. The experiment was stopped by addition of 2 mL of 4% PFA and incubated at 4 °C for 10 min. The PFA was washed gently and parasite nuclei stained with Hoechst 0.01%. For time course, the parasites were fixed at different time points after the addition of the beads. For the drug and buffer assays, parasites were incubated for 10 min in the buffer of interest before their incubation on the coated dish. Bead dilution and the rest of the experiment were also made using the same buffer (Endo Buffer or H-H buffer + 0.5 μM CD).
For each experiment (n), an average of 1000 parasites were analysed. Total numbers of parasites, number of parasites without beads, with beads bound and with beads capped were quantified (e.g. For RH n1, a total of 1615 parasites were counted, within those, 63 were not interacting with the beads, 1062 had beads around them and 490 had capped beads). For each condition, experiments were performed in three independent experiments n = 3. Mean values of each interaction type for three independent experiments ± SEM were determined and compared to RH.
LoxP strains were induced to generate KOs as previously described in Egarter et al. . Fresh extracellular parasites (4 × 105 in total, consisting of approximately equal numbers of control and KO) were loaded into collagen IV coated fluidic chambers (Ibidi IB-80192) and allowed to attach at 37 °C for 20 min. PBS was pumped through the chamber using an ‘open loop flow’ microfluidic pump (KD Scientific Legato 200 syringe pump) system, similar to that described previously , to control flow rates and generate fluidic shear stress. In our setup, a flow rate of 1 mL/min achieves 3 dyn/cm2 shear stress at the surface of the channel. Flow at 0.1 mL/min (equivalent to 0.3 dyn/cm2) was used to remove all non-attached parasites. At each fluidic shear stress level, control and mutant parasites were counted from five fields of view per experiment. Parasite count after the 0.1 mL/min wash was taken as 100% of attached parasites. Counts at all other rates of flow were normalised to the 100%. Data collected was analysed using Excel to assess the significance of differences between control and mutants using Student t-test and further analysed using GraphPad Prism v. 6.01 software to display data as trends. Parasites in the chamber were monitored via a Zeiss Axio Vert.A1 microscope setup with a 40× objective combined with an AxioCam ICm1 camera and Zen capture software.
We would like to thank members of the Meissner lab for thoughtful discussions. We would also like to thank Prof. David Sibley (Washington Univeristy, St. Louis), Prof. Dominque Soldati-Favre (University of Geneva), Prof. Artur Scherf (Institut Pasteur, Paris), Dr. Jake Baum (Imperial College, London) and Dr. Maryse Lebrun (University of Montpellier) for generously providing antibodies and parasite strains.
This work was supported by an ERC-Starting grant (ERC-2012-StG 309255-EndoTox) and the Wellcome Trust 087582/Z/08/Z Senior Fellowship for MM, and US Public Health Service grant AI054961 for GEW. The Wellcome Trust Centre for Molecular Parasitology is supported by core funding from the Wellcome Trust (085349). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
All data generated or analysed during this study are included in this published article and its supplementary information files, or are available from the authors on reasonable request.
JW and FLB performed experiments analysed results and interpreted data of mutant parasites characterisation; participated in the writing, revision and edition of the manuscript. SG and GSP carried out and analysed retrograde flow and flow chamber experiments respectively. JML set up and analysed 3D motility experiments. AH designed and analysed experiments of dense granules motility. SE and NA generated and analysed the studied mutant lines. GW conceived the 3D motility project, designed the study, analysed results, interpreted data, and drafted and revised the article. SRN and DMW analysed dense granule motility data and revised the article. MM conceived the project, designed the study, analysed results, interpreted data, and wrote the first manuscript. All authors participated in the revision of the manuscripts and approved the final version.
Periz J, Whitelaw J, Harding C, Lemgruber L, Gras S, Reimer M, et al. Toxoplasma gondii establishes an extensive filamentous network consisting of stable F-actin during replication. bioRxiv. 2016. doi:https://doi.org/10.1101/066522.
Coleman BI, Gubbels MJ. A genetic screen to isolate Toxoplasma gondii host-cell egress mutants. J Vis Exp. 2012;60. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3350636/. | 2019-04-21T20:30:50Z | https://bmcbiol.biomedcentral.com/articles/10.1186/s12915-016-0343-5 |
Artificial intelligence has close connections with philosophy because both share several concepts and these include intelligence, action, consciousness, epistemology, and even free will. Furthermore, the technology is concerned with the creation of artificial animals or artificial people (or, at least, artificial creatures) so the discipline is of considerable interest to philosophers. These factors contributed to the emergence of the philosophy of artificial intelligence. Some scholars argue that the AI community's dismissal of philosophy is detrimental.
Can a machine act intelligently? Can it solve any problem that a person would solve by thinking?
Are human intelligence and machine intelligence the same? Is the human brain essentially a computer?
Can a machine have a mind, mental states, and consciousness in the same way that a human being can? Can it feel how things are?
Questions like these reflect the divergent interests of AI researchers, linguists, cognitive scientists and philosophers respectively. The scientific answers to these questions depend on the definition of "intelligence" and "consciousness" and exactly which "machines" are under discussion.
Turing's "polite convention": If a machine behaves as intelligently as a human being, then it is as intelligent as a human being.
The Dartmouth proposal: "Every aspect of learning or any other feature of intelligence can be so precisely described that a machine can be made to simulate it."
Newell and Simon's physical symbol system hypothesis: "A physical symbol system has the necessary and sufficient means of general intelligent action."
Searle's strong AI hypothesis: "The appropriately programmed computer with the right inputs and outputs would thereby have a mind in exactly the same sense human beings have minds."
Hobbes' mechanism: "For 'reason' ... is nothing but 'reckoning,' that is adding and subtracting, of the consequences of general names agreed upon for the 'marking' and 'signifying' of our thoughts..."
1 Can a machine display general intelligence?
2 Can a machine have a mind, consciousness, and mental states?
3 Is thinking a kind of computation?
4.1 Can a machine have emotions?
4.2 Can a machine be self-aware?
4.3 Can a machine be original or creative?
4.4 Can a machine be benevolent or hostile?
4.5 Can a machine have a soul?
Can a machine display general intelligence?
Is it possible to create a machine that can solve all the problems humans solve using their intelligence? This question defines the scope of what machines will be able to do in the future and guides the direction of AI research. It only concerns the behavior of machines and ignores the issues of interest to psychologists, cognitive scientists and philosophers; to answer this question, it does not matter whether a machine is really thinking (as a person thinks) or is just acting like it is thinking.
Every aspect of learning or any other feature of intelligence can be so precisely described that a machine can be made to simulate it.
Arguments against the basic premise must show that building a working AI system is impossible, because there is some practical limit to the abilities of computers or that there is some special quality of the human mind that is necessary for thinking and yet cannot be duplicated by a machine (or by the methods of current AI research). Arguments in favor of the basic premise must show that such a system is possible.
The first step to answering the question is to clearly define "intelligence".
The "standard interpretation" of the Turing test.
If a machine acts as intelligently as human being, then it is as intelligent as a human being.
One criticism of the Turing test is that it is explicitly anthropomorphic. If our ultimate goal is to create machines that are more intelligent than people, why should we insist that our machines must closely resemble people?[This quote needs a citation] Russell and Norvig write that "aeronautical engineering texts do not define the goal of their field as 'making machines that fly so exactly like pigeons that they can fool other pigeons'".
Recent A.I. research defines intelligence in terms of intelligent agents. An "agent" is something which perceives and acts in an environment. A "performance measure" defines what counts as success for the agent.
If an agent acts so as to maximize the expected value of a performance measure based on past experience and knowledge then it is intelligent.
Definitions like this one try to capture the essence of intelligence. They have the advantage that, unlike the Turing test, they do not also test for human traits that we[who?] may not want to consider intelligent, like the ability to be insulted or the temptation to lie[dubious – discuss]. They have the disadvantage that they fail to make the commonsense[when defined as?] differentiation between "things that think" and "things that do not". By this definition, even a thermostat has a rudimentary intelligence.
Hubert Dreyfus describes this argument as claiming that "if the nervous system obeys the laws of physics and chemistry, which we have every reason to suppose it does, then .... we ... ought to be able to reproduce the behavior of the nervous system with some physical device". This argument, first introduced as early as 1943 and vividly described by Hans Moravec in 1988, is now associated with futurist Ray Kurzweil, who estimates that computer power will be sufficient for a complete brain simulation by the year 2029. A non-real-time simulation of a thalamocortical model that has the size of the human brain (1011 neurons) was performed in 2005 and it took 50 days to simulate 1 second of brain dynamics on a cluster of 27 processors.
Few[quantify] disagree that a brain simulation is possible in theory,[according to whom?] even critics of AI such as Hubert Dreyfus and John Searle. However, Searle points out that, in principle, anything can be simulated by a computer; thus, bringing the definition to its breaking point leads to the conclusion that any process at all can technically be considered "computation". "What we wanted to know is what distinguishes the mind from thermostats and livers," he writes. Thus, merely mimicking the functioning of a brain would in itself be an admission of ignorance regarding intelligence and the nature of the mind.
A physical symbol system has the necessary and sufficient means of general intelligent action.
The mind can be viewed as a device operating on bits of information according to formal rules.
A distinction is usually made[by whom?] between the kind of high level symbols that directly correspond with objects in the world, such as <dog> and <tail> and the more complex "symbols" that are present in a machine like a neural network. Early research into AI, called "good old fashioned artificial intelligence" (GOFAI) by John Haugeland, focused on these kind of high level symbols.
These arguments show that human thinking does not consist (solely) of high level symbol manipulation. They do not show that artificial intelligence is impossible, only that more than symbol processing is required.
In 1931, Kurt Gödel proved with an incompleteness theorem that it is always possible to construct a "Gödel statement" that a given consistent formal system of logic (such as a high-level symbol manipulation program) could not prove. Despite being a true statement, the constructed Gödel statement is unprovable in the given system. (The truth of the constructed Gödel statement is contingent on the consistency of the given system; applying the same process to a subtly inconsistent system will appear to succeed, but will actually yield a false "Gödel statement" instead.) More speculatively, Gödel conjectured that the human mind can correctly eventually determine the truth or falsity of any well-grounded mathematical statement (including any possible Gödel statement), and that therefore the human mind's power is not reducible to a mechanism. Philosopher John Lucas (since 1961) and Roger Penrose (since 1989) have championed this philosophical anti-mechanist argument. Gödelian anti-mechanist arguments tend to rely on the innocuous-seeming claim that a system of human mathematicians (or some idealization of human mathematicians) is both consistent (completely free of error) and believes fully in its own consistency (and can make all logical inferences that follow from its own consistency, including belief in its Gödel statement). This is provably impossible for a Turing machine[clarification needed] (and, by an informal extension, any known type of mechanical computer) to do; therefore, the Gödelian concludes that human reasoning is too powerful to be captured in a machine[dubious – discuss].
However, the modern consensus in the scientific and mathematical community is that actual human reasoning is inconsistent; that any consistent "idealized version" H of human reasoning would logically be forced to adopt a healthy but counter-intuitive open-minded skepticism about the consistency of H (otherwise H is provably inconsistent); and that Gödel's theorems do not lead to any valid argument that humans have mathematical reasoning capabilities beyond what a machine could ever duplicate. This consensus that Gödelian anti-mechanist arguments are doomed to failure is laid out strongly in Artificial Intelligence: "any attempt to utilize (Gödel's incompleteness results) to attack the computationalist thesis is bound to be illegitimate, since these results are quite consistent with the computationalist thesis."
More pragmatically, Russell and Norvig note that Gödel's argument only applies to what can theoretically be proved, given an infinite amount of memory and time. In practice, real machines (including humans) have finite resources and will have difficulty proving many theorems. It is not necessary to prove everything in order to be intelligent[when defined as?].
Lucas can't assert the truth of this statement.
This statement is true but cannot be asserted by Lucas. This shows that Lucas himself is subject to the same limits that he describes for machines, as are all people, and so Lucas's argument is pointless.
After concluding that human reasoning is non-computable, Penrose went on to controversially speculate that some kind of hypothetical non-computable processes involving the collapse of quantum mechanical states give humans a special advantage over existing computers. Existing quantum computers are only capable of reducing the complexity of Turing computable tasks and are still restricted to tasks within the scope of Turing machines.[clarification needed]. By Penrose and Lucas's arguments, existing quantum computers are not sufficient[clarification needed][why?], so Penrose seeks for some other process involving new physics, for instance quantum gravity which might manifest new physics at the scale of the Planck mass via spontaneous quantum collapse of the wave function. These states, he suggested, occur both within neurons and also spanning more than one neuron. However, other scientists point out that there is no plausible organic mechanism in the brain for harnessing any sort of quantum computation, and furthermore that the timescale of quantum decoherence seems too fast to influence neuron firing.
Hubert Dreyfus Hubert Dreyfus's views on artificial intelligence and expertise depended primarily on implicit skill rather than explicit symbolic manipulation, and argued that these skills would never be captured in formal rules.
Dreyfus's argument had been anticipated by Turing in his 1950 paper Computing machinery and intelligence, where he had classified this as the "argument from the informality of behavior." Turing argued in response that, just because we do not know the rules that govern a complex behavior, this does not mean that no such rules exist. He wrote: "we cannot so easily convince ourselves of the absence of complete laws of behaviour ... The only way we know of for finding such laws is scientific observation, and we certainly know of no circumstances under which we could say, 'We have searched enough. There are no such laws.'"
Russell and Norvig point out that, in the years since Dreyfus published his critique, progress has been made towards discovering the "rules" that govern unconscious reasoning. The situated movement in robotics research attempts to capture our unconscious skills at perception and attention. Computational intelligence paradigms, such as neural nets, evolutionary algorithms and so on are mostly directed at simulated unconscious reasoning and learning. Statistical approaches to AI can make predictions which approach the accuracy of human intuitive guesses. Research into commonsense knowledge has focused on reproducing the "background" or context of knowledge. In fact, AI research in general has moved away from high level symbol manipulation or "GOFAI", towards new models that are intended to capture more of our unconscious reasoning[according to whom?]. Historian and AI researcher Daniel Crevier wrote that "time has proven the accuracy and perceptiveness of some of Dreyfus's comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier."
Can a machine have a mind, consciousness, and mental states?
A physical symbol system can have a mind and mental states.
A physical symbol system can act intelligently.
Searle introduced the terms to isolate strong AI from weak AI so he could focus on what he thought was the more interesting and debatable issue. He argued that even if we assume that we had a computer program that acted exactly like a human mind, there would still be a difficult philosophical question that needed to be answered.
Neither of Searle's two positions are of great concern to AI research, since they do not directly answer the question "can a machine display general intelligence?" (unless it can also be shown that consciousness is necessary for intelligence). Turing wrote "I do not wish to give the impression that I think there is no mystery about consciousness… [b]ut I do not think these mysteries necessarily need to be solved before we can answer the question [of whether machines can think]." Russell and Norvig agree: "Most AI researchers take the weak AI hypothesis for granted, and don't care about the strong AI hypothesis."
Before we can answer this question, we must be clear what we mean by "minds", "mental states" and "consciousness".
The words "mind" and "consciousness" are used by different communities in different ways. Some new age thinkers, for example, use the word "consciousness" to describe something similar to Bergson's "élan vital": an invisible, energetic fluid that permeates life and especially the mind. Science fiction writers use the word to describe some essential property that makes us human: a machine or alien that is "conscious" will be presented as a fully human character, with intelligence, desires, will, insight, pride and so on. (Science fiction writers also use the words "sentience", "sapience," "self-awareness" or "ghost" - as in the Ghost in the Shell manga and anime series - to describe this essential human property). For others[who?], the words "mind" or "consciousness" are used as a kind of secular synonym for the soul.
For philosophers, neuroscientists and cognitive scientists, the words are used in a way that is both more precise and more mundane: they refer to the familiar, everyday experience of having a "thought in your head", like a perception, a dream, an intention or a plan, and to the way we know something, or mean something or understand something. "It's not hard to give a commonsense definition of consciousness" observes philosopher John Searle. What is mysterious and fascinating is not so much what it is but how it is: how does a lump of fatty tissue and electricity give rise to this (familiar) experience of perceiving, meaning or thinking?
Philosophers call this the hard problem of consciousness. It is the latest version of a classic problem in the philosophy of mind called the "mind-body problem." A related problem is the problem of meaning or understanding (which philosophers call "intentionality"): what is the connection between our thoughts and what we are thinking about (i.e. objects and situations out in the world)? A third issue is the problem of experience (or "phenomenology"): If two people see the same thing, do they have the same experience? Or are there things "inside their head" (called "qualia") that can be different from person to person?
Neurobiologists believe all these problems will be solved as we begin to identify the neural correlates of consciousness: the actual relationship between the machinery in our heads and its collective properties; such as the mind, experience and understanding. Some of the harshest critics of artificial intelligence agree that the brain is just a machine, and that consciousness and intelligence are the result of physical processes in the brain. The difficult philosophical question is this: can a computer program, running on a digital machine that shuffles the binary digits of zero and one, duplicate the ability of the neurons to create minds, with mental states (like understanding or perceiving), and ultimately, the experience of consciousness?
John Searle asks us to consider a thought experiment: suppose we have written a computer program that passes the Turing test and demonstrates "general intelligent action." Suppose, specifically that the program can converse in fluent Chinese. Write the program on 3x5 cards and give them to an ordinary person who does not speak Chinese. Lock the person into a room and have him follow the instructions on the cards. He will copy out Chinese characters and pass them in and out of the room through a slot. From the outside, it will appear that the Chinese room contains a fully intelligent person who speaks Chinese. The question is this: is there anyone (or anything) in the room that understands Chinese? That is, is there anything that has the mental state of understanding, or which has conscious awareness of what is being discussed in Chinese? The man is clearly not aware. The room cannot be aware. The cards certainly aren't aware. Searle concludes that the Chinese room, or any other physical symbol system, cannot have a mind.
Searle goes on to argue that actual mental states and consciousness require (yet to be described) "actual physical-chemical properties of actual human brains." He argues there are special "causal properties" of brains and neurons that gives rise to minds: in his words "brains cause minds."
Gottfried Leibniz made essentially the same argument as Searle in 1714, using the thought experiment of expanding the brain until it was the size of a mill. In 1974, Lawrence Davis imagined duplicating the brain using telephone lines and offices staffed by people, and in 1978 Ned Block envisioned the entire population of China involved in such a brain simulation. This thought experiment is called "the Chinese Nation" or "the Chinese Gym". Ned Block also proposed his Blockhead argument, which is a version of the Chinese room in which the program has been re-factored into a simple set of rules of the form "see this, do that", removing all mystery from the program.
Responses to the Chinese room emphasize several different points.
The systems reply and the virtual mind reply: This reply argues that the system, including the man, the program, the room, and the cards, is what understands Chinese. Searle claims that the man in the room is the only thing which could possibly "have a mind" or "understand", but others disagree, arguing that it is possible for there to be two minds in the same physical place, similar to the way a computer can simultaneously "be" two machines at once: one physical (like a Macintosh) and one "virtual" (like a word processor).
Speed, power and complexity replies: Several critics point out that the man in the room would probably take millions of years to respond to a simple question, and would require "filing cabinets" of astronomical proportions. This brings the clarity of Searle's intuition into doubt.
Robot reply: To truly understand, some believe the Chinese Room needs eyes and hands. Hans Moravec writes: 'If we could graft a robot to a reasoning program, we wouldn't need a person to provide the meaning anymore: it would come from the physical world."
Brain simulator reply: What if the program simulates the sequence of nerve firings at the synapses of an actual brain of an actual Chinese speaker? The man in the room would be simulating an actual brain. This is a variation on the "systems reply" that appears more plausible because "the system" now clearly operates like a human brain, which strengthens the intuition that there is something besides the man in the room that could understand Chinese.
Other minds reply and the epiphenomena reply: Several people have noted that Searle's argument is just a version of the problem of other minds, applied to machines. Since it is difficult to decide if people are "actually" thinking, we should not be surprised that it is difficult to answer the same question about machines.
A related question is whether "consciousness" (as Searle understands it) exists. Searle argues that the experience of consciousness can't be detected by examining the behavior of a machine, a human being or any other animal. Daniel Dennett points out that natural selection cannot preserve a feature of an animal that has no effect on the behavior of the animal, and thus consciousness (as Searle understands it) can't be produced by natural selection. Therefore either natural selection did not produce consciousness, or "strong AI" is correct in that consciousness can be detected by suitably designed Turing test.
Is thinking a kind of computation?
The computational theory of mind or "computationalism" claims that the relationship between mind and brain is similar (if not identical) to the relationship between a running program and a computer. The idea has philosophical roots in Hobbes (who claimed reasoning was "nothing more than reckoning"), Leibniz (who attempted to create a logical calculus of all human ideas), Hume (who thought perception could be reduced to "atomic impressions") and even Kant (who analyzed all experience as controlled by formal rules). The latest version is associated with philosophers Hilary Putnam and Jerry Fodor.
This is John Searle's "strong AI" discussed above, and it is the real target of the Chinese room argument (according to Harnad).
Be kind, resourceful, beautiful, friendly, have initiative, have a sense of humor, tell right from wrong, make mistakes, fall in love, enjoy strawberries and cream, make someone fall in love with it, learn from experience, use words properly, be the subject of its own thought, have as much diversity of behaviour as a man, do something really new.
Turing argues that these objections are often based on naive assumptions about the versatility of machines or are "disguised forms of the argument from consciousness". Writing a program that exhibits one of these behaviors "will not make much of an impression." All of these arguments are tangential to the basic premise of AI, unless it can be shown that one of these traits is essential for general intelligence.
Can a machine have emotions?
If "emotions" are defined only in terms of their effect on behavior or on how they function inside an organism, then emotions can be viewed as a mechanism that an intelligent agent uses to maximize the utility of its actions. Given this definition of emotion, Hans Moravec believes that "robots in general will be quite emotional about being nice people". Fear is a source of urgency. Empathy is a necessary component of good human computer interaction. He says robots "will try to please you in an apparently selfless manner because it will get a thrill out of this positive reinforcement. You can interpret this as a kind of love." Daniel Crevier writes "Moravec's point is that emotions are just devices for channeling behavior in a direction beneficial to the survival of one's species."
However, emotions can also be defined in terms of their subjective quality, of what it feels like to have an emotion. The question of whether the machine actually feels an emotion, or whether it merely acts as if it is feeling an emotion is the philosophical question, "can a machine be conscious?" in another form.
Can a machine be self-aware?
"Self awareness", as noted above, is sometimes used by science fiction writers as a name for the essential human property that makes a character fully human. Turing strips away all other properties of human beings and reduces the question to "can a machine be the subject of its own thought?" Can it think about itself? Viewed in this way, a program can be written that can report on its own internal states, such as a debugger. Though arguably self-awareness often presumes a bit more capability; a machine that can ascribe meaning in some way to not only its own state but in general postulating questions without solid answers: the contextual nature of its existence now; how it compares to past states or plans for the future, the limits and value of its work product, how it perceives its performance to be valued-by or compared to others.
Can a machine be original or creative?
Turing reduces this to the question of whether a machine can "take us by surprise" and argues that this is obviously true, as any programmer can attest. He notes that, with enough storage capacity, a computer can behave in an astronomical number of different ways. It must be possible, even trivial, for a computer that can represent ideas to combine them in new ways. (Douglas Lenat's Automated Mathematician, as one example, combined ideas to discover new mathematical truths.) Kaplan and Haenlein suggest that machines can display scientific creativity, while it seems likely that humans will have the upper hand where artistic creativity is concerned.
In 2009, scientists at Aberystwyth University in Wales and the U.K's University of Cambridge designed a robot called Adam that they believe to be the first machine to independently come up with new scientific findings. Also in 2009, researchers at Cornell developed Eureqa, a computer program that extrapolates formulas to fit the data inputted, such as finding the laws of motion from a pendulum's motion.
Can a machine be benevolent or hostile?
This question (like many others in the philosophy of artificial intelligence) can be presented in two forms. "Hostility" can be defined in terms function or behavior, in which case "hostile" becomes synonymous with "dangerous". Or it can be defined in terms of intent: can a machine "deliberately" set out to do harm? The latter is the question "can a machine have conscious states?" (such as intentions) in another form.
One issue is that machines may acquire the autonomy and intelligence required to be dangerous very quickly. Vernor Vinge has suggested that over just a few years, computers will suddenly become thousands or millions of times more intelligent than humans. He calls this "the Singularity." He suggests that it may be somewhat or possibly very dangerous for humans. This is discussed by a philosophy called Singularitarianism.
In 2009, academics and technical experts attended a conference to discuss the potential impact of robots and computers and the impact of the hypothetical possibility that they could become self-sufficient and able to make their own decisions. They discussed the possibility and the extent to which computers and robots might be able to acquire any level of autonomy, and to what degree they could use such abilities to possibly pose any threat or hazard. They noted that some machines have acquired various forms of semi-autonomy, including being able to find power sources on their own and being able to independently choose targets to attack with weapons. They also noted that some computer viruses can evade elimination and have achieved "cockroach intelligence." They noted that self-awareness as depicted in science-fiction is probably unlikely, but that there were other potential hazards and pitfalls.
Some experts and academics have questioned the use of robots for military combat, especially when such robots are given some degree of autonomous functions. The US Navy has funded a report which indicates that as military robots become more complex, there should be greater attention to implications of their ability to make autonomous decisions.
The President of the Association for the Advancement of Artificial Intelligence has commissioned a study to look at this issue. They point to programs like the Language Acquisition Device which can emulate human interaction.
Some have suggested a need to build "Friendly AI", meaning that the advances which are already occurring with AI should also include an effort to make AI intrinsically friendly and humane.
Can a machine have a soul?
In attempting to construct such machines we should not be irreverently usurping His power of creating souls, any more than we are in the procreation of children: rather we are, in either case, instruments of His will providing mansions for the souls that He creates.
Some scholars argue that the AI community's dismissal of philosophy is detrimental. In the Stanford Encyclopedia of Philosophy, some philosophers argue that the role of philosophy in AI is underappreciated. Physicist David Deutsch argues that without an understanding of philosophy or its concepts, AI development would suffer from a lack of progress.
^ McCarthy, John. "The Philosophy of AI and the AI of Philosophy". jmc.stanford.edu. Retrieved 2018-09-18.
^ Russell & Norvig 2003, p. 947 define the philosophy of AI as consisting of the first two questions, and the additional question of the ethics of artificial intelligence. Fearn 2007, p. 55 writes "In the current literature, philosophy has two chief roles: to determine whether or not such machines would be conscious, and, second, to predict whether or not such machines are possible." The last question bears on the first two.
^ a b c d This version is from Searle (1999), and is also quoted in Dennett 1991, p. 435. Searle's original formulation was "The appropriately programmed computer really is a mind, in the sense that computers given the right programs can be literally said to understand and have other cognitive states." (Searle 1980, p. 1). Strong AI is defined similarly by Russell & Norvig (2003, p. 947): "The assertion that machines could possibly act intelligently (or, perhaps better, act as if they were intelligent) is called the 'weak AI' hypothesis by philosophers, and the assertion that machines that do so are actually thinking (as opposed to simulating thinking) is called the 'strong AI' hypothesis."
^ See Russell & Norvig 2003, p. 3, where they make the distinction between acting rationally and being rational, and define AI as the study of the former.
^ Turing 1950 and see Russell & Norvig 2003, p. 948, where they call his paper "famous" and write "Turing examined a wide variety of possible objections to the possibility of intelligent machines, including virtually all of those that have been raised in the half century since his paper appeared."
^ Turing 1950 under "The Argument from Consciousness"
^ Russell and Norvig would prefer the word "rational" to "intelligent".
^ Russell & Norvig (2003, pp. 48–52) consider a thermostat a simple form of intelligent agent, known as a reflex agent. For an in-depth treatment of the role of the thermostat in philosophy see Chalmers (1996, pp. 293–301) "4. Is Experience Ubiquitous?" subsections What is it like to be a thermostat?, Whither panpsychism?, and Constraining the double-aspect principle.
^ Eugene Izhikevich (2005-10-27). "Eugene M. Izhikevich, Large-Scale Simulation of the Human Brain". Vesicle.nsi.edu. Archived from the original on 2009-05-01. Retrieved 2010-07-29.
^ Gödel, Kurt, 1951, Some basic theorems on the foundations of mathematics and their implications in Solomon Feferman, ed., 1995. Collected works / Kurt Gödel, Vol. III. Oxford University Press: 304-23. - In this lecture, Gödel uses the incompleteness theorem to arrive at the following disjunction: (a) the human mind is not a consistent finite machine, or (b) there exist Diophantine equations for which it cannot decide whether solutions exist. Gödel finds (b) implausible, and thus seems to have believed the human mind was not equivalent to a finite machine, i.e., its power exceeded that of any finite machine. He recognized that this was only a conjecture, since one could never disprove (b). Yet he considered the disjunctive conclusion to be a "certain fact".
^ Graham Oppy (20 January 2015). "Gödel's Incompleteness Theorems". Stanford Encyclopedia of Philosophy. Retrieved 27 April 2016. These Gödelian anti-mechanist arguments are, however, problematic, and there is wide consensus that they fail.
^ Stuart J. Russell; Peter Norvig (2010). "26.1.2: Philosophical Foundations/Weak AI: Can Machines Act Intelligently?/The mathematical objection". Artificial Intelligence: A Modern Approach (3rd ed.). Upper Saddle River, NJ: Prentice Hall. ISBN 978-0-13-604259-4. ...even if we grant that computers have limitations on what they can prove, there is no evidence that humans are immune from those limitations.
^ Mark Colyvan. An introduction to the philosophy of mathematics. Cambridge University Press, 2012. From 2.2.2, 'Philosophical significance of Gödel's incompleteness results': "The accepted wisdom (with which I concur) is that the Lucas-Penrose arguments fail."
^ LaForte, G., Hayes, P. J., Ford, K. M. 1998. Why Gödel's theorem cannot refute computationalism. Artificial Intelligence, 104:265-286, 1998.
^ Russell & Norvig 2003, p. 950 They point out that real machines with finite memory can be modeled using propositional logic, which is formally decidable, and Gödel's argument does not apply to them at all.
^ Hofstadter 1979, pp. 476–477, Russell & Norvig 2003, p. 950, Turing 1950 under "The Argument from Mathematics" where he writes "although it is established that there are limitations to the powers of any particular machine, it has only been stated, without sort of proof, that no such limitations apply to the human intellect."
^ Litt, Abninder; Eliasmith, Chris; Kroon, Frederick W.; Weinstein, Steven; Thagard, Paul (6 May 2006). "Is the Brain a Quantum Computer?". Cognitive Science. 30 (3): 593–603. doi:10.1207/s15516709cog0000_59. PMID 21702826.
^ Turing 1950 under "(8) The Argument from the Informality of Behavior"
^ a b c Turing 1950 under "(4) The Argument from Consciousness". See also Russell & Norvig, pp. 952–3, where they identify Searle's argument with Turing's "Argument from Consciousness."
^ Cole 2004, 4.2 ascribes this position to Ned Block, Daniel Dennett, Tim Maudlin, David Chalmers, Steven Pinker, Patricia Churchland and others.
^ Searle 1980 under "5. The Other Minds Reply", Cole 2004, 4.4. Turing 1950 makes this reply under "(4) The Argument from Consciousness." Cole ascribes this position to Daniel Dennett and Hans Moravec.
^ a b c Turing 1950 under "(5) Arguments from Various Disabilities"
^ Turing 1950 under "(6) Lady Lovelace's Objection"
^ Turing 1950 under "(5) Argument from Various Disabilities"
^ Katz, Leslie (2009-04-02). "Robo-scientist makes gene discovery-on its own | Crave - CNET". News.cnet.com. Retrieved 2010-07-29.
^ a b Scientists Worry Machines May Outsmart Man By JOHN MARKOFF, NY Times, July 26, 2009.
^ The Coming Technological Singularity: How to Survive in the Post-Human Era, by Vernor Vinge, Department of Mathematical Sciences, San Diego State University, (c) 1993 by Vernor Vinge.
^ Call for debate on killer robots, By Jason Palmer, Science and technology reporter, BBC News, 8/3/09.
^ Science New Navy-funded Report Warns of War Robots Going "Terminator", by Jason Mick (Blog), dailytech.com, February 17, 2009.
^ Navy report warns of robot uprising, suggests a strong moral compass, by Joseph L. Flatley engadget.com, Feb 18th 2009.
^ AAAI Presidential Panel on Long-Term AI Futures 2008-2009 Study, Association for the Advancement of Artificial Intelligence, Accessed 7/26/09.
^ Turing 1950 under "(1) The Theological Objection", although it should be noted that he also writes "I am not very impressed with theological arguments whatever they may be used to support"
^ Deutsch, David (2012-10-03). "Philosophy will be the key that unlocks artificial intelligence | David Deutsch". the Guardian. Retrieved 2018-09-18.
Cole, David (Fall 2004), "The Chinese Room Argument", in Zalta, Edward N. (ed.), The Stanford Encyclopedia of Philosophy .
Dreyfus, Hubert (1979), What Computers Still Can't Do, New York: MIT Press .
Gladwell, Malcolm (2005), Blink: The Power of Thinking Without Thinking, Boston: Little, Brown, ISBN 978-0-316-17232-5 .
Haugeland, John (1985), Artificial Intelligence: The Very Idea, Cambridge, Mass.: MIT Press .
Hofstadter, Douglas (1979), Gödel, Escher, Bach: an Eternal Golden Braid .
Horst, Steven (2009), "The Computational Theory of Mind", in Zalta, Edward N. (ed.), The Stanford Encyclopedia of Philosophy, Metaphysics Research Lab, Stanford University .
Kurzweil, Ray (2005), The Singularity is Near, New York: Viking Press, ISBN 978-0-670-03384-3 .
Lucas, John (1961), "Minds, Machines and Gödel", in Anderson, A.R. (ed.), Minds and Machines .
McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955), A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence, archived from the original on 2008-09-30 .
Page numbers above and diagram contents refer to the Lyceum PDF print of the article.
This page was last edited on 22 April 2019, at 15:17 (UTC). | 2019-04-22T18:56:26Z | http://www.let.rug.nl/~gosse/termpedia2/termpedia.php?language=dutch_general&density=7&link_color=000000&termpedia_system=perl_db&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPhilosophy_of_artificial_intelligence |
Hanzi (汉字 or 漢字) is the Chinese word for “Chinese character.” The Chinese language has been written in hanzi for a very long time. As the Chinese tell me, hanzi have been in use since approximately 3000 years before the Big Bang. It’s quite a tradition.
When an institution has been in place for that long, it can be incredibly hard to implement change. For example, when the new Communist emperors wanted to reform and “simplify” hanzi, some old fuddy-duddies opposed. Still, significant change was effected, but only in the writing system of mainland China. The two bastions of traditional characters to this day remain Hong Kong and Taiwan, two territories well known for their linguistic backwardness — many of the people there can’t even speak good Beijing Mandarin!
The PRC’s Emperor Mao had an even more radical scheme. He was in favor of eventually replacing Chinese characters with pinyin — a romanized form of Chinese. This idea was so upsetting that some experts believed it may reverse the Big Bang itself. It is also one of the stronger pieces of evidence that Emperor Mao’s personal doctor cited for his belief that in his later years Mao suffered from WTF Syndrome.
But allow me to get to my point. While those are all old issues better forgotten by fashionable people, there are new issues. More radical issues. No one is trying to further simplify Chinese or replace it with pinyin, but something else upsetting to the fuddy-duddies is happening. English is creeping into Chinese!
Now, I’m not talking about English being thrown in here and there, like someone saying “sorry” instead of “dui bu qi,” the cultural equivalent of an American saying “amigo.” Those are inevitable results of internationalization. They’re different. I’m talking about an English word becoming the preferred nomenclature, in Chinese.
Pose. When Chinese people take pictures, they might tell those having their picture taken to strike a pose. The traditional Chinese way to say this is “摆个姿势“. Nowadays, though, you frequently hear young people say “摆个pose”. Why the word “pose” might be singled out for adoption I have no clue.
High. When young Chinese people talk about a feeling of excitement, they often use the word “high” in its adjectival form, as in “很high的感觉” (a ‘high’ feeling). This usage is not related at all to drugs.
Cheese. The traditional Chinese word for “cheese” is 奶酪. In recent years phonetic transcriptions of the English word have cropped up on trendy menus (mighty catalysts of monumental linguistic change, as we all know), like 芝士 and 起士, but the actual word for cheese you hear coming from young Chinese people’s mouths is quite different. It is undeniably the English word “cheese,” although the final /z/ sound is often pronounced as an /s/ sound.
To Chinese language purists, this English creeping into Chinese must all be very terrifying. Why? Because English words cannot be written in Chinese characters! What’s the big deal about that? Well, Chinese is always written in Chinese characters! And only in Chinese characters! The reason, as mentioned before, has something to do with the Big Bang and the stability of the space/time continuum. The fate of the universe, it seems, rests precariously on the tongues of this new reckless generation of Chinese youngsters. Yikes!
I think you’ve seen what happens when English “creeps” in … you can look to Japanese culture/language for that. I STILL remember when you described the Japanese way to say “Broadband Internet” as “Brwode-Band-Een-ter-neta”. But then you have Taiwanese ‘reckless’ teenagers sippin’ on pearl iced tea who greet “mushi-mushi” when they answer their phone.
The post brings to mind the question I was pursuing answers to when I came across your site. Since I don’t want to pester you with a “cold call” email, I thought I’d ask about your impressions on China and Japan here.
I’m presently teaching myself Japanese out of interest and.. whether the perception is correct or not.. the notion that it’s easier to teach myself more Japanese on my own than Chinese. I’ve recently become more interested in Chinese culture, however. Living in St. Louis, there is also a much higher population of Chinese people than Japanese. While I enjoy Japanese and am curious about Chinese, I figure it’s best to dedicate my studies to one or the other, rather than both at once. It seems to me that Chinese would be of more use in areas with high Asian concentrations here in the U.S. than Japanese.
I’m also curious about your experiences abroad. My wife and I would like to tour both China and Japan. She’s not quite the traveller I am, however, and I would like to spend more of our eventual tour where she’d probably feel a little more comfortable. As such, I figure it would make sense to focus on learning the language of the country we might spend more time in.
Having travelled and lived in both Japan and China, do you feel one is more “hospitable” to foreigners than the other? I’d be interested in your impressions. You’re welcome to email if you like, or just post a response. As I said, I didn’t want to assault you out of the blue with an email or something. 🙂 Thanks.
This is nothing new–English has been creeping into Chinese for decades. It’s only a relatively recent phenom in Mainland b/c the country didn’t seriously open up to the outside until the 1980s. However, the same thing has been going on in Hong Kong and Taiwan (in Taiwan’s case, probably from the Vietnam War era).
Onikaze, quick comment.. if you want to be able to speak to Chinese people in the US, you should learn Cantonese, most overseas Chinese came from Hong Kong/Canton. Recently, however, that dialect is becoming less and less useful as time passes, so stick to Mandarin, but don’t expect to be able to go to Chinatown and speak it to shop keepers/people on the street.
Do expect to be able to go to Chinatown and speak Mandarin to shop keepers and restaurant servicers. The population composition has changed so much in major US (and Canadian) cities that Mandarin is spoken all over the places. The newer immigrants (from Mainland and Taiwan) may not live in those streets but they have become the major consumer force. This is even true in HK and southeast Asia nowadays.
The funniest thing is when you are speaking Chinese and you don’t know the word for what you want to say — I take a cue from my Chinese friends and just pronounce the word in a Chinese way! E.g. ÄãµÄah-sine-men ÄѲ»ÄÑ£¿(assignment). They normally don’t even notice, since many study related words they use the English. Assignment, exam, test, report, lecturer, tutorial etc. (These are Chinese studying in New Zealand).
I even tried this in China with Tibetan high school students who were too shy to speak English to me (even though their English is better than my Chinese and Tibetan!). I would speak in Chinese but many of the nouns I used would be in English. They would respond in Chinese, giving me the words that I didn’t know. Good for my study but not their’s. It’s amazing how even students in countryside schools can understand so much English! It is a bit of worry for these minority groups, some TIbetans my age could only speak English and Chinese, and not Tibetan anymore, because they are taught English and Chinese for longer.
I think it was in early 80’s when the phrase “bye” was first introduced to the mainland Chinese. Before then, everyone used “ÔÙÒ”.
Soon after the American style denim jeans were introduced. At first everyone calls them “Å£×ÐÑ”, but soon the street merchant realized that if they actually use “Jeans”, they would get more business and inflat the price.
The phrases of “cool” and “party” are more popular in China than U.S.
Instead of saying “¸ç”, they start to use “dude”.
What I’ve seen is a little different from you describe.
John, care to elaborate on why you think “¿á” and “cool” are different?
I thought they were and the translation came from HK or Taiwan which might have led one to think they were HK or TW words.
Maybe it depends on which city, but from my experience in San Francisco Chinatown I heard nothing but Cantonese from people walking around on the street.
I think sometimes ¿á is used to mean something that seems similar to “cool,” but its main meaning is actually quite different. The Chinese word Àä¿á influences the meaning of the word ¿á a lot, I think, as it is often used to describe men of the “strong and silent” type. You know, the kind of guy who looks tough, doesn’t smile, and says little.
“ÎÒϲ»¶¿áµÄÄк¢” translating it as “I like cool boys” would simply be incorrect in my view.
Likewise, in English you could say, “I think Jackie Chan is cool,” but no Chinese person would ever say, “ÎÒ¾õµÃ³ÉÁúºÜ¿á”. The guy’s always smiling and acting goofy, so he just isn’t ¿á, regardless of whether or not you like him.
So I think it’s a case of a Chinese word being modeled to sound like an English word, but still maintaining a lot of its own separate meaning.
You are on drugs if you think that “high” is not used to describe intoxication.
My point was that while saying you’re “high” in English has been reserved largely for drug use, it’s not in Chinese. And I have never personally heard it used that way, although I’ve heard it used many other times in other contexts.
Thanks for the clarification, John. I agree with you to some extent, but I believe I have heard Chinese people say “ku” or “cool” in place of “°ô”, which doesn’t fit with your interpretation of the current use of the word.
Yeah, I guess I have to admit there’s some overlap.
Actually, I had a discussion about this with my senior students. Living in Shenzhen, there is definitely a ton of English everywhere. The interesting thing is that when I asked them about it, they denied they were doing it! I had a whole classroom of senior 2’s telling me that “°Ý°Ý” wasn’t English.
I played along and asked them if English words would ever be “allowed” in Chinese. They said no, because China has 5000 years of history. Go figure.
While the influx of English into Chinese is certainly interesting, I find certain peoples’ attitudes towards it much more interesting.
The word that they use for “high” for when there are drug connotations is uî^ or “head shaking,” as in that’s what people like to do after doing a hit of E or KËûÃü.
Oh please. I’ve yet to meet a single Taiwanese person under the age of 60 who couldn’t speak intelligible Mandarin, even if Taiwanese were their preferred dialect. The same cannot be said for the mainland.
“High” is not used in Chinese to describe drug high because people don’t know this further reaching origin. They see Americans call an excited or hyperactive person high and they took it to mean jolly. Sometimes you guys say so-and-so is so high after that perfect score… you may not literally inferring he used drug, right? I’m sure the drug user soceity of China also has the real menual on high.
I see your reasoning on cool vs. ¿á but don’t know what you are high from — kidding. I think you got it wrong. When ¿á is said, it no longer means Àä¿á. It was borrowed from there to produce an extremely cool (sound and meaning)translation of cool. As to Jackie Chan and other examples, that’s just different coolness by different observers. Cool is such a subjective word sometimes it’s cool just to be different.
There are other examples of Hanzifized English words with somewhat meaningful characters, such as Íи££¨TOFLE£©£¬¶¡¿Í£¨D.I.N.K.£©£¬¿ÉÀÖ£¨cola£©. These were old.
If there is not a character for high already, I wouldn’t be surprised to find oneday a º§£¬ that would be ¿á.
Similarly in English, COOL in such contexts has lost it’s original meaning of nicely felt temperature, right? So ¿á here no longer means Àä even though it originated from Àä¿á. the parallel is astonishing.
Thanks for backing me up on the “high” issue.
Maybe you missed the Big Bang references, but I wasn’t being exactly serious there.
I know ¿á is not the same as Àä¿á. I used the word “influences.” I think ¿á is a word influenced by two cultures, and the result is a word that’s somewhere in the middle. You mention “different coolness by different observers.” Well, one one “observer” is one culture speaking one language and the other “observer” is another culture speaking another language, I think it amounts to two words meaning not quite the same thing.
John, you should compile of Chinese slangs and their English counter parts, vice versa.
In a related example, I’ve seen Chinese product names that adopt the Japanese possessive particle ¤Î (no) as a substitute for 的. No idea how a Chinese would pronounce it though.
I find my Americanized Chinese friends amusing when they freely (perhaps subconsciously) mix English words into Chinese speech. (e.g. “我已經跟他argue過了”… given that there are plety of Chinese equivalents for “argue” I suspect this one was subconscious).
It would be interesting if we reached a breaking point where romanized words just had to be used instead of hanzi. On the other hand, consider all of the Chinese dialects that don’t have written equivalents, or whose non-Mandarin written forms are rarely used (e.g. Cantonese).
I know the whole post was written tongue-in-cheek but I can’t tell if you’re trying to be serious about this or not?
Also, it just occurred to me how ironic the title of this post is. you made a new word (hanzify) by taking a chinese word and adapting it to english. was that intentional?
A good place to look are Hong Kong comics. They use “non-standard” characters all over the place to encode the Cantonese sounds/words that don’t have equivalents in Mandarin.
Can anyone enlighten me to the way the word “feel” has been appropriated by the Chinese language as used in popular Chinese culture? I’ve noticed the word used in very uncomprehensible (to me) ways on Chinese t-shirts, the names of DVD’s. Things like “Feel 100%” and “Christy Chung – Feel”, etc. What is meant or understood by the word in these contexts? It certainly isn’t native English use of the word. Thank you.
I’m with JR. Isn’t a national standard language a relatively new invention? I thought everyone got together in the first national assembly in 1911 and pretty much sort of decided that the Beijing dialect would be standard. And this was quite controversial, so much so that it started a fist fight between two prominent parliamentarians. Before then, I thought that there were strong local prestige zones, just like there were economic zones. So that in the old Suzhou area the Wu dialect would be the prestige dialect, not the Beijing dialect. We can imagine the beautiful, thriving linguistic heterogeneity, all living under a unified literary language (ÎÄ×Ö). So it seems rather healthy that Cantonese is still a prestige dialect. Look, though, if you go to Wenzhou, for example, you will also find a very strong sense of local identity coalesced around an ancient local dialect and, at least a few years ago, old people who still didn’t really speak Mandarin or didn’t care to. And really all the linguistic diversity in China is amazing and wonderful.
I would be really grateful if someone with solid knowledge of the development of a national standard language in China would chime in– I could be way off. I know that in Europe, most places the national standard language is something that grew up around the nation state, something to which our brains are just irrevocably tied. It’s difficult to imagine politics and social fabric without a modern nation state, and so it’s difficult to imagine them without a national language. But in Germany, for example, standard Hochdeutsch wasn’t invented until the 1870s, to my knowledge.
I thought that in the past ÎÄ×Ö was really the national binding force of the literati. Was the pronunciation really that uniform around the empire? And what about Manchu? Weren’t most important documents kept in Chinese and Manchu well into the 19th Century?
I think it goes through an ellaborate process. First people use foreign words in conversations for whatever reason, lazyness, clarity, fashion, arragance, coolness, and what not. After a short while the popular press (comic strips, tabloids) strives to impress by putting either the English or an invented hanzified version in writing, mixed use and switch hitter will rule in this period. If one particularly cool translation catches people’s taste bud it will spread like wild fire. However, it takes ages before the official press including book publishers accepts such imported goods and when it does it invariably is going to be the well accepted Chinese word. Has anyone ever seen the English version of “Bye-Bye” or “No” in the People’s Daily or ÈËÃñÎÄѧ? I’m not even sure if the Chinese word ¿á made it yet — can anyone tell us, please?
I’m certainly not the person to compile a slang list… I’ll leave that to the more qualified.
Of course it’s not serious!
You’re just now discovering the many, many layers of meaning carefully crafted into my blog entries???
I just asked a friend who says they just see “feel” as meaning “¸Ð¾õ”.
I’m no expert, but I’ve done some research regarding the evolution of the Chinese written language. The normal pattern seems to be that the transition to “modernity” involved the creation of a national language and the establishment of a vernacular.
In China the ¹úÓï movement (for a spoken standard) had gained momentum by the early 1900s. On the heels of that movement was the °×»° movement, which advocated the use of the written vernacular in place of the traditional ÎÄÑÔ.
Hu Shi began a literary revolution in 1917, advocating baihua. In 1922 In 1922 the Chinese Ministry of Education decreed that elementary textbooks were to henceforth be written in the vernacular.
So the establishment of a unified spoken language and a standard written form based on the vernacular are closely related, but still separate.
Hmmm, maybe that doesn’t totally address your question. I was just looking at my old senior thesis from college and I was surprised at all the stuff I used to know, and it sort of related….
The standard adopted then was actually ¹úÓï based on the northern dialect spoken by the elite society in Shanghai (and on the campuses of Tsinghua and Beida also), which is the predecessor of the ¹úÓï being used in Taiwan today. You can appreciate this standard language by watching old Chinese movies of the 1930s. Then PRC decided on a different one: Putonghua, based primarily on a cleaned-up version of Beijing dialect.
That is the case today, and ever since the big bang, but also dynamically changing all the time. Now the western commercialism is destroying the heterogeneity by driving out the Wu dialect but at the same time destroying the homogeneity of Putonghua by inserting OK, COOL, HIGH, PARTY, DATE, CHURCH, FEEL, all these capitalist spiritual pollutions. Oh, no, thay are trying to reverse the big bang.
Seriously, ÇØÊ¼»Ê unified ÎÄ×Ö but did not do the same to ÕZÑÔ. Some (economists) think it was a failure, others (linguistists) think it was a good thing, that he didn’t. Me? I don’t know what to think of it. Is Chinese ÕZÑÔ going to finally be unified by the crushing force of economical modernization? Yes, possibly, and it’s happening. Is Chinese going to be ruined by the “crushing” force of English invasion? Fat chance!
Impossible. This is evident in some of the old °×»°ÎÄ novels.
Disclaimers: 1. The above was from a nonprofessional; 2. It feels soooo good for a lazy bone to be able to insert foreign words at will without having to translate them so what’s the fuss?
This is a really good time to ask a question I’ve had for a while. So I have a bunch of Kelly Chen CDs (shut up, I know). On 99% of the songs she sings Mandarin vocabulary with Cantonese pronunciation (e.g. saying 不 “bat” instead of ßí “mh”). I was under the impression this would sound very unnatural. What is up with that? Is that normal for Cantonese singers, or is Kelly just being weird?
oh the joys of using foreign words in speech. sometimes i find some chinese words are so much easier to use than the english equivalent. my favourite at the moment is; Âé·³, as in “sorry honey, i was going to get some fruit on the way home but it was Âé·³”.
….and you know whats strange for me right now, i’m so immersed in studying my chinese lately that i can’t really remember how i would say that sentence with out using Âé·³. weird.
If Âé·³ gets you so high, try also ÂíÂí»¢»¢.
There are 7 accepted dialects still alive in China today, all (except Min) are said to have developed from Middle Chinese which refers to a spoken dialect dating back to 601 AD with the publication of the standard dictionary Qieyun. Not much is known about how Middle Chinese was pronounced back then, but linguists have peiced an approximation together based on literary works (rhyme books) and this dictionary.
Dialects have always existed in China, but the main uniting factor has always been the writing system unified by the first emporer of Qin.
Wow, it was really fun reading the informative comments and taking in the different personal angles! Great blog, John.
You may know some Chinese people that do drugs or get drunk and use the word ‘high’ to describe the feeling. (I’d guess they’ve been influenced by English speakers.) But that doesn’t make said usage a trend for the whole language. Sorry, man.
I just thought that you shouldn’t have used the word “all”. Many people do look at your site as something more than a joke and take your word very seriously. You are a linguist and a very good Chinese speaker and you are respected. I thought you should be more careful with your wording. Someone might laugh when they hear about someone getting high because acording to John it just means “excited”. Now if the guy was really high he might think that those around him are laughing and accepting the behavior. Argue how you like but people do use the word that way. People should be careful about how they react to such statements.
I don’t think this will happen. Ever since I arrived in Shanghai a few months ago (not long, I know) I have been surprised by the ways I’ve found my colleagues using their Shanghai»° to “greasen” the wheels of business. When I am around to observe negotiations they will often speak in Mandarin out of courtesy to me; but when the conversation begins to get heated or special deals have to be cut, they will switch to the local dialect. I think they do this to represent friendliness and good intentions towards each other, however insincere these are. I don’t think this is a coincidence; many economically developed parts of China enjoy thriving local dialects: Guangdong, Hong Kong. In fact, I found Hong Kong to be nearly impossible to travel in for that very reason: so many Chinese people, so few who spoke decent Mandarin!
Applied to a person, the English word “cool” suggests to me someone confident, economic with words, and perhaps even a little “cold”. And by the way, don’t forget that ¿á (like cool) can be applied to more than just people.
One of my favourite hanzified words is ºÚ¿Í (hacker), because is seems quite meaningful in chinese — a system cracker could be considered an uninvited “guest”. Furthermore, the chinese word ´Ì¿Í (assassin) also contains this “guest” character.
I disagree–they do it because that is the language they are most familiar with, and the parties are from the same place. If they were doing business with someone oustide their province/city/village they would use Mandarin.
It seems to me from the timing of the switch to local dialect that it is meant to ingratiate the speaker to the listener, implying that they are from a similar group and should be more willing to make concessions to each other during a tough point in the negotiation. I suppose that the switch is unconscious, but I don’t think that it is completely random, as I said, because of the timing and because of the inside/outside implication that you mention.
If they were negotiating with an outsider, you are right, it would be in Mandarin; and because they wouldn’t have access to this linguistic bargaining “technique”, the deal would be less likely to go through, or at least it would be a tougher bargain.
Micah, using Shanghainese among themselves could be for inducement (Micah) and comfort (Prince Roy) and privacy too (Gin), all of which do reduce the bargain cost, true. However, the bigger argument in Coase’s theory (I, as a noneconomist and nonlinguist, have just been exposed to it by the link you gave) is the overall transaction cost which he points out as being greatly reduced by the organization of a corporation (firm). This, at least metaphorically, can speak to my case. Unified spoken language will reduce transaction cost just as unified written language by Qinshihuang did.
The bigger point is that you have to examine this issue macrospically. What you observed in a span of several monthes can only be considered a single data point. To see changes in a language that barely budged over several thousand years, one needs to take data across decades. People who follow it see tremandeous increase of Mandarin’s market share in Shanghai, Guangzhou, and Hong Kong. The changes have been astronomical multiples greater than 20 years prior. That is why I proposed that it is happening, with a qualifier of “possibly” because a mere quarter of a century may prove too brief. Now in Shanghai the role of Shanghainese has been reduced to business small talk and the Shanghai folks are willing to talk just as seriously with non Shanghainese speakers. This was not the case 25 years agao during the cultural revolution in which Shanghai was even a prominent player; legend had it that a lowly Shanghai bus conductor will not respond to an inquiry for directions etc. unless it is raised in authantic Shanghai dialect. How that has changed and how the same has taken place in HK and in Chinatowns in Toronto, Chicago, LA, and Houston! It remains to be seen, though, whether it’s a sheer number’s game which I doubt it is and whether the change will be sustained.
Tim H, if your read my words carefully I was actually with you. Or was my argument too perplexed, hmmm? When Emperor John branded me into his camp, I did not raise my hand and object to his majesty. Haha, that’s just me. In the cultural revolution when Chairman Mao’s men told me I was his good student, I…ahum…… .
That was a typo. Macroscopically.
There are tons of studies on this kind of language switching “code-switching” in polygloss situations… anyway, I haven’t seen any done on particular Chinese dialects except for an undergrad essay on hakka, cantonese and mandarin usage in one family. What I want to say is that Micah’s interpretation is quite reasonable — it’s a common reason to switch to a native dialect if you want the proceedings to be more informal and less distant. Normally in European countries they want the distance so they start off in the same dialect then switch to the ‘high’ language when they get to talking business.
I think that simplified chinese is the most horrible invention ever conceived by man. I feel it denigrates the language by attempting to dumb down how characters are written, so that the ‘the peasants’ can learn how to read and write. I find this incredibly patronising on the part of the communist party, and they have in one fell swoop destroyed whatever little culture that was left after the cultural revolution. Just another thing the Communists did for us.
This grievance is compounded by the fact that not only are simplified characters ugly, their very association with ‘mainlanded-ness’ makes it instantly ‘cheapened’. The closest analogy I can possibly relate this to is akin to the difference between American English and well…English. Why spell colour ‘color’? It serves absolutely no purpose at all but to distort the language from it originated from (I get the feeling I won’t be making any AMerican friends today.) Reading classics in simplified chinese is like reading Shakespeare in bloody American English. A hideous thought.
The Communists simplified the characters in 1956, well before the Cultural Revolution. It also wasn’t the first character reform in Chinese history. Why aren’t you outraged that characters aren’t still written in their earliest forms?
Chinese people say ÇÑ×Ó “qie zi” meaning eggplant when they take a picture. That’s why you hear the zi sound and you have to admit saying eggplant is funny too.
I think Gin is more accurate than the rest of you. But I think the real catalyst for change is technology, TV, cinema, radio, music concerts, etc. Also, the changes will be better understood if the standard of measurement is generation. A generation ago you would have heard haka spoken everywhere in Fukuoka, but today one hears in conversational Japanese the national language. I think this is the trend in most countries, or will be.
An irony of inporting English words into foreign languages is that the word is probably not “English”; that is, is not a vocabulary term used or descended from a term used by the Anglo-Saxon invaders of England. Also, I would agree with Gin also about ¿á. Once a word becomes popular in a new language setting, it will take on a life of its own determined by the new speakers.
Cool. Now I feel high.
“…the real catalyst for change is technology, TV,…” Don’t forget the internet, which is even having an impact on trranslating foreign languages. I remember John described using Google to accomplish looking up Chineese words.
“Once a word becomes popular in a new language setting, it will take on a life of its own determined by the new speakers. ” “Feel” in Alaric’s examples?
That “cheese” became “ÇÑ×Ó” causes me to giggle everytime.
Once a word becomes popular in a new language setting, it will take on a life of its own determined by the new speakers.
Well, yeah. That’s sort of a given.
My point was that I believe the Chinese sort of altered the word ¿á to make it overlap with the English word “cool” while still retaining some of its original nuances. That makes it different from most loanwords. Compare it to ɳ·¢ or something.
I understand your point of view, but I think our view will be colored by whether this is a loan word from English or is a Chinese equivalent word of an English word. If one views this as an equivalent word to the English “cool”, then I would agree with you. But if one thinks this is a loan word in which an hanzi was found that had a meaning similiar to the English, then I would disagree with you.
This may appear as hair-splitting, but I do not think so. My own opinion is that it is a loan word because of the nature of the word itself. It is more slang, used by young people and is more fashionable, all characteristics of a loan word; rather than an attempt to find an equivalent word in Chinese for an English word, equivalents will usually be assoicated with attempts of to translate.
But no matter which direction it takes, you will be right in that this particular word is different from most because it has both a sound similiarity and a root meaning that has similiarities in both languages.
And I maintain that it is a transliteration (yes I said translation before) well done, siding with a loan word rather than a equivalent. My reasoning for not calling it a equivalent is that before, nobody in China would say ÁÖÔòÐì×î¿á,ÑϽûѻƬ or Õâ¸öëÖ÷ϯÏñÕ¿ᰡ. There were Àä¿á, ÑÏ¿á, ¿áÐÌ but never the lone word ¿á as an adjective. John says “the Chinese sort of altered the word ¿á to make it overlap with the English word” cool, very true but they have discarded the Àä aspect. The nuances may be there but definition-wise it no longer relates to the original Àä¿á (Brad correctly pointed out it relates to “°ô” and in my youth we said “¾ø¶Ô¸Çñ”–tranlation: absolutely tops). If a Chinese or British commentator says ÁÖÔòÐì½ûѻƬ–¿á, you would not take it to be a snear with any connotation of his act being cold or cruel.
By the way, cruelty can be TRANSLATED as ¿áÐÐ, short for ²Ð¿áÐÐΪ.
What are we arguing again?
I really don’t see the point in arguing this, though. We all know what the words mean, we just don’t agree on the degree to which ‘¿á’ and ‘cool’ differ in usage. You’re more tolerant in your judgment, and I’m being super picky. Why? Because I have to be — I’d sound like an idiot if I used “¿á” in Chinese the same way that I use “cool” in English.
Are you sure that this “creeping English” isn’t just a fad in Shanghai? We both know the Shanghainese love to prove how modern and worldly they are. I seriously doubt you’d find these same linguistic trends in rural parts of China, where the bulk of the population lives. And while I’ve heard “pose” used as you described, I haven’t heard “kitty” or “high” used. Moreover, I would rank “cheese” up there with “chocolate,” “salad,” “sandwich,” “hamburger,” and a host of other words that are transliterated because they represent a foreign substance or idea. It would be more significant if “noodles” came to replace the Chinese word.
Hmmm…I guess I must sound like an idiot. I actually do use “¿á” in Chinese the same way I would in English. If anyone laughs, my excuse will be that I was really saying “cool” with a Chinese accent.
You are right in that we are arguing over not much of a difference. And you defined the difference quite accurately.
Problem is, after the rounds, I seem to sense that the “influence” in “¿á” is in your mind only. Do the Chinese young people have the trace of influence by Àä¿á in their mind? Back to your original example, “ÎÒϲ»¶¿áµÄÄк¢” Do you really think today’s Chinese young girls would mean someone different from what Western girls consider “cool”? If a polling finds mature female students say there are only three types of boys, ˧µÄ£¬¿áµÄ£¬ÆäÓàµÄ£¬would you then be willing to accept that as being not a bit different from American girls categorizing boys as hot, cool, and the rest? This should be a good linguistic experiment.
“Hacker” is now “ºÚ¿Í” as Todd cited above. The cleverness in this translation mirrors the ¿á translation. But so does the potential complication: ºÚ has a nagative origin, as in ºÚÊÖ£¬ºÚÔô, ºÚ°ï. Are you going thus to assume “ºÚ¿Í” in Chinese refers only to the hackers that are doing illegal hacking and excludes the legit hackers (the kind employed by banks, law enforcement, etc.)?
BTW£¬am I wrong in assuming the word “legit” is a “simplified” English word? I’m sure “fridge” is a simplified one.
I think the main difference between English word “cool” and Chinese word “¿á” is that the English word has a much broader application. Do you disagree with this? I don’t see how anyone could.
Similarly, I think any student of Chinese would be making a mistake to use ¿á in the same way that they would use “cool” in English, because the range of application is different.
That’s why I say they’re not the same.
I agree. Though “¿á” is younger than “cool” and since these are primarily “pop” words, the Chinese youngsters possibly may expand ¿á’s “coverage” or broadness of application. Similarly, I have argued that “high” in Enlgish covers drug high, drink high, and hyper personality whereas Chinese MAY NOT HAVE learned the intoxication applications, yet.
Your point on the good-ole “know” is right on.
It’s impossible to prove conclusively one way or the other, though. You can’t ask people what’s going on in the subconscious when they use a word. And a non-native speaker’s opinion can never be the voice of authority on issues of “feeling” regarding a Chinese character.
At the risk of overkill, I just wanted to add that I asked my Chinese co-workers to tell me what ¿á meant to them, in Chinese.
The first thing they said was “¸úÓ¢ÓïÒ»Ñù.” I insisted that they explain, though, and the essence of their definition was Àä. They said you could not describe a Ñô¹âÄк¢ as ¿á.
That differs a lot from English, because in English someone’s perceived “coolness” is based on the speaker’s own standards of what is cool, and not at all on society’s standards (although admittedly, the two influece each other in both cases).
Just a few more comments. Quibbling over the details is done quite often in my profession, engineering. It helps sharpen our focus and understanding of the issue. The posts from Gin, yourself and others are quite usefull for me, at least.
I am puzzled by your last posting on 5 Nov at 11:16 am. The question is not the range of meanings of “cool” in English vs. the range of meanings of ¿á in Chinese, but rather is ¿á in certain applications the loan word “cool” from English. I believe that was the original comment you made, that it was different and therefore not a loan word. I doubt that most loan words in the second language will have the same range of meanings as that word has in its original language.
I do not have any practical experience with the word “cool” or the word ¿á. Most of the people I do with, in both the English speaking world and the Chinese speaking world, are professionals (Engineers and the like), business people and government officials. Either of those words does not come up in normal conversation. But recently I did have one contact with this word. It was through a round about email concerning another subject, but an individual who is teaching English somewhere in the Pearl River Delta area (I am not sure whether it was Hong Kong, Shenzhen, Guangzhou, or some other there abouts) put for the word ¿á, coming forth from his students. It appeared to me that either in his mind or in the mind of his students that ¿á was much closer to the English use than what you have described. If that is accurate, then there are two questions that come to mind: 1) do you have too narrow of a definition of its usuage, and 2) is there a regional difference in the usuage of ¿á ?
I would support using ºÚ¿Í over º¦¿Í, since the former describes the mysterious and underground nature of that profession while the latter only calls them pesty. And the complication factor I was worrying about would be even more pronounced in the latter.
For a look at when “hacker” was just entering mainstream Chinese, check out the novel ¡¶ÊÀ½çÄ©ÈÕ¡·, an apocalyptic thriller from the early nineties. The protagonist muses on a few different versions; he likes “º£¿Í”, since it captures the unknown origins of a visitor, and still has a whiff of the dark side with its connections to º£µÁ. Apparently at the time there was no non-English term in Japanese, either–are there non-phonetic-translations in other languages?
My favorite appropriated English is “Сcase”, which for the longest time I thought was “Сkiss”, and although I knew what people meant, I couldn’t imagine how the expression got the meaning it has.
OK, let me lay it out one more time. To be honest, I didn’t think everything completely through as I was replying to most of those comments; I just wrote whatever came to mind at the time. If what I write below contradicts something I said above, it’s because I hadn’t thought it through enough before.
¿á is a loanword. It hasn’t been used in Chinese as a single character in recent history until the influence of the English word “cool”.
¿á has a more limited range in Chinese than the English “cool”. This is probably due to the fact that it is a young word (as Gin said).
In my view, the Chinese word ¿á is influenced by the original uses of the character ¿á. But that could also be attributed to literal interpretation of the English word “cool” or of adopting the earliest definitions of the English word “cool”.
As for your final two questions, 1) I don’t know, and 2) I don’t know.
Your analysis is pretty decent. If I jerked your chain, I apologize; although jerking chains is not all that bad. But what I find remarkable is so many postings on an item concerning language. Rather remarkable and rather interesting.
Speaking of simplification in English, for those who have not set foot on US soil for a while, have you heard of the abbreviation BOGO?
To talk more under this post when I have already talked too much. I would like to add that there are other important driving forces for the increase of popularity of Putonghua in addition to technologies: not the least are transportation and education. The China of yesteryears was not mobile at all given the conservative culture and terribly unsmooth land. Today Shanghai’s and Canton’s workforce is from everywhere. When one in every 3 households employ an Ayi or nanny from far-away provinces, the power base for Shanghainese is weakened at the grass-roots. The advancement of education transforms Putonghua’s role in a greater degree than advertised. When I was in elementary and high school in my mid-sized home city in the not-so-distant past, teachers who spoke down-to-the-earth local dialect or “vinegarized Putonghua (´×ÁïÆÕͨ»°)” counts for the majority. In contrast, kids born after 1980 likely could never have spoken a word of their local dialect in his/her life. If linguists are worried about distinction of some dialects, they should be and they better do some perservation work now.
Similar to Putonghau’s winning over local languages due to modernization in China, we all know the globaliztion trend is also promoting English as an “international language.” CNN, Yahoo, Sina, Google, the airlines, the schools are all contributing to this. Look, even Pre-K is being taught by high-salaried, high-nosed Johns and Waynes, who are certainly contributing their share.
For more on cool vs. ku, see Time magazine November 1, Asian edition.
Thanks for the tip, but I didn’t find such an article anywhere on Time Asia for Nov. 1st. Unfortunately, searching for it is kind of difficult because I can only access Time via proxy. If anyone else wants to post the correct link, it would be appreciated.
Anyway, language change will keep marching on as long as children keep learning language, right? Not much you can do but enjoy the ride.
Also, If anyone knows anything about Hangzhouhua, would you drop me a line? I am studying abroad there next semester and hope to do a project on how well Putonghua has done entering into dialectical areas. The thing is, apparently Hangzhouhua is actually a kind of guanyu (Mandarin) from back when the Song moved their capital there, even though it’s surrounded on all sides by Wu dialect.
Then came the “purification” of Chinese language (meaning: importation of Japanese words with Chinese pronunciation) after 1920’s.
Note in particular the third example. Is the word “high” describing Rojam (a popular Shanghai disco)? Rojam is a place, not a person. So high as a condition that a person reaches using drugs is probably not what is being meant here.
In addition to the use of English words there is also the use of acronyms and abbreviations such as KTV and DVD. A popular one in Taiwan that is not even really used in English is DM which stands for “direct marketing” and refers to advertising leaflets. | 2019-04-19T23:29:04Z | https://www.sinosplice.com/life/archives/2004/11/02/to-hanzify-or-not-to-hanzify |
The much-anticipated Hezbollah International Financing Prevention Act of 2014 has made it out of committee, as expected. There are believed to be over 300 co-sponsors of the bill, in the House and Senate, and the bill should become law, on the fast-track, sooner, rather than later.
The provisions of the Act allow the Secretary of the Treasury to deny access, to US financial markets, of any foreign financial institution that facilitates Hezbollah's terrorist financing program. In the Western Hemisphere. Hezbollah Latin America launders its narcotics and arms trafficking profits through Venezuelan banks, and on into Panamanian financial institutions, from where it is transferred to Hezbollah-controlled accounts in the Middle East and Central Asia.
This means financial institutions in North America and Europe, whose customers are engaged in trade and commerce in Venezuela and Panama, should adjust their risk levels accordingly, for a ruling by Treasury, to the effect that a specific bank is working with Hezbollah, and is therefore blocked from the US financial structure, could be costly, not only to your clients, who may have receivables outstanding, but your bank itself could sustain a major monetary loss.
It may be prudent, at this time, to review the scope of your exposure, especially regarding Venezuela, whose banks are most likely to be sanctioned first, without any prior warning, and to take immediate action to reduce risk to the lowest possible level.
If you have been reading how outgoing Panamanian President Ricardo Martinelli has signed two dozen eleventh-hour pardons for corrupt government officials, lawyer-PEPs, known career criminals, as well as for over forty police officers who used excessive and lethal force on demonstrators, rest assured that all those pardons are presently on hold. The legislature must approve them, and all indications are that they will not be validated.
The outgoing ministers, who have been implicated in the insider trading scandal involving Financial Pacific, may have to face justice in Panama after all, as their pardons will not survive. That is, if the US or Canada don't charge them first, for many of the victims were American and Canadian nationals.
Incoming President Varela, who is about to take office, has stated that Martinelli's pardons will not stand. Martinelli did manage to get approval, through, for thirty bodyguards for himself, and an additional dozen for his family. We wonder what he is afraid of ?
Russell Adler, the A in Rothstein Rosenfeldt Adler, Scott Rothstein's law firm, where Rothstein perpetrated a billion-dollar Ponzi scheme, has been sentenced to two and one-half years in Federal Prison, for his role in making illegal campaign contributions, to presidential and senatorial election candidates, intended to influence and curry favor among elected government officials. He must also serve two years of Supervised Release, after he has completed his prison term.
Adler, who was not charged with any direct involvement in Rothstein's investment scheme, which sold interests in ficticious court settlements, pled guilty to Federal Election Campaign Law violations. On June 19, 2014, the Supreme Court of Florida disbarred Adler, who had been engaged in the practice of law in Florida for more than 25 years. He reportedly owes more than $400,000, in Federal taxes. He recently asked the Court to impose a non-custodial sentence in this case, asserting that his involvement was an isolated, aberrant event, in an otherwise outstanding law career, but the Court, at sentencing, reportedly questioned how he could not know about the Ponzi scheme operating at his firm, where counterfeit court documents were prepared, and bogus financial statements were created.
A note to any unindicted participants on the Rothstein Ponzi scheme; at the sentencing, the prosecutor reportedly mentioned that there will be more defendants named.
Compliance officers conducting due diligence investigations on potential bank clients generally pas over innocuous Internet information, such as social media, or client-created content, but they do stop and review information from third parties. This so-called positive content may be as bogus as the client's cover story about what he really does for a living, namely financial crime or narcotics trafficking.
Anytime your Internet research lands upon what appears to be something positive that your target has done, check carefully, for the site may just have been cleverly presented to give you the impression that a third party has posted it. In truth and in fact, the positive information about your target may have been posted by a reputation restoration firm, cleaning up their client's dirty image. You may have to read between the lines, though.
For example, for those readers who have been following my stories about the escapades of the convicted fugitive Dutch white-collar criminal, Okke Ornstein, you will see, if you Google him, that he claims to be an award-winning journalist in Europe. A closer examination, however shows that a business associate of his merely recommended him for the honor, and there's no evidence that it was ever awarded, because it was not. These tactics, by reputation restoration firms trying to clean up their customers' lives online, also include blatant false information, which appears to be legitimate, because it was posted by a third party, or organization, but actually was a clever invention, with no factual basis.
Always verify anything you read on the Internet, through a trusted source; this may mean contacting legitimate information outlets via telephone or email, but it may be the only way that you can learn that the good items online are fabrications.
AVOIDING THE REPUTATION RESTORATION MINEFIELD IN KYC INVESTIGATIONS* .
More details are available in the article I have posted to this blog on June 18, 2014, which can be seen by accessing the link below**.
The attorney for Russell Adler, the law partner of convicted billion-dollar Ponzi schemer, Scott Rothstein, has asked for probation and/or home confinement (house arrest) for his client, who entered a guilty plea to Federal Election Campaign Law violations, in US District Court in Fort Lauderdale*. Attorney Adler fronted for a significant amount of illegal contributions, to both US Presidential, and Florida Gubernatorial, campaigns.
(1) That his crimes constituted aberrant behaviour, in an otherwise completely law-abiding life.
(2) That he has a severe medical condition, namely diabetes.
(3) That, if not confined in prison, he can make restitution payments to the victims of the Ponzi scheme.
(4) That he pled guilty to a non-violent crime, and that he is not a danger to the community.
(A) This was a $1.2bn Ponzi scheme, and the principal actor received a 50-year sentence.
(B) Attorneys, as professionals in whom the system places a great deal of trust, are held to a higher standard of care than other defendants.
(C) The Court has sentenced a number of minor participants in this Ponzi scheme to prison terms, including attorneys, and even sent them directly to be incarcerated, after sentencing, without giving them time to get their affairs in order. This demonstrates that the Court is exercising a firm hand, and seeking to deter others who might be tempted.
(D) The defendant sought to game the political system, for his partner, through campaign contributions, which may have prolonged the Ponzi.
(E) The defendant enjoyed an extremely affluent standard of living as the direct result of the Ponzi scheme.
It is humbly suggested that he serve a portion of his sentence at a halfway house, provided that he is eligible, and that there is room for him, but he should not get a pass on incarceration.
* Case No.: 14-cr-60050-JIC (SD FL).
** Adler has filed objections which, if adopted, would reduce his guidelines range to 24-30 months.
The trial judge in Richard Chichakli's criminal case, in US District Court in New York, conducted a competency hearing on June 24. The defendant's appointed counsel had expressed to the Court his concerns about Chichakli's ability to assist his lawyer, and a medical professional had examined him, and rendered a report, which has not been made public, due to privacy laws. Chichakli insisted on representing himself at trial, though he has no legal training or experience, and as an experienced accountant was surely well aware of the pitfalls of acting as his own attorney, in Federal Court, but whether he is competent to proceed has become an issue.
The Court's decision will affect all subsequent proceedings. The defendant has already been convicted of OFAC sanctions violations; he has not yet been sentenced, due to a flurry of post-trial motions that he has filed since his trial. The Court has laid down a briefing schedule for both sides, during the month of July, regarding his motion for a new trial, but there are numerous other motions which require disposition, and there has not been any ruling upon any of them.
Court observers of the Viktor Bout and Richard Chichakli cases, especially those who have anticipated that one or both of the defendants would reveal the extent of their association with the American intelligence community, and participation in operations whose exposure might be viewed unfavorably in the court of world opinion, are watching the Chichakli case closely.
President Ricardo Martinelli, according to reliable Panamanian sources, intends to pardon all the ministers in his government who have made illegal stock profits in the Financial Pacific insider trading incident. It is rumored that he will make the announcement this Friday; Martinelli himself reportedly also participated in taking huge profits, regarding the Petaquilla Mine, based upon inside information not available to the investing public.
The Supreme Court of Justice, Panama's highest court, has the power to set aside a presidential pardon, and it has done so in the past where warranted. Incoming President Varela, who was elected this year on a reform platform, could choose to prosecute the ministers implicated in the scandal, and petition the Court, so don't think that the guilty parties will escape prosecution.
The victims include American, Canadian & European investors; whether American or Canadian securities regulators will bring civil or criminal charges, in their respective countries is not known. A number of the ministers have had their US visas revoked, but still enjoy the ability to enter Canada, where they have reportedly invested millions of dollars. If you have not read my recent article on their investment there, you can access it here*.
Compliance officers at Miami-area banks whose customers trade with Venezuela will shortly have a new sanctions risk to deal with: The Venezuelan Ministry of Foreign Affairs announced* yesterday that its has granted permission for the Democratic Peoples' Republic of Korea, more commonly known as North Korea, to open an embassy in Caracas.
The financial crime and sanctions consequences of a North Korean diplomatic mission in Venezuela cannot be assessed at this time, but the possible impact could be serious. North Korea, which labors under severe US and international sanctions, is known to use its embassies and consulates to move counterfeit money, sell narcotics and counterfeit prescription drugs, and evade sanctions. This embassy could serve as a window through which North Korea could covertly access the US financial structure, with Miami first on the list.
How can a Miami bank be sure that the Venezuelan company purchasing goods or services from its customer is not fronting for a North Korean purchasing agent ? The opening of the embassy increases the risk that US nationals, and corporate entities, could later be subject to regulatory fines and penalties, for unwittingly trading with North Korea, especially when they do not now operate an effective compliance department, as many American import-export companies sadly do not have.
Again US banks must raise the risk levels for dealing with Venezuelan customers.
* Published in Official Gazette No. 40.438 .
If you weren't watching all the tumult in northern Iraq this week, you may not have noticed that President Barzani, of the Kurdistan Regional Government, has bluntly stated that the time is ripe for the autonomous Kurdish Region to go its own way, meaning become independent of the Central Government of Iraq, as a sovereign nation.
While that is a positive development amid the otherwise deteriorating situation in Iraq, it could also upset those Iranian individuals, and companies, who prefer that their large accounts in Kurdish banks not be required, by newly-appointed regulators or compliance officers, to be identified as Iranian, or to prove legitimate Source of Funds, or the identities of Beneficial Owners. While the present autonomy of the region has fostered a total lack of AML/CFT and sanctions compliance regarding Iran, this could rapidly change with independence. Money launderers prefer to move endangered funds long before they are at risk.
Therefore, should your compliance staff notice any large transfers, coming from financial institutions in the KRG, or originating from there, and passing through one or more intermediary banks, you might want to institute enhanced due diligence procedures, on the funds, the remitter, and the recipient. The last thing you want in 2014 is to be nailed for Iran sanctions evasion activity, and Iranian commerce with the KRG, and the fact that Iranian funds transfer into and through Erbil, into your bank, is a real possibility.
The Second Circuit Court of Appeals has published a redacted version of the "Memorandum for the Attorney General," dated July 16, 2010, which details the legal authorities that were relied upon in the drone killing of of Anwar Al-Aulaqi, a terrorist who was an American citizen. It was released in the case styled New York Times, et al v. Department of Justice, Department of Defense, and the Central Intelligence Agency, Case No.: 13-422 (2nd Cir. 2014), as an appendix to an Opinion, in a Freedom of Information Act case seeking release of the Memorandum, which was a classified document in its original form.
The subject of the Memorandum, which contains extensive citations to authority, and presents its arguments in the manner of a law review article, is: Applicability of Federal Criminal Laws and the Constitution to Contemplated Lethal Operations Against Shaykh Anwar Al-Aulaqi. Its author, who has recently been appointed to a Federal judgeship, has presented a scholarly analysis, with footnotes, of all relevant case law, and has concluded that sufficient authority exists for attacks upon American nationals who pose a terrorist threat to US citizens.
Readers who wish to review the lengthy Memorandum, can find it here.* Please note that it appears after the pleading, starting on what would be page 67 of the document. The blank segments are portions said to be redacted on national security, or intelligence, grounds.
Buffalo, New York-based M & T Bank, has been ordered by a Federal Judge to forfeit $560,000, representing the amount of drug profits reportedly laundered through one of the bank's Maryland branches. Additionally, approval of a proposed purchase of a New Jersey savings & loan has been delayed. Reports in local media state that the bank has incurred $60m in new costs, for compliance staff and AML programs.
(1) One month of incarceration.
(2) Eight months of home confinement (house arrest).
(3) Two years of Supervised Release, the Federal system's post-prison supervision program.
(4) Forfeiture of $5000, the approximate amount of money that she was paid by a representative of the traffickers.
The money laundering charges brought against her were dropped, and she was allowed to plead to a single count of Failure to File Currency Transaction Reports (CTR). I fully understand that she was cooperating with law enforcement, as several of the pleading in the court file are sealed, and unavailable to the public, but as the head teller, she should be held to a higher standard than a minor bank employee.
While there may be mitigating circumstances here, Her sentence sends the wrong message to the financial community: that, if caught, you will only suffer a minor inconvenience, provided that you cooperate with the authorities. Future prospective employers, when seeing what she pled guilty to, may very well dismiss the seriousness of the case as simple negligence, especially after the passage of time. Please, let the punishment fit the crime.
If you are following the progress, through Congress, of the Hezbollah International Financing Prevention Act of 2014*, you know that it has sufficient traction for swift passage. The bill, which details the sordid activities of the Specially Designated Global Terrorist organization, from the bombing of the US Marine barracks in Lebanon, to its military support for the dictatorial Syrian regime, has real teeth, and could prove fatal for those Venezuelan financial institutions that have been assisting it in terrorist financing.
"(A) Knowingly facilitates the activities of Hezbollah, including its agents, instrumentalities, affiliates, or successors.;"
"(B) Knowingly facilitates the activities of a person acting on behalf of, or at the direction of, a person described in subparagraph (A);"
"(C) Knowingly engages in money laundering to carry out an activity described in subparagraph (A) or (B);"
"(D) Knowingly facilitates a significant transaction or transactions that provide significant financial services, to carry out an activity described in (A), (B) or (C)..."
Considering that a number of Venezuelan banks, both in Caracas, and in their overseas activities, notably in Panama, have been engaged in providing material assistance to Hezbollah, in the repatriation of drug profits back to its Middle East headquarters, this new law will give Treasury the discretionary ability to shut out those banks from the American financial system. Such a move would, in essence, be fatal to their operations, as their clients would, en masse, flee the banks for those who could still maintain correspondent relationships with US banks.
Therefore, in an overabundance of caution, compliance officers at American banks, and NBFIs, that have any financial exposure, outstanding indebtedness, extension of major credit, or investments in Venezuela, should review their potential exposure, with an eye to reducing it, for risk management purposes. One can only imagine the consequences, should one of your Venezuelan correspondents be so designated, given ongoing transactions, funds outstanding, and pending international transactions.
There is a potential for major losses here, so exercise prudent risk management, and examine your current situation, regarding both Venezuelan banks, and Venezuelan customers, as any US-imposed restrictions will certainly interfere with your bank clients' ability to cover their obligations to American financial institutions.
Richard Chichakli, in yet another Pro Se post-trial filing, has moved to vacate the judgment entered by the Court after the jury verdict, pursuant to Rule 33(b)(1), F.R. Crim. P., and has requested a new trial, based upon what he labels as newly-discovered evidence. he alleges that government witness Henry Gayer, who was an officer at the Miami aviation firm where Chichakli attempted to purchase an aircraft, committed perjury.
(1) The defendant asserts that the government witness, Gayer, perjured himself in his trial testimony.
(2) That his testimony hurt the defendant.
(3) That the testimony was material in obtaining a conviction.
Chichakli says that Gayer lied, when he stated under oath that he did not know about the defendant's OFAC status, which precludes business transactions with US persons, and that the Government knew that he was lying. The defendant states that the trial contains admissions by Gayer, to the effect that he knew about Chichakli's SDN status, and was aware of the blocking order against the defendant.
According to Chichakli, the Government was complacent with the lies, in order to sway the jury into convicting him, using false testimony. Therefore, he argues, he was wrongfully convicted. There are a number of pending motions, most filed post-trial, and most filed by the Defendant.
Where newly-discovered evidence is alleged, the defendant in a federal criminal case has, pursuant to the rule, three (3) years after entry of the verdict to move for a new trial. Whether the contrary trial testimony constitutes newly-discovered evidence will be determined by the Court, but if there is an adverse ruling, the motion will probably be dismissed, as any other grounds for a new trial must be filed within fourteen days after the verdict, according to Rule 33(b)(2).
* United States vs. Bout, et al, Case No.: 09-cr-01002-WHP (SD NY).
As promised, I have created an interactive Webinar to discuss the methods that I employ to cut through the Internet trash created by reputation damage control firms. You can find the details below. Participating with me on the presentation is my good friend, Robert Goldfinger, who will explain some of the more technical issues, as well as our solutions. The Webinar is complimentary.
Due diligence and enhanced due diligence investigators.
Compliance officers and BSA/AML officers.
Individuals responsible for SAR filing.
Audit and Risk Management Specialists.
o When disinformation runs rampant on the Internet, can you perform due diligence ?
o Are there techniques and methods to cut through the glut of internet fluff, and identify your target ?
o Can technology aid you in evading material generated by reputation damage control firms ?
o Do you discard the off-the-shelf resources that are no longer effective, and what do you replace them with ?
o What are the most efficient ways to utilize negative news for due diligence and compliance ?
Working as a securities regulator in the Republic of Panama can be hazardous to your health. An attempt was made this week, upon the life of Gustavo Gordon, an investigator with the Superintendent of Securities in Panama. he was stabbed three times, but survived, and is presently in hospital, recovering from his wounds.
Sr. Gordon was, at the time of the attack, en route to the office of Financial Pacific, the investment firm alleged to have facilitated millions of dollars in illegal insider trading profits, reportedly taken by outgoing President Ricardo Martinelli, and several of his ministers; Gordon was investigating the case. The role played by the American broker, Gary Lundgren, who is closely linked to President Martinelli, is reportedly part of the investigation.
everyone involved in the case has been targeted. The Superintendent of Securities, Alejandro Abood, resigned after receiving 40 death threats at his home. Another government regulator investigating the case, attorney Vernon Ramos López, is missing and presumed dead. The attack upon Gordon took place in a park near the former offices of Financial Pacific, where he was expected to continue to examine the company's books and records, as the lead investigator in the case.
The case has drawn attention from international human rights groups, as the whistle blower, Maytee Pelegrini, a former financial pacific employee who is being held incommunicado by the authorities, without being allowed to met with her attorneys, or the media, has alleged that the government is engaged in a massive cover-up of the facts, due to the involvement of so many senior government officials. Many Panama observers are awaiting the arrival of the country's newly-elected president, Varela, who is a reformer, to see whether there will be criminal charges filed.
Here's another reason why bankers must, for their own protection, be able to identify a potential Ponzi scheme early one: Insurance companies will assert that you were a part of the scam, and decline coverage for your losses.
In a case now pending in US District Court in Florida, a hedge fund that participated in Scott Rothstein's bogus investment scheme, which was actually a billion-dollar Ponzi scheme, sought to recover its losses from its insuror. The company denied coverage, alleging that the hedge fund had cut corner when it came to actually verifying the existence of the out-of-court settlements that were the basis for the investments, as well as failing to confirm funds allegedly on deposit in trust accounts.
What obviously happened here was that the hedge fund, earning obscenely high "returns" routinely signed off on the due diligence that it was required to perform, without doing it. Now the insuror is using the hedge fund's negligence to deny payment. Translate that to a bank-customer situation, and understand that a client relationship officer, elated with high cash flow from a client, will take shortcuts when it comes to compliance. When the Ponzi scheme implodes, the bank could be left with a huge loss. All bank officers should receive extensive training in the red flags of Ponzi scheme activity.
The United States Supreme Court has declined to hear Argentina's appeal of a lower court decision that required that South American nation to honor outstanding Sovereign bonds that the country defaulted upon a decade ago, ahead of any other government debt. The holders of these bonds, who had refused to accept severely discounted debt in exchange, are seeking payment, and pursuing Argentina's global assets.
For political as well as fiscal reasons, Argentina has sought to evade its obligations, and if it ends up paying out $15bn to these creditors, or alternatively, it defaults, the net results will not be good for the Argentinian economy, rate of unofficial international exchange of its currency with the dollar, and fears in the international financial community over receiving full payment on future indebtedness issued by the country. Under the circumstances, and considering the knock-on effect of this decision, it is prudent to raise County Risk on Argentina at this time.
The Iraqi Ministry of Communications has advised that it will be blocking access to Facebook, Twitter and YouTube, ostensibly to prevent the ISIL from communicating with its followers. The problem is, for compliance officers who need to conduct KYC on Iraqi nationals seeking to open accounts with them, any interference with social networking sites in Iraq may result in the inability to access potential negative information, or obtain verification of information proffered by the client.
Given that a number of banks in northern Iraq have reportedly been looted by the ISIL, a large swath of Iraqi territory is now under control of that terrorist organization, and the country fears an invasion of its capital, you may see an influx of wealthy Iraqis, bearing "flight capital" in US Dollars, but it is imperative that you positively confirm their Source of Funds, prior to account opening. This may prove to be impossible at this time, requiring you to decline the business. Remember, there are a lot of dirty dollars still hiding in Iraq, stolen from the US Government reconstruction program, from illicit war profiteering, bribes and kickbacks, and other illegal acts.
In the present climate of civil litigation against bankers, those who allow AML or CFT deficiencies that result in regulatory action, and who are failing to maintain an effective and robust compliance program at their bank, are at risk. I have seen seven major civil law firms posting news releases this week, seeking to contact existing shareholders of The Bancorp Inc., the bank holding company of Bancorp Bank. Readers who have not yet read my recent article about regulatory action against the bank can find it here; it was posted on June 11. Scroll down to access it, or click on the link on the lower right-hand corner of this blog, where the titles of prior articles appear as hyperlinks. It is fifth from the top.
The value of the bank's stock continues to fall, increasing the measure of damages for the potential plaintiffs. Securities consultants have retreated from their pre-Consent Order recommendations for investors to purchase Bancorp stock, which may cause even further decline in the stock's market price.
Reports from individuals with personal knowledge indicate that the Customer Identification program at Bancorp Bank did not meet the generally accepted standards of banking best practices, and in many instances, not even the full names of customers were not obtained at account opening, which may indicate that there was compliance malpractice. The utter arrogance of any bankers who do not believe they must properly identify their customers amazes me in the post 9/11 environment. If you are contacted by any former Bancorp compliance staff seeking employment at your bank in the future, please show them the door.
Which bank officers and directors are to be named as parties defendant is not known, but senior bank management are generally the usual targets of such litigation, as well as those in command of the compliance program. A Bancorp press release claims that it has already implemented "multiple upgrades", and hired a "qualified" BSA/AML officer, but one certainly wonders whether these statements are merely for public relations purposes, and whether there is any factual basis for them.
The trial judge in Richard Chichakli's Federal criminal case has scheduled a competency hearing for June 24, in the US District Court in Manhattan. He has been examined by a qualified medical professional, and a report filed, though not publicly available. Apparently there was also some issue about the examiner, regarding what connection he had to defense counsel, Mr. Dinnerstein, but that does not appear to be improper, as counsel's prior contacts with the individual were fully disclosed to the Court in a letter, which is in the court file.
It may be important to note that the Court has not yet made a ruling upon any of the defendant's post-trial motions, including a motion for a new trial. Until those motions are disposed of, Chichakli cannot be sentenced.
It is probable that any determination or finding, by the Court, that the defendant is not competent, either to assist in his own defense, or on a broader basis, will again raise the issue of whether the Government does not want certain information, detailing certain activities of Viktor Bout and Richard Chichakli, on behalf of the the shadowy American intelligence community, to be publicly disclosed at a retrial of this case.
Was Chichakli working covertly for the United States while under OFAC sanctions ? It is assumed that much of this information is classified, but that which is not, if made known to the Court, could possitively affect a jury's impression of this defendant, and perhaps even affect the Court's assessment, favorably, for the purposes of sentencing. Is that why he has tried so hard to get in into the record ?
Readers of this blog have been writing and asking about the status of this case, so we are providing an update.The June sentencing of the owner of Mutual Benefits Corp., the life settlement firm that was a $1.2bn Ponzi scheme, has been reset to July 18th at 9 AM. Counsel for Joel Steinger had requested a delay, to allow him to properly prepare for the hearing, to which the Court has now assigned two hours.
Given the ten year sentence recently meted out to the former Mutual Benefits trustee, Fort Lauderdale attorney Anthony Livoti, many court observers believe that Mr. Steinger will receive a life sentence, rather than the 50-year sentence some have calculated that he will get, because the length of the sentence given to Livoti was twice what was expected. Given that Mutual Benefits was reportedly the largest life settlement operating in the United States, and investors sustained huge losses, the sentences of those involved have been lengthy. We will update you when more information becomes available.
Stuart Rosenfeldt, a name partner in Fort Lauderdale Ponzi schemer Scott Rothstein's law firm, entered a plea of guilty this week, to a number of charges, in a US District Court in Florida. Rosenfeldt admitted that he engaged in bank fraud to maintain the ongoing Ponzi scheme, that he broke Federal campaign contribution laws, and that he violated the rights of individuals, to preserve the secrecy surrounding an affair that he has been having.
The defendant faces a maximum of five years in Federal Prison. Sentencing has been set for September 24, and he remains free on bond.
If you have been following the news from Iraq this week, you know that the Islamic terrorist group, ISIS has seized billions of Iraqi Dinars, in Mosul, at a facility of the Central Bank, and then raided all the private banks in the city, stealing a large amount of cash and gold bullion.
Twenty months ago, I warned my readers that Country Risk levels for Iraq had reached the level where all financial exposure and investment there should be terminated. Now, with the terrorists closing in on the capital, I am hoping that everyone took that advice to heart, and is no longer exposed there.
The United States has announced plans to evacuate the American Embassy, if necessary. Is this Saigon 1975 revisited ?
Delaware-based Bancorp Bank, one of the largest issuers of prepaid cards, has stipulated to the entry of a Consent Order, reportedly due to fatal weaknesses in the bank's BSA compliance program. Its holding company, The Bancorp. Inc., in an 8-K filing with the Securities & Exchange Commission, has disclosed that the Order, based upon a stipulation, became effective on June 5, 2014; the value of its parent's stock immediately declined 28%.
A Pennsylvania law firm is notifying investors in the bank's securities to join in a proposed class action civil suit against the bank holding company, the stated grounds being the BSA deficiencies.
(1) Appoint a qualified BSA/OFAC officer.
(2) Revise its written BSA Compliance Program, and develop additional procedures for monitoring and reporting suspicious transactions.
(3) Perform a look-back into previous account activity.
(5) Adopt an independent testing program, to insure adherence to better BSA standards.
(7) Augment Board of Directors oversight on BSA activities.
(A) Sign or onboard new independent sales organizations.
(B) Issuing any new non-benefit related reloadable prepaid card programs.
(C) Originating any ACH transactions new merchant-related payments.
These are, in essence, total restrictions upon the bank's ability to expand its book of business, until it gets it right on compliance issues. One can only hope that the bank's leadership gets the message, because in the current law enforcement climate, they may be at risk, individually, for indictments down the road, if they fail to meaningfully raise the level of AML compliance to banking best practices, and get caught with their proverbial pants down again.
WHY WERE VIDEO CAMERAS IN RICHARD CHICHACKLI'S FEDERAL CRIMINAL TRIAL ?
Just when you thought that Richard Chichakli had completely exhausted all possible grounds for a new trial, he drops a bomb. In a letter to the Court*, dated May 31, 2014, the defendant inquires about the unusual presence of video cameras in the courtroom during the trial. He claims, for the first time, that the presence of a camera in the courtroom seriously distracted him, and was prejudicial at his trial.
Media photography, both still and video, is prohibited by law in the Federal Court system, in the trial courts. A pilot program, a couple of years ago, was strictly limited to a small number of Districts, in civil cases only, and it has expired.
(1) On whose authority was the video recording camera installed ?
(2) For what purpose was the video recording installed, and for whose benefit was the recording made ?
(3) Why was the camera only pointing at the defendant, and not to the other courtroom participants ?
(4) Who is using, or used, the recording ?
Finally, the defendant demanded a copy of the recording.
(A) The video equipment was sitting in that courtroom for another case, to provide a closed-circuit live feed for a case where there was great public interest, ACLU vs. Clapper, and an overflow courtroom was available to accommodate them. The trial judge has the authority to order this type of arrangement, for the purpose of public access to the courts.
(B) There was no recording made of the Chichakli trial. In any event, the video unit does not record proceedings; no tape are made of proceedings making use of live video feed. There was no recording of the Chichakli case, or any other case, in that courtroom.
(C) The camera was pointed at the podium, where counsel in the other case were making oral arguments. (Remember, Chichakli, being Pro Se, was at that podium during his trial).
Thus, no Federal laws and rules of procedure were broken, regarding unauthorized recording of a Federal criminal trial.
The Court's ruling: Chichakli's argument, that he has suffered prejudice, was frivolous.
* Case No.: 09-cr-1002-WHP (SDNY).
WILL OWNER OF LIFE SETTLEMENT PONZI SCHEME FIRM GET A LIFE SENTENCE WITHOUT PAROLE ?
Joel Steinger, the owner and behind-the-scenes CEO* of the defunct Billion-dollar Ponzi scheme, Mutual Benefits Corp., has, through his counsel of record, asked for a delay in his sentencing. His attorney, in a motion filed in US District Court, in a filing, has disclosed that Steinger's suggested sentence, as computed under the US Sentencing Guidelines, is life in prison. With the abolition of Parole in 1987, a life sentence is exactly that; no release is permitted prior to death in custody, as there is no provision for Gain Time for a life sentence.
Perhaps as a means to suggest an alternative sentence to the Court, the attorney has also stated that the statutory maximum sentence available is fifty (50) years, which also amounts to life in prison, as Mr. Steinger, due to his present age, would pass on before he was eligible for release. Either way, the outcome is the same. Is this a Draconian sentence, given the damage done to the victims, many of whom lost their life savings ? You be the judge.
One of the reasons that counsel wants a delay is to obtain information on Substantial Assistance that Mr. Steinger reportedly rendered to the US Attorney in Fort Lauderdale. Apparently, the primary source of this favorable information is working outside the United States, and not in communication with counsel. He is obviously looking to soften the blow at sentencing. The US Attorney has not filed a request for a Downward Departure, due to the rendering of Substantial Assistance, so whether this ploy will be effective is doubtful, but counsel has the obligation to zealously represent his client, even though he has been reviled by his many victims.
The June 6 sentencing data previously scheduled has come and gone, but without a ruling on a new date. Will will advise our readers as soon as any new information is publicly available.
* Peter Lombardi, who served as the official company head, as Steinger's criminal convictions, and regulatory rulings made him ineligible to serve, was sentenced to 20 years, but his sentence was later reduced to 80 months. He will be released next month, after having served less than seven years in Federal Prison.
HOW MANY MONEY LAUNDERERS UNDER THE MICROSCOPE ARE PARKING THEIR DRUG CASH IN FREE ZONES ?
Most businessmen engaged in international trade are familiar with the benefits of free zones, arrival destinations where goods not yet sold can be parked, free of customs duties, by their owners. These free zone facilities have, of late, acquired a new class of clientele: high net-worth individuals who store their rare art and antiques, classic automobiles, and other top-drawer possessions there, indefinitely. Geneva, Singapore and Luxembourg are all potential recipients of these personal property items, in their respective free trade zones. Why is this troubling from the a financial crime perspective ?
If I am a money launderer for a drug trafficking enterprise, and I find that myself or my clients are under the law enforcement microscope, I may consider parking my clients' drug cash in a free zone warehouse for a period of time, until the law enforcement agency investigating me scales back its inquires, due to a lack of evidence of ongoing bulk cash smuggling or money laundering.
Of course, I would choose to disguise my cash, as a valuable art or stamp collection, or antiques, while all the time concealing the money inside worthless items that I am claiming is a priceless accumulation of value. Alternatively, I might actually purchase that Old Master, and store it for a number of years, with art listed an only pieces of lesser value, purchases for long-term appreciation. Remember well, in the world of money laundering, you are only limited by your imagination.
As the use of free zones, for storage of prized items, rather than in-transit goods, becomes more common, expect to see financial criminals hide their profits there, effectively withdrawing them from circulation, and effectively preventing them from being seized and forfeited by law enforcement agencies, who are looking in the financial world for the money.
WILL MIAMI'S ROLE AS A MONEY LAUNDERER'S TRANSIT HUB INCREASE, DUE TO DIRECT ACCESS TO THE MIDDLE EAST ?
One of the things that career money launderers constantly look for, in the print media, is articles that detail the opening of new international airline routes. Why ? Because money laundering depends, in large part, upon the ability of its participants to funnel illicit funds over, and through international borders, both during the wash-dry-fold laundering cycle of placement-layering-integration, as well as subsequent investment of clean criminal capital.
Today's news, that the first non-stop service between Miami and the Arab countries of the Middle East, begins this afternoon, will certainly be noticed, for flights leaving the United States are rarely monitored, other than by the airlines that must insure that passenger have valid passports to travel. The ability to transport financial instruments, precious gems, or even bulk cash, directly into the financial centers of the Middle East, will eliminate the risks of changing planes in Europe.
Alternatively, legitimate financial transactions, albeit with laundered criminal profits, residing in lawyer's briefcases arriving at MIA from the Middle East, will be facilitated by the new service. Even if the arriving pasengers' bags & baggage are searched by CBP, documents are seldom examined or read, especially if they are in the possession of professionals.
While the new airline route will certainly facilitate the development of legitimate business between Florida and the Middle East, we need to be mindful of the potential financial crime consequences. Let us hope that the appropriate law enforcement agencies are reading this blog today, for I can guarantee you that their financial criminal adversaries already know about the new flights, and may have made reservations already. Has anyone looked at the passenger lists ?
The new Palestinian Unity Government, formed through a merger of Fatah and Hamas, may have been endorsed by both the EU and the US, but there are potential sanctions evasion dangers for any American entities who engage in any financial transactions with any agencies of the Palestinian Authority. Let me explain the problem.
Here's where it gets complicated: a former Palestinian negotiator, who has now broken his connection with the PA, has stated that the apolitical "technocrats" who are reportedly now operating the new combined government are indeed political, because the leadership of the PA has boated that they are lying to American representatives. The new government includes Hamas.
Note well that the Guidelines specifically warn about dealing with Hamas agents.
This raises the issue; are any of those technocrats in the new unity government Hamas ? If so, any US person, company or bank, who deals with them could be violating sanctions. My advice is that any American bank that is, in any way, involved in any financial transactions with anyone in the new Palestinian government, obtain absolute proof that their contact is NOT, now has he ever been, affiliated with Hamas. You might want to consider a sworn statement , such as an affidavit, but you want the notary not to be from the PA; I suggest some foreign NGO or other official from a European agency, just not any Palestinians, please, lest another Hamas agent notarize it.
Cleaning up their clients' negative information, be they articles about their arrests, reports of fraudulent conduct, judgments, victim complaints, or regulatory fines & penalties, is but one dirty job that reputation damage firms perform; they also create lies about their customers' adversaries on the Internet. This is done by swapping out the identity of individuals who actually are guilty of negative acts, and inserting the names of their customer's enemies, into each website.
The end result is striking; you read, in a wide variety of legitimate newspaper articles, some really disgusting and incriminating news about someone. The truth is, he never committed any of those crimes, but his name appears in the copy. Sometimes, if you read on, you find that the correct name of the offender later appears, but in some cases, the disinformation is complete.
I saw this technique when I wrote about the case of Michael Burnbaum*, the convicted former Miami lawyer who attempted to later practice criminal law in New York and New Jersey, and was subsequently disbarred in the State of Massachusetts, for failing to inform it of his cocaine trafficking record. He must have crossed someone in a big way, because pages of articles, showing Mr. Burnbaum as the defendant in a large number of criminal cases, which were not his, appeared on the web.
The use of such techniques obviously constitutes libel, but for compliance officers performing KYC, it presents a serious problem. What if your prospective bank customer denies that any of the material you found is true ? What will you do ? Do you have the time to search out the true identity of the guilty parties, or will you decline the customer, and lose his potential business, and risk the information later coming out, to your dismay ?
The bottom line: if its on the Internet, it may not only be false, it may be part of a well-orchestrated campaign to slander someone who is innocent. If there ever was a reason to stop using the Internet to perform KYC, this is it.
*Who Turned the Tables on Internet Polluter ?
PRIVATE BANKS FROM ANDORRA ARE QUIETLY OPERATING IN MIAMI: A PROBLEM ?
Even though I have been advocating for years that compliance officers be knowledgeable about all the operational tax havens in the world, I would wager than a number of those who work in Miami are not aware of the fact that The Principality of Andorra, according to a number of reports of regulatory and monitoring organizations, still does not meet international anti-money laundering standards. They may not even know that, though Catalan is the official language, French, Spanish and Portuguese are widely spoken.
Three banks from Andorra have, without publicity, opened, or bought into, financial service firms in Miami. Two of the companies advertise that they are involved in wealth management, and the third has designated itself a capital management firm. These companies are not branded, so as to inform the casual observer of their ownership by private banks in Andorra. On a risk management basis, I find this a cause for concern.
First of all, why Miami ? If these private banks were seeking to penetrate the American market, they would be focusing their attention in New York, or other major US cities where American investors work and live. The Miami offices are obviously targeting high net worth Latin American nationals, many of whom have ties in Miami, due to its proximity to Latin America and its large number of Spanish & Portuguese-speaking businessmen.
What troubles me is that money launderers with imagination could exploit the Miami-Andorra connection, as a possible vehicle to move criminal proceeds out of the Continental United States, or alternatively, to climb onto the pipeline of funds coming into America, to invest laundered drug profits in the US, through these Miami firms. Will American compliance officers drill down to learn who owns these companies ? I have my doubts.
Andorra, which advertises its ten per cent corporate income tax, actively seeks out non-resident businesses intending to operate in the EU, and domicile their company in Andorra. My concern is that Colombian, Mexican and Venezuelan drug trafficking organizations may find a way to clean and invest their US-based "flight capital" through these Miami-based Andorran financial service firms, and that some of it will also be coming into the United States, after having been sufficiently sanitized in Andorra, and given a new identity.
WILL VIKTOR BOUT EVER PLAY HIS TRUMP CARD ? | 2019-04-24T20:35:40Z | http://rijock.blogspot.com/2014/06/ |
(269) F. Nomura, T. Tanabe, Takeo Ohsaka, T. Gunji, F. Matsumoto, Optimization of Calcination Temperature in Preparation of a High Capacity Li-Rich Solid-Solution Li[Li Ni Co Mn ]O Material and Its Cathode Performance in Lithium Ion Battery, AIMES 2018, 2018.10.1-4, Cancun, Mexico.
(268) T. Tsuda, N. Ando, T. Tanabe, K. Itagaki, N. Soma, S. Nakamura, N. Hayashi, F. Matsumoto, Improvement of High Rate Performance of a Lithium Ion Battery Composed of Laminated LiFePO4 Cathodes/ Graphite Anodes with Porous Electrode Structure Fabricated with a Pico-Second Pulsed Laser, AIMES 2018, 2018.10.1-4, Cancun, Mexico.
(267) F. Ando, Toyokazu Tanabe, T. Gunji, S. Kaneko, T. Ohsaka, F. Matsumoto, An Electrochemical Dealloying of Ordered Intermetallic Platinum-Lead (PtPb) Nanoparticles Supported on TiO -Deposited Cup-Stacked Carbon Nanotube for Highly Efficient Catalysis Toward Oxygen Reduction Reaction in Acidic Media, AIMES 2018, 2018.10.1-4, Cancun, Mexico.
(266) 安藤風馬, Effect of the d-Band Center on the Oxygen Reduction Reaction Activity of Electrochemically Dealloyed Ordered Intermetallic Platinum−Lead (PtPb) Nanoparticles Supported on TiO2-Deposited Cup-Stacked Carbon Nanotubes The 28th Annual Meeting of MRS-J, 2018. 12. 19, 北九州国際会議場.
(265) 郡司貴雄,井澤 佑,松本 太,コア-シェル構造を有する電極触媒の創?とCO2 還元反応における選択性,表面技術協会第139回講演大会,2019.3.18-19, 神奈川大学.
(264) 横井健?,河合陽賢,林 遥介,松本 太,耐薬品性無電解Sn-Ni 合?の作製および評価,表面技術協会第139回講演大会,2019.3.18-19, 神奈川大学.
(263) 鈴?彗之,郡司貴雄,?坂武男,松本 太、AlCl3-EMIC イオン液体からのアルミニウム電気めっきにおける添加剤の効果(4) −添加剤の分?構造と光沢性の関係−,表面技術協会第139回講演大会,2019.3.18-19, 神奈川大学.
(262) 津?喬史,安東信雄,?原悠太,中村 奨,板垣 薫,杣 直彦,林 成実,郡司貴雄, ?坂武男,松本 太, ピコ秒レーザーを?いた三次元表?構造を有する?あき電極の作製及びリチウムイオン?次電池への適?,表面技術協会第139回講演大会,2019.3.18-19, 神奈川大学.
(261) 林 遥介,?品愛都,横井健?,河合陽賢,郡司貴雄,?坂武男,松本 太, ??触媒型無電解Ni-Sn めっき被膜の作製と耐薬品性の検討, 表面技術協会第139回講演大会,2019.3.18-19, 神奈川大学.
(260) 郡司 貴雄,難波 功洋,大坂 武男,松本 太,種々の助触媒を担持したTiO2光触媒のCO2還元反応における選択性, 電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(259) 郡司 貴雄,井澤 佑,大坂 武男,松本 太,CuxSny金属間化合物コア-Snシェル構造の合成と電気化学的CO2還元反応, 電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(258) 安藤 風馬,田邉 豊和,郡司 貴雄,金子 信悟,大坂 武男,松本 太,担持体および第二元素を用いたPt系金属間化合物ナノ粒子のPt d-バンドセンターのチューニングによるORR活性の向上に関する検討(4),電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(257) 野村 文洋,津田 喬史,田邊 豊和,金子 信吾,大阪 武男,松本 太,Li2MnO3-LiMO2 Li過剰系固溶体正極材料の合成における焼成条件と充放電容量およびサイクル安定性の関係,電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(256) 津田 喬史,安藤 信雄,石原 悠太,中村 奨,板垣 薫,杣 直彦,林 成実,郡司 貴雄,大坂 武男,松本 太,ピコ秒パルスレーザーを用いて作製された穴あき厚塗り塗工LiFePO4電極の出力特性及び充放電メカニズムの検討,電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(255) 渡邉 達也,津田 喬史,安藤 信雄,中村 奨,板垣 薫,杣 直彦,林 成実,郡司 貴雄,大坂 武男,松本 太,積層型穴あきグラファイト電極を用いたリチウムイオン電池における不可逆容量のキャンセルによる電池容量の向上,電気化学会第86回大会, 2019.3. 27-29 京都大学吉田キャンパス.
(254) Futoshi Matsumoto, Tanabe Toyokazu, Application of porous electrodes prepared with picosecond pulsed laser to lithium ion battery, 22nd Topical Meeting of the International Society of Electrochemistry, 2018. 4.17, Waseda Univeristy.
(253) Takashi Tsuda, Nobuo Ando, Naoto Mitsuhashi, Toyokazu Tanabe, Kaoru Itagaki, Naohiko Soma, Susumu Nakamura, Narumi Hayashi, Futoshi Matsumoto, Fabrication of Porous Electrodes with a Picosecond Pulsed Laser and Improvement of the Rate Performance of a Porous Graphite Anode, LiFePO4 and LiFePO4/Activated Carbon Cathodes, 22nd Topical Meeting of the International Society of Electrochemistry, 2018. 4.17, Waseda Univeristy.
(252) Fuma Ando, Takashi Tsuda, Toyokazu Tanabe, Takeo Ohsaka, Futoshi Matsumoto, Relationship between d-band center of Dealloyed PtPb Ordered Intermetallic Nanoparticle Deposited on TiO2/ Cup-Stacked Carbon Nanotube and ORR Activity in Acidic Aqueous Media, 22nd Topical Meeting of the International Society of Electrochemistry, 2018. 4.17, Waseda Univeristy.
(251) Fumihiro Nomura, Takashi Tsuda, Toyokazu Tanabe, Takeo Ohsaka, Futoshi Matsumoto, Optimization of Calcination Temperature in Preparation of a High Capacity Li-rich Solid-Solution Li[Li0.2Ni0.18Co0.03Mn0.58]O2 Material and Its Cathode Performance in Lithium Ion Battery, 22nd Topical Meeting of the International Society of Electrochemistry, 2018. 4.17, Waseda Univeristy. 233rd ECS meeting, Washington State Convention Center, 2018.5. 13-17, Seattle, USA.
(249) F. Nomura, T. Tanabe, T. Gunji, F. Matsumoto, Effect of the Cooling Process on the Structure and Charge/Discharge Cycling Performance in Li[Li Mn Ni Co ]O Li-rich Solid-Solution Layered Oxide Cathode Materials for Li-Ion Battery, 233rd ECS meeting, Washington State Convention Center, 2018.5. 13-17, Seattle, USA.
(248) T. Tsuda, N. Ando, Y. Haruki, T. Tanabe, T. Gunji, K. Itagaki, N. Soma, S. Nakamura, N. Hayashi, F. Matsumoto, Study on Li Metal Deposition, SEI Formation on Anodes and Cathode Potential Change during the Pre-Lithiation Process in a Cell Prepared with Laminated Porous Anodes and Cathodes, 233rd ECS meeting, Washington State Convention Center, 2018.5. 13-17, Seattle, USA.
(247) 安藤 風馬, 田邉 豊和, 郡司 貴雄, 金子 信吾, 大坂 武男, 松本 太, 担持体および第二元素を用いたPt系金属間化合物ナノ粒子のPt d-バンドセンターのチューニングによるORR活性の向上に関する検討(3), 2018年電気化学秋季大会, 2018.9.25-26, 金沢大学.
(246) 郡司 貴雄, Noh Seung, 安藤 風馬, Byungchan Han, 大坂 武男, 田邉 豊和, 松本 太, Pd系金属間化合物ナノ粒子の電極触媒活性, 2018年電気化学秋季大会, 2018.9.25-26, 金沢大学.
(245) 野村 文洋, 津田 喬史, 田邊 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 組成探索に基づくLIB用Li2MnO3-LiMO2 Li過剰系固溶体正極材料の高性能化および合成条件の最適化, 2018年電気化学秋季大会, 2018.9.25-26, 金沢大学.
(244) 安藤??,?邉豊和,郡司貴雄,??信吾,?坂武男,松本 太, 担持体および第?元素を?いたPt 系?属間化合物ナノ粒?のPt d-バンドセンターのチューニングによるORR 活性の向上に関する検討, 表面技術協会第138回講演大会, 2018.9.13-14, 北海道科学大学.
(243) 津?喬史,安東信雄,松原?樹,中村 奨,板垣 薫,杣 直彦,林 成実,松本 太, ピコ秒レーザーを?いた三次元表?構造を有する?あき電極の作製及びリチウムイオン?次電池への適?, 表面技術協会第138回講演大会, 2018.9.13-14, 北海道科学大学.
(242) Fuma Ando, Toyokazu Tanabe, Takao Gunji, Shingo Kaneko, Tsuyoshi Takeda, Takeo Ohsaka, Futoshi Matsumoto, Effect of the d-Band Center on the Oxygen Reduction Reaction Activity of Electrochemically Dealloyed Ordered Intermetallic Platinum−Lead (PtPb) Nanoparticles Supported on TiO2-Deposited Cup-Stacked Carbon Nanotubes, 「グリーンエネルギー変換工学」第7回国際セミナー, 2018.8.22-23, 山梨大学.
(241) 津?喬史,安東信雄,松原?樹,中村 奨,板垣 薫,杣 直彦,林 成実,松本 太, ピコ秒レーザーを用いて作製された穴あき電極のリチウムイオン二次電池への適用および高出力化, 化学電池材料研究会 第42 回講演会・夏の学校, 2018.8.6-8, 京都.
(240) 野村 文洋, 津田 喬史, 田邊 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 組成探索に基づくLIB用Li2MnO3-LiMO2 Li過剰系固溶体正極材料の高性能化および合成条件の最適化, 化学電池材料研究会 第42 回講演会・夏の学校, 2018.8.6-8, 京都.
(239) 安藤 風馬, 田邉 豊和, 郡司 貴雄, 金子 信吾, 大坂 武男, 松本 太, 担持体および第二元素を用いたPt系金属間化合物ナノ粒子のPt d-バンドセンターのチューニングによるORR活性の向上に関する検討,電気化学会関東支部第36回夏の学校, 2018.8.30-31, 八王子セミナーハウス.
(238) 野村 文洋, 津田 喬史, 田邊 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 組成探索に基づくLIB用Li2MnO3-LiMO2 Li過剰系固溶体正極材料の高性能化および合成条件の最適化, 電気化学会関東支部第36回夏の学校, 2018.8.30-31, 八王子セミナーハウス.
(237) 津?喬史,安東信雄,松原?樹,中村 奨,板垣 薫,杣 直彦,林 成実,松本 太, ピコ秒レーザーを用いて作製された穴あき電極のリチウムイオン二次電池への適用および高出力化, 電気化学会関東支部第36回夏の学校, 2018.8.30-31, 八王子セミナーハウス.
(236) 松本 太, 電気化学反応・電極反応のメカニズムと電気化学測定法および電極/溶液界面の解析〜電気化学の基礎、いろいろ組み合わせた各種測定法、CV法、交流インピーダンス法〜, Science&Technologyセミナー(東京・流通センター), 2018.4.19.
(235) 松本 太, リチウム電池用水系バインダーの高電圧高容量正極への適用とその性能評価『リチウム電池用水系バインダーの高電圧正極での適用と性能評価』, 技術情報協会セミナー (東京都,五反田), 2018.4.25.
(234) 松本 太,「リチウム過剰系正極への水系バインダーの適用と長寿命化」リチウム過剰系正極材料のサイクル特性向上技術, 技術情報協会セミナー (東京都,五反田), 2018.5.10.
(233) 松本 太, 次世代電池のキーテクノロジと材料開発〜穴あき電極、バインダー活物質材料のコティグなど〜, 電気・電子材料技術セミナー Insulation 2018 −EV 技術 と関連材料技術 と関連材料技術−,電気機能材料工業会, 2018.11.29, 東京・亀戸.
(232) 郡司貴雄、「金属間化合物ナノ粒子の創生と電極触媒反応への適用」, 第124回電気化学会関東支部サイエンスレクチャー, 2019. 2. 20, 東京.
(231) F. Ando, T. Tanabe, T. Gunji, S. Kaneko, T. Ohsaka, F. Matsumoto, Improvement of Electrochemical ORR Activity and Its Durability with Pt Electrocatalyst Nanoparticles Anchored on MO x /Cup-Stacked Carbon Nanotube in Acidic Aqueous Media, 231th ECS meeting, 2017.5.28-6.1, New Orleans, USA.
(230) T. Tsuda, F. Ando, Y. Mochizuki, T. Gunji, T. Tanabe, S. Kaneko, T. Ohsaka, K. Itagaki, N. Soma, F. Matsumoto, Fabrication of Porous Current Collectors for Li Ion Capacitor with Pico-Second Pulse Laser and Acceleration of Li+ Ion Pre-Doping Reaction to Laminated Graphite/Porous Current Collector Anodes, 231th ECS meeting, 2017.5.28-6.1, New Orleans, USA.
(229) F. Matsumoto, N. Tamura, T. Tsuda, T. Gunji, T. Tanabe, S. Kaneko, and T. Ohsaka, Dependences of Discharge Capacity, Retention of Discharge Capacity, Average Discharge Voltage and Energy Density, and Rate Capability on the Composition of XLi2MnO3-YLiNi1/2Mn1/2O 2-(1-x-y)LiNi1/3Co1/3Mn1/3O2 Li-Rich Solid-Solution Cathode Materials for Li-Ion Battery (II), 231th ECS meeting, 2017.5.28-6.1, New Orleans, USA.
(228) F. Matsumoto, T. Tanabe, T. Gunji, T. Tsuda, S. Kaneko, T. Ohsaka, Evaluation of Key Factors for Preparing High Brightness Surfaces of Aluminum Films Electrodeposited from AlCl3-1-Ethyl-3-Methylimidazolium Chloride-Organic Additive Baths231th ECS meeting, 2017.5.28-6.1, New Orleans, USA.
(227) F. Ando. T. Tanabe, T. Ohsaka, F. Matsumoto, Development of Metal ixide-Supported Metal and Ordered Intermetallic Nanoparticles to Enhance the Oxygen Reduction Reaction in PEMFC, Advances in Functional Materials, 2017.8.14-17, UCLA, Los Angeles, USA.
(226) 津田喬史, 安東信雄, 三橋直人,中村奨, 田邉豊和, 板垣薫, 杣直彦,林成実, 松本太, 積層型穴あきグラファイト電極における電極上の開口条件および反応温度とLi+イオンプレドープ速度との関係, 2017年電気化学秋季大会, 2017.9.10-11, 長崎大学.
(225) 安藤 風馬, 田邊 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 担持体および第二元素を用いたPt系金属間化合物ナノ粒子のPt d-バンドセンターのチューニングによるORR活性の向上に関する検討,2017年電気化学秋季大会, 2017.9.10-11, 長崎大学.
(224) 劉 雨彬, 入井 友海太, 槇 文彦, 田邉 豊和, 宮本 康暉, 大坂 武男, 松本 太,水系バインダー適用のためのLiNixCoyAl1-x-yO2 (x > 0.9) 高容量正極材料粒子の表面コーティングと充放電特性の安定化, 2017年電気化学秋季大会, 2017.9.10-11, 長崎大学.
(223) 田邉 豊和, 中森 勝俊, 金子 信悟, 大坂 武男, 松本 太, 混合原子価スズ酸化物を用いた純水及び犠牲剤水溶液からの可視光照射下水素発生の検討(神奈川大学2017年電気化学秋季大会, 2017.9.10-11, 長崎大学.
(222) 高分解能透過電子顕微鏡を用いた高酸素還元触媒活性を有するPtPb/TiO2/カップスタックカーボンナノチューブの触媒表面の状態解析, 安藤風馬,田邉豊和,郡司貴雄,金子信悟,大坂武男,松本 太, 表面技術協会第136回講演大会, 2017.9.14-15,金沢工業大学.
(221) 置換析出により作製したビスマステルライド系薄層の熱電変換特性, 金子信悟,國谷翔太郎,矢�ア将志,大坂武男,田邉豊和,松本 太,表面技術協会第136回講演大会, 2017.9.14-15,金沢工業大学.
(220) Fuma Ando, Toyokazu Tanabe, Takao Gunji, Shingo Kaneko, Takeo Ohsaka, Futoshi Matsumoto, Improvement of Electrochemical ORR Activity and Its Durability with Pt Electrocatalyst Nanoparticles Anchored on MOx/Cup-Stacked Carbon Nanotube in Acidic Aqueous Media, The 6th International Seminar for Special Doctoral Program “Green Energy Conversion Science and Technology”, 2017.9.13-15, Nagano, Japan.
(219) 津田喬史, 安東信雄, 三橋直人,中村奨, 田邉豊和, 板垣薫, 杣直彦,林成実, 松本太, 積層型穴あきグラファイト電極における電極上の開口条件および反応温度とLi+イオンプレドープ速度との関係, 2017年電気化学関東支部夏の学校, 2017.9.25-26, 八王子大学セミナーハウス.
(218) 安藤 風馬, 田邊 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 担持体および第二元素を用いたPt系金属間化合物ナノ粒子のPt d-バンドセンターのチューニングによるORR活性の向上に関する検討,2017年電気化学関東支部夏の学校, 2017.9.25-26, 八王子大学セミナーハウス.
(217) 劉 雨彬, 入井 友海太, 槇 文彦, 田邉 豊和, 宮本 康暉, 大坂 武男, 松本 太,水系バインダー適用のためのLiNixCoyAl1-x-yO2 (x > 0.9) 高容量正極材料粒子の表面コーティングと充放電特性の安定化, 2017年電気化学関東支部夏の学校, 2017.9.25-26, 八王子大学セミナーハウス.
(216) Y. Liu, T. Tanabe, K. Miyamoto, Y. Irii, F. Maki, T. Gunji, S. Kaneko, S. Ugawa, H.-J Lee, T. Ohsaka, F. Matsumoto, Synthesis of Water-Resistant thin TiOx Layer-Coated High-Capacity LiNiaCobAl1-a-bO2 (a> 0.85) Cathode and Its Stable Charge/Discharge Cycle Cathode Performance to Apply a Water-Based Hybrid Polymer Binder to Li-Ion Batteries, 232th ECS meeting, 2017.10.1-5, National Harbor, MD, USA.
(215) F. Ando, T. Tanabe, T. Gunji, T. Tsuda, S. Kaneko, T. Takeda, T. Ohsaka, F. Matsumoto, Relationship Between ORR Catalytic Activity and D-Band Center of Pt Nanoparticle Deposited on Metal Oxide Support Materials, 232th ECS meeting, 2017.10.1-5, National Harbor, MD, USA.
(214) T. Tsuda, N. Ando, T. Gunji, T. Tanabe, S. Kaneko, K. Itagaki, N. Soma, S. Nakamura, F. Matsumoto, Improvement of Rate Performance of LiFePO4 Cathode with Porous LiFePO4/Activated Carbon Hybrid Electrode Structure, 232th ECS meeting, 2017.10.1-5, National Harbor, MD, USA.
(213) 安藤 風馬, 田邊 豊和, 大坂 武男, 松本 太, 固体高分子形燃料電池用酸素還元電極触媒の触媒活性と電極触媒表面の電子状態の関係の解明, 7th CSJ Chemistry Festa, 2017.10-17-19, タワーホール船堀, 東京.
(212) 津田喬史, 田邉豊和, 安東信雄, 中村奨, 板垣薫, 杣直彦, 林成実, 松本太, 穴あきLiFePO4/活性炭ハイブリッド電極構造によるLiFePO4正極の高出力化, 7th CSJ Chemistry Festa, 2017.10-17-19, タワーホール船堀, 東京.
(211) T. Gunji, T. Tanabe, T. Ohsaka, F. Matsumoto, The Enhanced Electrocatalytic Activity over Pd-base Intermetallic Compound, International Symposium on Novel Energy Nanomaterials, Catalysts and Surfaces for Future Earth- Material Research, Characterization and Imaging by In situ/Operando XAFS and X-ray Techniques -, 2017.10.28-30, The University of Electro-Communications, Tokyo.
(210) F. Ando, T. Tanabe, T. Gunji, T. Ohsaka, F. Matsumoto, Relationship between ORR Catalytic Activity and d-band Center of Pt and Pt-based, Alloy Nanoparticle Deposited on Metal Oxide Support Materials, 2017.10.28-30, The University of Electro-Communications,Tokyo.
(209) F. Nomura, L. Yubin, T. Tanabe, T. Ohsaka, F. Matsumoto, Optimization of Calcination Conditions in Preparation of a High Capacity Li-rich Solid-Solution Li[Li0.2Ni0.18Co0.03Mn0.58]O2 Material and its Cathode Performance in Lithium Ion Battery, 2017.10.28-30, The University of Electro-Communications,Tokyo.
(208)安藤 風馬, 田邊 豊和, 大坂 武男, 松本 太, Ptナノ粒子およびPtPbナノ粒子/TiO2/カップスタックカーボンナノチューブの電極触媒特性と耐久性の向上, 平成29年度 神奈川県ものづくり技術交流会, 2017. 11.8, 神奈川県立産業技術総合研究所.
(207) 津田喬史, 田邉豊和, 安東信雄, 中村奨, 板垣薫, 杣直彦, 林成実, 松本 太, 穴あきLiFePO4/活性炭ハイブリッド電極構造によるLiFePO4正極の高出力化, 平成29年度 神奈川県ものづくり技術交流会, 2017. 11.8, 神奈川県立産業技術総合研究所.
(206) 津田喬史, 田邉豊和, 安東信雄, 中村奨, 板垣薫, 杣直彦, 林成実, 松本 太, ピコ秒レーザーを用いた穴あきグラファイト負極の作製およびプレドープ反応の促進, 第27回日本MRS年次大会, 2017. 12.5, 横浜情報文化センター.
(205) 安藤 風馬, 田邊 豊和, 大坂 武男, 松本 太, Pt/酸化チタン/カップスタックカーボンナノチューブ上での酸性水溶液中における酸素還元反応の促進および耐久性の向上, 第27回日本MRS年次大会, 2017. 12.5, 横浜情報文化センター.
(204) 安藤 風馬, 田邊 豊和, 大坂 武男, 松本 太, Pt/酸化チタン/カップスタックカーボンナノチューブ上での酸性水溶液中における酸素還元反応の促進および耐久性の向上, 第27回キャラクタリゼーション講習会「触媒および表面の解析に役立つキャラクタリゼーションの基礎と実際」, 2017. 12.8, 熊本大学.
(203) 津田 喬史, 安東 信雄, 松原 一樹, 中村 奨, 田邉豊和, 板垣 薫, 杣 直彦, 林 成実, 松本 太, ピコ秒レーザーを用いて作製された穴あき電極のリチウムイオン二次電池への適用および高出力化, 電気化学会 電気化学会第85回大会, 2018.3.9, 東京理科大学葛飾キャンパス.
(202) 劉 雨彬, 田邊 豊和, 大坂 武男, 浅井 悠太, 鵜川晋作, イ ホジン, 松本 太, 水系バインダー適用のための Li過剰系固溶体正極材料の組成探索および水暴露後の正極粒子の表面構造解析, 電気化学会 電気化学会第85回大会, 2018.3.9, 東京理科大学葛飾キャンパス.
(201) 津田 喬史, 安東 信雄, 一色 晃太, 中村 奨, 田邉豊和, 板垣 薫, 杣 直彦, 林 成実, 松本 太, 穴あき LiFePO4/活性炭ハイブリッド電極構造による LiFePO4正極の高出力化および反応機構解析, 電気化学会 電気化学会第85回大会, 2018.3.9, 東京理科大学葛飾キャンパス.
(200) 安藤 風馬, 田邉 豊和, 郡司 貴雄, 金子 信悟, 大坂武男, 松本 太, 担持体および第二元素を用いた Pt系金属間化合物ナノ粒子の Pt d-バンドセンターのチューニングによるORR活性の向上に関する検討(2), 電気化学会 電気化学会第85回大会, 2018.3.10, 東京理科大学葛飾キャンパス.
(199) 田邉 豊和, 近藤 託弥, 宮内 雅浩, 金子 信悟, 大坂武男, 松本 太, Pt-M合金微粒子担持 TiO2ナノロッドにおける高効率IPA分解反応, 電気化学会 電気化学会第85回大会, 2018.3.10, 東京理科大学葛飾キャンパス.
(198) 野村 文洋, 津田 喬史, 田邊 豊和, 金子 信悟, 大坂 武男, 松本 太, 組成探索に基づく LIB用 Li2MnO3-LiMO2Li過剰系固溶体正極材料の高性能化および合成条件の最適化, 電気化学会第85回大会, 2018.3.10, 東京理科大学葛飾キャンパス.
(197) 安藤 風馬, 田邉 豊和, 郡司 貴雄, 金子 信悟, 大坂 武男, 松本 太, 高分解能透過電子顕微鏡を用いた高酸素還元触媒活性を有する PtおよびPtPb/TiO2/カップスタックカーボンナノチューブの触媒表面の状態解析, 電気化学会第85回大会, 2018.3.10, 東京理科大学葛飾キャンパス.
(196) 國谷翔太郎,金子信悟,大坂武男,田邉豊和,松本 太, 置換析出によって作製したビスマステルライド系薄層の作製条件依存性, 表面技術協会第137 回講演大会, 2018.3.12, 芝浦工業大学豊洲キャンパス.
(195) 松本 太, “Pt系金属間化合物の電極触媒への適用 —ナノ化,コアシェル化,合金化などによる白金低減化技術ー“ 白金代替触媒および 触媒開発における白金使用量の低減化, 技術情報協会セミナー (東京都,五反田), 2017.4.11.
(194) A. J. Jeevagan, T. Gunji, T. Tanabe, S. Kaneko, and F. Matsumoto, Synthesis of Reduced Graphene Oxide-Supported PtAu Catalysts and Their Electrocatalytic Activity for Formic Acid Oxidation, 229th ECS meeting, 2016.5.29-6.2, San Diego, US.
(193) F. Matsumoto, S. Kaneko, T. Gunji, and T. Tanabe, The Effect of Brighteners on the Fabrication of Electroplated Bright Aluminum Films Using an AlCl3-Emic-Toluene Bath (2), 229th ECS meeting, 2016.5.29-6.2, San Diego, US.
(192) T. Gunji, R. Wakabayashi, H. D. Abruña, F. DiSalvo and F. Matsumoto, The Effect of Alloying of Transition Metals (M = Fe, Co and Ni) to Palladium Catalyst on Durability of Electrocatalytic Activity of Oxygen Reduction Reaction in Alkaline Media, 229th ECS meeting, 2016.5.29-6.2, San Diego, US.
(191) F. Ando, T. Gunji, T. Tanabe, S. Kaneko, T. Takeda, T. Ohsaka, and F. Matsumoto, Enhancement of the Oxygen Reduction Reaction (ORR) on a PtPb Nanoparticle /TiO2/Cup-stacked Carbon Nanotube Composite in Acidic Aqueous Solutions based on the Electronic Interaction between PtPb and TiO2, 229th ECS meeting, 2016.5.29-6.2, San Diego, US.
Nanoparticles towards Electrooxidation of Formic Acid, 電気化学会関東支部第34回夏の学校, 八王子セミナーハウス, 2016.9.8-9.
(189) 安藤風馬, 田邉豊和,金子信悟,大坂武男,松本 太, Development of Metal Oxide-Supported Metal and Ordered Intermetallic Nanoparticles to Enhance the Oxygen Reduction Reaction in PEMFC, 電気化学会関東支部第34回夏の学校, 八王子セミナーハウス, 2016.9.8-9.
(188) 劉 雨彬, 田邉豊和,金子信悟,大坂武男,松本 太, Cu-Sn Bimetallic Nanoparticles supported on carbon for Electrochemical Reduction of CO2 to CO in Aqueous Media, 電気化学会関東支部第34回夏の学校, 八王子セミナーハウス, 2016.9.8-9.
(187) 田邉 豊和, 宮澤 亘, 郡司 貴雄, 伊藤 皇成, 金子 信悟, 大坂 武男, 宮内 雅浩, 松本 太, TiO2ナノロッド還元反応サイトへのPt-Pb 合金微粒子助触媒の選択的担持と担持結晶面の酢酸光酸化分解反応への影響, 日本金属学会 2016年秋期講演大会(第159回),大阪大学, 2016.9.21-2.
(186 K. Miyamoto, T. Gunji, Y. Mochizuki, S. Kaneko, T. Tanabe, T. Ohsaka, F. Matsumoto, The Examination of the Composition of xLi2MnO3-yLiNi0.5Mn0.5O 2-zLiNi1/3Co1/3Mn1/3O2 Solid-Solution Cathode Materials Exhibiting High Capacity, Discharge Voltage and Rate Performance, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(185) T. Gunji, T. Tanabe, S. Kaneko, T. Ohsaka, and F. Matsumoto, the Enhanced Electrocatalytic Activity over Carbon-Supported Pd-Based Ordered Intermetallic Compounds, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(184) F. Matsumoto, T. Gunji, T. Tanabe, S. Kaneko, and T. Ohsaka, Facile Route for the Preparation of Ordered Intermetallic Pt3Pb-PtPb Core-Shell Nanoparticles and Its Enhanced Activity for Alkaline Methanol and Ethanol Oxidation, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(183) T. Ohsaka (Kanagawa University, Tokyo Institute of Technology), S. H. Noh, M. H. Seo, J. Kang, T. Okajima, B. Han, F. Matsumoto, Design of Metal Structure Encapsulated in N-Doped Carbon Layers As Tunable Catalyst for Electrochemical Applications, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(182) T. Tanabe, M. Hashimoto, T. Tanikawa, T. Gunji, S. Kaneko, T. Ohsaka, and F. Matsumoto, Mixed Valence Tin Oxide Sn3O4 : A Visible-Light Driven Semiconductor for Photocatalytic Water Splitting Under Visible Light Irradiation, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(181 T. Tanabe, W. Miyazawa, T. Gunji, M. Hashimoto, S. Kaneko, T. Ohsaka, F. Matsumoto, Site-Selective Binary Alloy Nanoparticles Deposition on TiO2 Nanorod for Acetic Acid Oxidative Decomposition Under UV-Vis Irradiation, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(180) T. Gunji, S. Kaneko, T. Tanabe, T. Ohsaka, F. Matsumoto, the Relationship Between Brightness of Aluminum Films Fabricated Using an AlCl 3-1-Ethyl-3-Methylimidazolium Chloride-Toluene Bath and Molecular Structure of Additives, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(179) K. Miyamoto, Y. Honma, T. Gunji, T. Tanabe, S. Kaneko, T. Ohsaka, S. Ugawa, H. J. Lee, Y. Ootsuka, F. Matsumoto, the Application of a Water-Based Hybrid Polymer Binder to a High-Voltage and High-Capacity Li-Rich Solid-Solution Cathode and Its Performance in Li-Ion Batteries, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
Oxygen Reduction Reaction in PEMFC, PRiME2016, 2016.10.2-7, Hawaii Convention Center, Honolulu, USA.
(177) 安藤風馬, 田邉豊和, 郡司貴雄, 金子信悟, 大坂武男, 松本 太, Pt系ナノ粒子/TiO2/カップスタックカーボンナノチューブの電極触媒特性と耐久性の向上, 平成28年神奈川県ものづくり交流会, 2016.10.26, 神奈川県産業技術センター, 海老名.
(176) 松本 太, 田邉豊和, 郡司貴雄, 金子信悟, 大坂武男, AlCl3-EMIC イオン液体からのアルミニウム電気めっきにおける添加剤の効果−添加剤の分子構造と光沢性の関係−, 平成28年神奈川県ものづくり交流会, 2016.10.26, 神奈川県産業技術センター, 海老名.
(175) 松本太, 中村亮介, 望月康正, 郡司貴雄, 田邉豊和, 金子信悟, 大坂武男, 板垣薫, 杣直彦, 孔空き集電銅箔を用いたLi+イオンドープ反応の高速化のための孔デザインの最適化, 第57回電池討論会, 2016.11.29., 幕張メッセ.
(174) 小山 昇,山口 秀一郎,古館 林,望月 康正,羽田 睦雄,大坂 武男,岡島 武, 松本 太, "多重インピーダンス計測によるリチウム二次電池モジュール劣化度診断の簡便法の開発", 第57回電池討論会, 2016.11.29., 幕張メッセ.
(171) 矢�ア将志,金子信悟,郡司貴雄,大坂武男,田邉豊和,松本 太, 置換析出に基づくビスマステルライド系薄層の作製とその熱電変換特性, 表面技術協会第135回講演大会, 2017.3.9-10, 東洋大学川越キャンパス.
(170) 郡司貴雄,川崎大樹,伊藤拳人,金子信悟,田邉豊和,松本 太, 多重定電流パルスめっき法を用いて作製したNi/Cu およびNi/Ni-P 多層膜の断面観察と耐摩耗性の膜厚依存性, 表面技術協会第135回講演大会, 2017.3.9-10, 東洋大学川越キャンパス.
(169) 田邉 豊和, 伊藤 皇聖, 郡司 貴雄, 宮内 雅浩, 金子 信悟, 大坂 武男, 松本 太, Pt-Pb合金微粒子/TiO2ナノロッド光触媒によるVOC完全酸化分解反応,日本金属学会2017年春期大会, 2017.3.15-17, 首都大学東京.
(168) 田邉 豊和, 伊藤 皇聖, 郡司 貴雄, 宮内 雅浩, 金子 信悟, 大坂 武男, 松本 太, TiO2ナノロッドの露出面制御とPt-Pb合金微粒子担持による高効率なVOC酸化分解反応,電気化学会第84回大会, 2017.3.25-27, 首都大学東京.
(167) 郡司 貴雄, 田邊 豊和, 安藤 風馬, 大坂 武男, 松本 太, 白金フリーを志向した新規電極触媒の創生および酸性水溶液中における酸素還元反応と触媒の構造・電子状態の相関, 電気化学会第84回大会, 2017.3.25-27, 首都大学東京.
(166) 津田喬史, 井波祐貴, 中村亮介, 安藤風馬, 望月康正, 郡司貴雄, 田邉豊和, 金子信悟, 板垣薫, 杣直彦, 松本 太, Liイオンキャパシタ用電極作製のための穴空き集電銅箔を用いたLiイオンドープ反応の高速化および穴空き集電箔のリチウムイオン二次電池への適用, 電気化学会第84回大会, 2017.3.25-27, 首都大学東京.
(165) 松本 太, 田邉 豊和, 郡司 貴雄, 望月 康正, 金子 信悟, 大坂 武男, 鵜川 晋作, 大塚 巧治, イ ホジン, 水系バインダー適用のためのLiNi0.5Mn1.5O4高電圧正極材料粒子の表面コーティングと充放電特性の安定化, 電気化学会第84回大会, 2017.3.25-27, 首都大学東京.
(164) 松本 太, 高電圧・高容量正極材料への水系バインダーの適用と性能評価, 『リチウム二次電池向けバインダーの高電圧対応設計と最適選定 』, 技術情報協会(東京, 五反田), 2016.7.7.
(163) 松本 太, 固体高分子形燃料電池用金属間化合物ナノ粒子電極触媒の合成と電極触媒活性の向上, 都市環境学部第365回応化コロキウム, 首都大学東京, 2016.7.29.
(162) 田邉 豊和, 可視光水分解を指向したSn酸化物光触媒の創製と合金微粒子の反応サイト選択担持による反応高効率化, 電気化学会関東支部第34回夏の学校, 八王子セミナーハウス, 2016.9.8-9.
(161) 金子信悟, 松本 太, "めっき膜の物性向上に向けた体系的研究—物性と結晶構造の関わり—", ファインプレーティング研究会, (関東学院大学, 関内), 2016,10.4.
(160) 松本 太, 企業講演会"電気化学反応と測定・解析",サン工業株式会社 (長野県,伊那市), 2016.10.21.
(159) T. Tanabe, Controlled deposition of Pt-Pb alloy nanoparticles on TiO2 nanorods: improved photocatalytic activity with site-selective co-catalyst loading, BIT's 6th Annual World Congress of Nano Science & Technology – 2016, 2016.10.26-28, Holiday Inn Singapore Atrium, Singapore.
(158) T. Tanabe, M. Hashimoto, T. Tanikawa, T. Gunji, S. Kaneko, T. Ohsaka and F. Matsumoto, Visible light-driven water splitting using mixed-valence Tin oxide semiconductor photocatalyst, EMN Meeting on Energy and Sustainability, 2016.11.28-12.2, Osaka, Japan.
(157) Futoshi Matsumoto, Application of Ordered Intermetallic Compounds to Polyer Electrolyte Membrane Fuel Cells as Electrocatalysts, Exchange Sympodium of National Taiwan University and Kanagawa University, Taiwan, 2017-3-11.
(156) 松本 太, リチウムイオンキャパシタ用電極作製のための穴空き集電銅箔を用いたLi+ドープ反応の高速化および穴あき集電箔のリチウムイオン二次電池への適用, リチウムイオンキャパシタ、リチウムイオン二次電池 プレドープ・穴あき集電箔が開く次世代電池の未来横浜企業経営支援財団第219回産学交流サロン(横浜市), 2017.3.24.
(155) 松本 太, 高電圧・高容量正極材料への水系バインダーの適用と性能評価, 技術情報協会セミナー(五反田、東京) 2017.3.23.
(154) K. Uehara, T. Gunji, T. Tanabe, S. Kaneko, and F. Matsumoto, The Effect of Brighteners on the Fabrication of Electroplated High-Bright Aluminum Films Using AlCl3-Emic Ionic Liquids, 228th ECS meeting, 2015.10.11-15, Phoenix, US.
(153) T. Gunji, T. Tanabe, S. Kaneko, and F. Matsumoto, Photocatalytic Decomposition of Various Organic Compounds over WO3 Supported Ordered Intermetallic PtPb Co-Catalyst, 228th ECS meeting, 2015.10.11-15, Phoenix, US.
(152) T. Kuzuoka, T. Kouno, T. Koyama, Y. Morita, K. Yamazaki, S. Kaneko, T. Tanabe, T. Gunji, and F. Matsumoto, Development of Moving Micro-Machines That Use Hydrogen Peroxide and Glucose as Fuels, 228th ECS meeting, 2015.10.11-15, Phoenix, US.
(151) Shingo Kaneko (Research Institute for Engineering, Kanagawa University, Yokohama, Japan), Yuichi Sato, Futoshi Matsumoto, Junwei Zheng, Decheng Li, Size-regulated Precursor-Based Synthesis of Lithium-Rich Layered Cathode Material Deriving High Rate Capability, 66th Annual meeting of International Society of Electrochemistry, 2015.10.4-9., Taipei, Taiwan.
(150) 橋本真成, 田邉豊和, 谷川龍弘, 郡司貴雄, 金子信悟, 阿部英樹, 松本 太, 水分解を指向した可視光応答型Sn酸化物光触媒の合成と触媒活性, 第5回CSJ化学フェスタ2015, 2015.10.13-15., タワーホール船堀, 東京.
(149) 橋本真成, 田邉豊和, 谷川龍弘, 郡司貴雄, 金子信悟, 阿部英樹, 松本 太, 混合原子価スズ酸化物光触媒Sn3O4: 可視光によるメタノール水溶液からの水素生成, 第25回日本MRS年次大会, 2015.12.8-10., 横浜開港記念会館, 横浜.
(148) 橋本 真成, 田邉豊和, 谷川龍弘, 郡司貴雄, 金子信悟, 阿部英樹, 松本 太,可視光応答性混合価数Sn 酸化物の高純度合成と犠牲剤水溶液からの水素発生の検討, 第 22回シンポジウム, 光触媒反応の最近の展開, 東京理科大学野田キャンパス, 2015/12/4.
(147) 郡司 貴雄, 橋本真成, 田邉豊和, 野澤寿章, 金子信悟, 松本 太, WO3光触媒担持金属間化合物PtPb助触媒による有機物の分解反応の検討, 第25回日本MRS年次大会, 2015.12.8-10, 横浜開港記念会館, 横浜.
(146) Toyokazu Tanabe, Wataru Miyazawa, Takao Gunji, Shingo Kaneko, Masahiro Miyauchi, Futoshi Matsumoto, Site-selective Pt-Pb nanoparticles deposition on TiO2 nanorod photocatalyst for acetic acid oxidative decomposition under UV-Vis irradiation, PACIFICHEM2015, 2015.12.15-20, Honolulu, Hawaii, USA.
(145) Toyokazu Tanabe, Masanari Hashimoto, Arockiam Jeevagan, Takao Gunji, Shingo Kaneko, Hideki Abe, Futoshi Matsumoto, Photocatalytic hydrogen evolution from aqueous methanol solution using mixed-valence Sn3O4 under visible light irradiation, PACIFICHEM2015, 2015.12.15-20, Honolulu, Hawaii, USA.
(144) 郡司 貴雄,田邉 豊和,金子 信悟,松本 太, Pdをベースとした種々の合金触媒のアルカリ性水溶液中における酸素還元反応の触媒活性, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(143) 安藤 風馬,郡司 貴雄,田邉 豊和,金子 信悟,松本 太, Pt系ナノ粒子/TiO2/カップスタックカーボンナノチューブの電極触媒特性と耐久性の向上, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(142) 松本 太, 井波 祐貴, 郡司 貴雄,望月 康正, 金子 信悟, 田邉 豊和, Liイオンキャパシタ用電極作製のための穴空き集電銅箔を用いたLiプレドープ反応の高速化, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(141) 郡司 貴雄, 田邉 豊和, 金子 信悟, 松本 太, 金属酸化物上に担持したPt系触媒の酸素還元反応に関する触媒活性, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(140) 本間 陽平, 郡司 貴雄, 松本 太, 望月 康正, 田邉 豊和, 金子 信悟, 鵜川 晋作, 大塚 巧治, イ ボジン, 水系バインダー適用のための高電圧正極材料粒子の表面コーティングと充放電特性の向上, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(139) 田邉 豊和, 橋本 真成, 谷川 龍弘, 郡司 貴雄, 金子 信悟, 松本 太, 混合価数酸化物Sn3O4光触媒を用いた各種犠牲剤溶液からの水素発生及び酸素発生の検討, 電気化学会第83回講演大会, 大阪大学, 2016.3.29-31.
(138) 金子信悟,守屋世界,田邉豊和,松本 太, 湿式法により作製したビスマステルライド系薄層の結晶構造と熱電変換特性の関係, 表面技術協会第133回講演大会, 2016.3.22-23, 早稲田大学西早稲田キャンパス.
(137) 郡司貴雄,上原一真,金子信悟,田邉豊和,松本 太, AlCl3-EMIC イオン液体からのアルミニウム電気めっきにおける添加剤の効果(3) −添加剤の分子構造と光沢性の関係−, 表面技術協会第133回講演大会, 2016.3.22-23, 早稲田大学西早稲田キャンパス.
(136) T. Gunji, T. Tanabe, S. Kaneko, F. Matsumoto, K. Sasaki, A. J. Jeevagan, Enhanced Oxygen Reduction Reactions and Stable Long-term Activity on TiO2-supported Dealloyed PtCu Nanoparticles in Acidic Aqueous Solutions, 227nd Meeting of ECS, Chicago, US, 2015.5, 24-28.
(135) 郡司貴雄, 田邉豊和,金子信悟,松本 太, PtPb金属間化合物ナノ粒子を助触媒とした光触媒の合成と有機物分解反応の触媒活性の検討, 電気化学会関東支部第33回夏の学校, 八王子セミナーハウス, 2015.8.26-27.
(134) 橋本真成, 田邉豊和,金子信悟,松本 太, 可視光応答型Sn3O4光触媒の高純度合成と犠牲剤溶液からの水素生成反応, 電気化学会関東支部第33回夏の学校, 八王子セミナーハウス, 2015.8.26-28.
(133) Toyokazu Tanabe, Wataru Miyazawa, Takao Gunji, Shingo Kaneko, Masahiro Miyauchi, Futoshi Matsumoto, Site-selective deposition of Pt-Pb bimetallic alloy nanoparticles on rutile TiO2 nanorod for acetic acid decomposition under UV irradiation, First International Symposium on Recent Progress of Energy and Environmental Photocatalysis (Photocatalysis1) Tokyo University of Science, Japan, 2015. 9.3-4.
(132) Toyokazu Tanabe, Hashimoto Masanari, Arockiam John Jeevagan, Takao Gunji, Shingo Kaneko, Hideki Abe, Futoshi Matsumoto, Photocatalytic hydrogen evolution from aqueous methanol over mixed valence tin oxide-Sn3O4 under visible light irradiation, First International Symposium on Recent Progress of Energy and Environmental Photocatalysis (Photocatalysis1) Tokyo University of Science, Japan, 2015. 9.3-4.
(131) 金子信悟,川崎大樹,伊藤拳人,田邉豊和,松本 太, Cu/Ni多層めっきにおけるめっき層の構造と耐摩耗性の関係(2),表面技術協会第132回講演大会, 信州大学長野キャンパス, 2015. 9.9-10.
(130) 郡司貴雄,田邉豊和,金子信悟,宮内雅浩,松本 太, PtPb金属間化合物助触媒/WO3光触媒の合成と触媒活性(2),表面技術協会第132回講演大会, 信州大学長野キャンパス, 2015. 9.9-10.
(129) 松本 太, 上原一真, 方 雪琴, 金子信悟,田邉豊和, AlCl3-EMICイオン液体からのアルミニウム電気めっきにおける添加剤の効果(2),表面技術協会第132回講演大会, 信州大学長野キャンパス, 2015. 9.9-10.
(128) 田邉 豊和,橋本 真成,谷川 龍弘,郡司 貴雄,金子 信悟,松本 太, 可視光応答型Sn3O4光触媒の高純度合成と犠牲剤溶液からの水素生成反応, 電気化学秋季大会, 埼玉工業大学, 2015. 9.11-12.
(127) 郡司 貴雄, 田邉 豊和, 金子 信悟, 宮内 雅浩, 松本 太, PtPb金属間化合物ナノ粒子を助触媒とした光触媒の合成と有機物分解反応の触媒活性の検討,電気化学秋季大会, 埼玉工業大学, 2015. 9.11-12.
(126) 松本 太,郡司 貴雄,安藤 風馬,竹田 剛士,藤間 光,田邉 豊和,金子 信悟, PtPb/TiO2/カップスタック型カーボンナノチューブの合成と電極触媒反応への適用 電気化学秋季大会, 埼玉工業大学, 2015. 9.11-12.
(125) 松本 太, “電気化学反応と測定・解析“, Science & Technology株式会社主催(東京,大井町), 2015.12.17-18.
(124) Futoshi Matsumoto, Application of Ordere Intermetallic Nanoparticles to Electrocatalyst of Polymer Electrolyte Membrane Fuel Cell, Energy Material Nanotechnology Meeting 2016, Orland USA, 2016.2.21-25.
(123) 松本 太, “リチウム二次電池電極用バインダーにおける高電圧化への適用・評価と電極板製造工程での不良低減・安全性向上のポイント “,株式会社AndTech主催(東京,千代田区), 2016. 3. 25.
(122) 田邉 豊和, 亀岡 聡, 郡司 貴雄, 金子 信吾, 蔡 安邦, 松本 太, Cu3Au前駆体ナノポーラスAuにおける残留Cu状態解析, 日本金属学会2015年度春期講演大会, 東京大学駒場キャンパス, 2015. 3.19.
(121) 加藤 めぐみ, 南齋 勉, 井川 学, 松本 太, 油滴の自発的走行に及ぼす界面活性剤の影響, 第24回 非線形反応と協同現象研究会, 東京電機大学 東京千住キャンパス, 2014.12. 6.
(120) Arockiam John Jeevagan, Takashi Tsuda, Govindachetty Saravanan, Takao Gunji, Masanari Hasimoto, Shingo Kaneko, Masahiro Miyauchi, Futoshi Matsumoto, Visible Light Driven Decomposition of Organic Compounds by Two Different CoCatalysts, 225nd Meeting of ECS, Orlando, USA, 2014.5, 12-16.
(119) Masanari Hasimoto, Arockiam John Jeevagan, Takashi Tsuda, Govindachetty Saravanan, Takao, Gunji, Shingo Kaneko, Masahiro Miyauchi, Futoshi Matsumoto, Photocatalytic Activity of Pt3Ti/WO3 Photocatalyst Under Visible-Light Irradiation, 225nd Meeting of ECS, Orlando, USA, 2014.5, 12-16.
(118) B. Nanzai, M. Kato, Y. Okawa, M. Igawa, F. Matsumoto "Spontaneous motion of oil droplet in aqueous solution: Effect of contact angle and interfacial tensions under various conditions" P4 Gordon Research Conference 2014:Oscillations & Dynamic Instabilities in Chemical Systems (July 2014, Girona, Spain).
(117) 岸岡真也,大園裕也,渡邊庄元,松本 太,��田 伶子,鈴木 優季子,芳香族ジアミン類縁体のAu(111)での電解重合:構造と酸素還元触媒反応, 2014年電気化学秋季大会, 北海道大学, 2014.9.28-29.
(116) 田邉豊和, Manikandan Maidhily, 梅澤直人, 松本 太, 阿部英樹, 可視光水分解反応を指向した混合価数Sn3O4光触媒の開発, 2014年電気化学秋季大会, 北海道大学, 2014.8.28-29.
(115) 松本 太, 若尾駿志, 望月康正, 金子信悟, 渡辺充広, 馬場邦人, 村上更,大村雅也, 神田雄介, 粗面化アルミニウム集電体を用いたリチウム二次電池用正極/水系バインダー薄膜性能評価, 2014年電気化学秋季大会, 北海道大学, 2014.9.28-29.
(114) Arockiam John Jeevagan, Takao Gunji, Toyokazu Tanabe, Shingo Kaneko, Futoshi Matsumoto, Pd3Pb Ordered Intermetallic Catalyst for Improved Electrocatalytic Oxygen Reduction Reaction in Alkaline Environment, 2014年電気化学秋季大会, 北海道大学, 2014.9.28-29.
(113) 郡司貴雄,坂井啓介,鈴木優季子,田邉豊和,金子信悟,松本太, 種々の金属酸化物に担持した白金系金属間化合物ナノ粒子の電極触媒活性, 2014年電気化学秋季大会, 北海道大学, 2014.9.28-29.
(112) 郡司貴雄,臼井 将,金子信悟,田邉豊和,松本 太, Pt3Pbコア-PtPbシェル構造を有するナノ粒子の合成と触媒表面構造と燃料電池用電極触媒活性の関係, 表面技術協会第130回講演大会, 京都大学, 2014.9.22-23.
(111) 松本 太,葛岡拓也,小山朋大,金子信悟,田邉豊和, 電気化学反応・酵素反応を用いたマイクロ自律移動体の開発, 表面技術協会第130回講演大会, 京都大学, 2014.9.22-23.
(110) 郡司貴雄, 田邉豊和,金子信悟,松本 太, 金属酸化物担持白金系金属間化合物の燃料電池用電極触媒への適用, 電気化学会関東支部第32回夏の学校, 八王子セミナーハウス, 2014.8.28-29.
(109) 橋本真成, 田邉豊和,金子信悟,松本 太, 白金系金属間化合物を助触媒とした光触媒の合成と光触媒活性の評価, 電気化学会関東支部第32回夏の学校, 八王子セミナーハウス, 2014.8.28-29.
(108) Y. Sato, S. KANEKO, F. MATSUMOTO, B. XIA, Q. ZHANG, G. FANG, W. LIU, H. SUN, J. ZHENG and D.Li, High Rate Capability of Lithium-Rich Layered Li1.2Ni0.18Mn0.59Co0.03O2 Cathode Material Prepared from Size-Regulated Precursor Fine Particles, 10th IUPAC International Conference on Novel Materials and Their Synthesis, 鄭州, 中国, 2014.10.11-15.
(107) T. Gunji, K. Sasaki, A. J. Jeevagan, T. Tanabe, S. Kaneko and F. Matsumoto, Enhanced Oxygen Reduction Reaction and Stable Long-Term Activity on TiO2-supported Dealloyed PtCu Nanoparticles in Acidic Aqueous Solutions, 第24回日本MRS年次大会, 横浜開港記念会館, 2014.12.10-12.
(106) A. J. Jeevagan, T. Gunji, M. Hashimoto, T. Tanabe, S. Kaneko, and F. Matsumoto, Synthesis of Pt and Pd Based Intermetallic and Bimetallic Nanoparticles on Semiconductors and Their Photocatalytic Activity, 第24回日本MRS年次大会, 横浜開港記念会館, 2014.12.10-12.
(105) 郡司貴雄,田邉 豊和,金子 信悟,松本 太, Pt系金属間化合物を用いた固体高分子形燃料電池用高性能電極触媒の開発, 4th CSJ Chemistry Festa, タワーホール船堀, 2014.10.14-16.
(104) 郡司貴雄,大場匠悟,田邉豊和,金子信悟,松本 太, マイクロ波ポリオール2段階法を用いたPt3Pbコア-PtPbシェル構造を有するナノ粒子の合成と電極触媒活性の向上, 平成26年度神奈川県ものづくり技術交流会, 神奈川県産業技術センター, 2014.10.23.
(103) A. J. Jeevagan, T. Gunji, M. Hashimoto), S. Kaneko, F. Matsumoto, Synthesis of Pd-Based Nanoparticles and Its Photocatalytic Activity for Organic Compounds Decomposition, 226nd Meeting of ECS, Cancun, Mexico, 2014.10, 5-10.
(102) A. J. Jeevagan, T. Gunji, M. Hashimoto, S. Kaneko, M. Tanaka, and F. Matsumoto, Synthesis of Reduced Graphene Oxides-Supported Binary Catalysts and Its Electrocatalytic Activity, 226nd Meeting of ECS, Cancun, Mexico, 2014.10, 5-10.
(101) T. Tanabe, T. Gunji, K. Sasaki, A. J. Jeevagan, T. Tsuda, S. Kaneko, G. Saravanan, H. Abe, M. Tanaka and F. Matsumoto, Enhancement of Electrocatalytic Activity for Oxygen Reduction Reaction on TiO2-Supported Pt-Based Intermetallic Compound Catalysts, 226nd Meeting of ECS, Cancun, Mexico, 2014.10, 5-10.
(100) A. J. Jeevagan, T. Gunji, T. Tanabe, S. Usui, T. Tsuda, S. Kaneko, G. Saravanan, H. Abe, M. Tanaka and F. Matsumoto, Enhancing Alkaline Ethanol Oxidation on Ordered Intermetallic Pt3pb-Ptpb Core-Shell Nanoparticles Prepared by Converting Nanocrystalline Metals to Ordered Intermetallic Compounds, 226nd Meeting of ECS, Cancun, Mexico, 2014.10, 5-10.
(99) 松本 太, 小瀬村 峻也, 井戸 功二, 望月 康正, 田邉 豊和, 金子 信吾, 鵜川 晋作, イ ホジン, 高電圧・高容量 Li 過剰系固溶体正極材料への水系バインダーの適用と性能評価, 第55回電池討論会, 国立京都国際会館, 2014.11.21.
(98) 渡辺 司, 田中 学, 望月 康正, 松本 太, 川上 浩良, 全固体型リチウムイオン電池の電解質応用を目指したイオン伝導性高分子ナノファイバーの作製, 第55回電池討論会, 国立京都国際会館, 2014.11.21.
(97) 橋本真成, 田邉豊和, 宮内雅浩, 阿部英樹, 郡司貴雄, 松本太, 金属間化合物を助触媒とした光触媒による CO2還元反応, 第21回シンポジウム「光触媒反応の最近の展開」, 東京大学生産技術研究所コンベンションホール, 2014.12.12.
(96) 松本 太,方 雪琴,金子信悟,佐藤静夏,田邉豊和, AlCl3-EMICイオン液体からのアルミニウム電気めっきにおける添加剤の効果, 表面技術協会第131回講演大会, 関東学院大学, 2015.3.4-5.
(95) 葛岡拓也,小山朋大,金子信悟,田邉豊和,南齋 勉,松本 太, 酵素反応を用いたマイクロ自立移動体の開発(2), 表面技術協会第131回講演大会, 関東学院大学, 2015.3.4-5.
(94) 小瀬村俊也,大場匠悟,金子信悟,望月康正,田邉豊和,松本 太,鵜川晋作,イホジン, 高電圧・高容量Li過剰系固溶体正極材料への水系バインダーの適用と電池性能の向上, 表面技術協会第131回講演大会, 関東学院大学, 2015.3.4-5.
(93) 伊藤拳人,森田千絵,金子信悟,田邉豊和,松本 太, Cu/Ni多層めっきにおけるめっき層の構造と耐摩耗性の関係, 表面技術協会第131回講演大会, 関東学院大学, 2015.3.4-5.
(92) 小林拳人,金子信悟,川上博司,齋藤美和,田邉豊和,松本 太, 湿式法により作製したフレキシブル熱電材料の熱電変換特性, 表面技術協会第131回講演大会, 関東学院大学, 2015.3.4-5.
(91) 松本 太,小瀬村 峻也,井戸 功二,大場 匠悟,望月 康正,田邉 豊和,金子 信悟鵜川 晋作,イ ホジン, 水系バインダー/種々の増粘剤を用いて作製した高電圧・高容量Li過剰系固溶体系正極の電池特性, 電気化学会第82回大会, 横浜国立大学, 2015.3.15-17.
(90) 田邉 豊和, 宮澤 亘, ジョン ディーバガン アロキン, 郡司 貴雄, 金子 信悟, 宮内 雅浩,松本 太, Pt-Pb合金微粒子担持ルチル型TiO2ナノロッド光触媒の合成及び助触媒担持法の違いによる酢酸の光酸化分解活性への影響, 電気化学会第82回大会, 横浜国立大学, 2015.3.15-17.
(89) ジョン ディーバガン アキロン, 田邉 豊和, 郡司 貴雄, 金子 信吾, 梅澤 直人, 阿部 英樹, 松本 太, 可視光応答型Sn3O4光触媒粉末における助触媒担持効果と犠牲剤水溶液からの水素生成, 電気化学会第82回大会, 横浜国立大学, 2015.3.15-17.
(88) 郡司 貴雄,田邉 豊和,金子 信悟, 松本 太, 種々の金属酸化物に担持した白金系金属間化合物ナノ粒子のORR触媒活性, 電気化学会第82回大会, 横浜国立大学, 2015.3.15-17.
(86) 松本 太, 固体/溶液界面における電子移動反応を利用したエネルギー変換〜研究機関の役割と共同研究〜, 古河電工株式会社, 2014.10.22.
(85) 松本 太, Pt系金属間化合物の固体高分子形燃料電池用電極触媒への適用, 大学/産技センター連携「電気化学応用エネルギー技術フォーラム」平成26年度神奈川県ものづくり技術交流会, 神奈川県産業技術センター, 2014.10.23.
(84) 松本 太, Pt系金属間化合物の固体高分子形燃料電池用電極触媒への適用,名古屋カンファレンス「未来を動かす電子移動化学」日本化学会東海支部, 名古屋工業大学, 2014.12.12.
(83) 松本 太, Pt系金属間化合物の固体高分子形燃料電池用電極触媒への適用,電気化学会関東支部サイエンスレクチャー, 電気化学会(市ヶ谷), 2015.2.10.
(82) 松本 太, 固体/溶液界面における電子移動反応を利用したエネルギー変換, JSR株式会社先端材料研究所, 2015.3.6.
(81) Genki Kobayashi, Yuta Irii, Futoshi Matsumoto, Atsushi Ito, Shinji Yamamoto, Masaharu Hatano, Yuichi Sato, Surface and Bulk Structures of Li-Rich Layered Oxides, xLiMO2 – (1-x)Li2MnO3, Coated with Al2O3, The 64th Annual Meeting of the International Society of Electrochemistry(Santiago de Querétaro, Mexico, 2013.9.8-13).
(80) Yuichi Sato, Genki Kobayashi, Yuta Irii, Nobuya Kitada, Futoshi Matsumoto, Ryo Ohtsu, Kohei Shibukawa, Atsushi Ito, Shinji Yamamoto, Yasuhiko Ohsawa, Surface Modification Effect on Electrochemical Performance of Li-rich Layered xLi2MnO3-(1-x)LiMO2, The 64th Annual Meeting of the International Society of Electrochemistry(Santiago de Querétaro, Mexico, 2013.9.8-13).
(79) Arokim John Jeevagan, 郡司貴雄,臼井将, Govindachetty Saravanan, 津田喬史,金子信悟,小林玄器,松本太,Methanol and Ethanol Oxidation on Ordered Intermetallic Compounds in Alkaline Media(電気化学会2013年度秋季大会), 東京工業大学, 2013.9.27-28.
(78) 松本太, 鈴木優季子, 村越恵理香, 斧淵俊明, Govindachetty Saravanan, Arokim John Jeevagan, 金子信悟, 小林玄器,遷移金属イオンをドープしたマンガン酸化物の空気電池用空気極触媒への適用(電気化学会2013年度秋季大会), 東京工業大学, 2013.9.27-28.
(77) 小林玄器,渡邉明尋,松本太,佐藤祐一, Li過剰系正極Li[Li0.2Ni0.18+xCo0.03Mn0.58-x]02の充放電挙動と電極特性(電気化学会2013年度秋季大会), 東京工業大学, 2013.9.27-28.
(76) 郡司貴雄, Govindachetty Saravanan, 臼井将, Arokim John Jeevagan, 津田喬史, 金子信悟, 小林玄器, 松本太, 金属間化合物の固体高分子型燃料電池用カソード電極触媒としての適用(電気化学会2013年度秋季大会), 東京工業大学, 2013.9.27-28.
(75) 津田喬史,Govindachetty Saravanan,橋本真成,Arokim John Jeevagan,郡司貴雄,金子信悟,小林玄器,松本太,金属間化合物助触媒/光触媒の合成と触媒特性(電気化学会2013年度秋季大会), 東京工業大学, 2013.9.27-28.
(74) 松本 太,井澤圭介, 金子信悟, 持田由幸, Govindachetty Saravanan,Arockiam John Jeevagan,木村元彦,小林玄器,佐藤祐一, Ni/Cu多層膜の耐摩耗性の膜厚依存性および中間層の影響(表面技術協会第128回講演大会),福岡工業大学,2013.9.24-25.
(73) Takao Gunji, Govindachetty Saravanan, Shingo Kaneko, Genki Kobayashi, Futoshi Matsumoto,,Enhanced Catalytic Oxygen Reduction Performance from Titania Supported PtPb Nanoparticles, 224nd Meeting of ECS, San Francisco, 2013.10, 27-11.1.
(72) Arockiam John Jeevagan, Govindachetty Saravanan, Toshiaki Onobuchi,Yukiko Suzuki, Erika Murakoshi, Shingo Kaneko, Genki Kobayashi, Futoshi Matsumoto , Electrocatalytic Oxygen Reduction and Water-Oxidation on Transition Metal Ions-Doped MnO2, RuO2 and IrO2 in Alkaline Aqueous Solutions, 224nd Meeting of ECS, San Francisco, 2013.10, 27-11.1.
(71) Takashi Tsuda, Govindachetty Saravanan, Arockiam John Jeevagan , Masanari Hashimoto, Shingo Kaneko, Genki Kobayashi, Futoshi Matsumoto, Synthesis of Intermetallic Nanoparticles as Co-catalyst on Anatase TiO2 and Its Photocatalytic Activity, 224nd Meeting of ECS, San Francisco, 2013.10, 27-11.1.
(70) Toshiaki Wakao, Yasumasa Mochizuki, Govindachetty Saravanan, Arockiam John Jeevagan, Kunihito Baba, Mitsuhiro Watanabe, Yusuke Kanda, Koh Murakami, Masaya Omura, Genki Kobayashi, Futoshi Matsumoto, Stable Charge/Discharge Cycle Performance of LiFePO4 Cathode Prepared with Carboxymethly Cellulose Binder, 224nd Meeting of ECS, San Francisco, 2013.10, 27-11.1.
(69) Arockiam John Jeevagan, Naoyuki Sawano, Govindachetty Saravanan, Takao Gunji, Shou Usui, Taiki Kojima, Shingo Kaneko, Genki Kobayashi, Futoshi Matsumoto, Two-step Microwave Synthesis of Highly Dispersed Ordered Intermetallic PtPb Nanoparticles on Carbon Black, 224nd Meeting of ECS, San Francisco, 2013.10, 27-11.1.
(68) 津田喬史, 橋本真成, Arockiam John Jeevagan, 郡司貴雄, 金子信悟, 宮内雅浩, 松本 太, 金属間化合物ナノ粒子助触媒/WO3光触媒の合成と触媒特性(第20回記念シンポジウム「光触媒反応の最近の展開」),東京大学生産技術研究所コンベンションホール,2013.12.13.
(67) 松本 太, 郡司貴雄, FC EXPO 2014, 金属間化合物ナノ粒子の固体高分子形燃料電池用電極触媒への適用,東京ビックサイト,2014.2.26-28.
(66) 松本 太,津田喬史,橋本真成,Arockiam John Jeevagan,金子信悟2,宮内雅浩, PtPb金属間化合物助触媒/WO3光触媒の合成と触媒特性, 表面技術協会第129回講演大会,東京理科大学野田キャンパス,2014.3.13-14.
(65) 松本 太,若尾駿志, 望月康正, 金子信悟, 渡辺充広, 馬場邦人, 神田雄介, 大村雅也, 村上 更, 粗面化アルミニウム集電体を用いたリチウム二次電池用正極/水系バインダー薄膜の作製と性能評価, 表面技術協会第129回講演大会,東京理科大学野田キャンパス,2014.3.13-14.
(64) 佐藤 静夏, 藤井大地, 金子信悟,松本 太, アルミニウム電気めっき膜の陽極酸化による規則性ポーラス構造の作製, 表面技術協会第129回講演大会,東京理科大学野田キャンパス,2014.3.13-14.
(62) 森田千絵, 井澤圭介, 金子信悟,佐藤祐一,松本 太,Ni/Cu多層膜におけるCuおよびNi層の結晶性と耐摩耗性の関係, 表面技術協会第129回講演大会,東京理科大学野田キャンパス,2014.3.13-14.
(61) 横溝美衣子, 金子信悟, 望月康正,嵐田敏彦, 笹元貴弘, 松本 太,スパッタリング法を用いたリチウムイオン伝導固体電解質リン酸リチウムオキシナイトライド(LiPON)薄膜の作製と性能評価, 表面技術協会第129回講演大会,東京理科大学野田キャンパス,2014.3.13-14.
(60) 橋本 真成, 津田 喬史, 郡司 貴雄, Arockiam John Jeevagan, 金子 信悟, 松本 太, 白金系金属間化合物を助触媒とした光触媒の合成と光触媒活性の評価(2), 電気化学会第81回大会,関西大学, 2014.3.29-31.
(59) 郡司 貴雄, 津田 喬史, Arockiam John Jeevagan, 金子 信悟, 松本 太, 金属酸化物担持白金系金属間化合物の燃料電池用酸素極触媒への適用, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(58) 郡司 貴雄, 佐々木 謙悟, 津田 喬史, Arockiam John Jeevagan, 金子 信悟, 松本 太, 酸化チタン担持白金系合金触媒を用いた酸素還元特性の向上, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(57) 鈴木優季子, 坂井啓介, 入井友海太,郡司貴雄, 津田喬史, Arockiam John Jeevagan, 金子信悟, 松本 太, 空気電池用空気極触媒としてのカーボン担持高分散金属酸化物の合成とBifunctional 特性, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(56) 金子信悟, Bingbo Xia, 松本 太, 佐藤祐一, Junwei Zheng, Decheng Li, 高レート特性を発揮するリチウム過剰層状正極材料のサイズ制御前駆体に基づく合成, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(55) 郡司 貴雄, 臼井 将, 津田 喬史, Arockiam John Jeevagan, 金子 信悟, 松本 太, マイクロ波ポリオール2段階法を用いた Pt3Pb コア-PtPb シェル構造を有する ナノ粒子の合成と電極触媒活性の向上, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(54) 郡司 貴雄, 津田 喬史, Arockiam John Jeevagan, 金子 信悟, 松本 太, マイクロ波ポリオール 2段階法を用いて 調製したPt系金属間化合物の電極触媒特性, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(53) 岸岡真也,大園裕也,渡邊庄元,松本 太,��田 伶子,鈴木 優季子, 芳香族ジアミン類のAu(111)での電解重合:構造と酸素還元触媒反応, 電気化学会第81回大会,関西大学, 2014.3.29-31.
(50)松本 太, “機能性ナノ粒子を用いた新しいエネルギー変換材料の創出“, 神大テクノフェスタ, (神奈川大学),2013.12.6.
(49) Genki Kobayashi, Kohei Shibukawa, Yuta Irii, Futoshi Matsumoto, Atsushi Ito,Yasuhiko Ohsawa, Masaharu Hatano, and Yuichi Sato, Surface Coating Effect on Electrochemical Performance of Li-Rich Layered Li[Li0.2Ni0.18Co0.03Mn0.58]O2, (Poster) IMLB 2012, Korea, Jeju, 2012.6.19.
(48) Y. Irii, G. Kobayashi, T. Kataoka, T. Ikehara, F. Matsumoto, A. Ito, Y. Ohsawa, M. Hatano, and Y. Sato, Study on Phase Diagram of Li-Rich Layered Li[Li0.2Ni0.18Co0.03Mn0.58]O2 (Poster), PRiME 2012(222nd Meeting of ECS), Hawaii, 2012.10, 8.
(47) K. Izawa, F. Matsumoto, M. Kimura, M. Fukunishi, G. Kobayashi and Y. Sato, The Wear Resistance Property of Cu/Ni Multilayer Films Prepared by Electrodeposition in Single and Dual Baths, IUMRS-International Conference on Electronic Materials (IUMRS-ICEM 2012), Pacifico Yokaohama, Yokohama, 2012.9.23-28.
(46) F. Matsumoto and H. Abe, Application of Ordered Intermetallic Phases to Electrocatalysis, IUMRS-International Conference on Electronic Materials (IUMRS-ICEM 2012), Pacifico Yokaohama, Yokohama, 2012.9.23-28.
(45) Yuichi Sato, Atsushi Ito, Masaharu Hatano, Hideaki Horie, Yasuhiko Ohsawa,Genki Kobayashi , Futoshi Matsumoto, RETENTION OF HIGH CAPACITIES OF A LI-RICH SOLID SOLUTION LAYERED CATHODE MATERALS (Li2MnO3–LiMO2) FOR LI-ION SECONDARY BATTERIES VIA ELECTROCHEMICAL PRE-TREATMENT, IUPAC 8th International Conference on Novel Materials and Synthesis (NMS-VIII) & 22nd International Symposium on Fine Chemistry and Functional Polymers (FCFP-XXII), Xi’An, 2012.10.14-19.
(44) 小林玄器,入井友海太,北田暢也,大津 諒,渋川晃平,松本 太,伊藤淳史,大澤康彦,山本伸司,佐藤祐, 酸化物表面修飾を施したリチウム過剰系正極xLi2MnO3-(1-x)LiMO2の電気化学特性 (第53回電池討論会), ヒルトン福岡シーホーク, 2012.11.14-16.
(43) 小林玄器, 入井友海太, 北田暢也, 松本 太, 伊藤淳史, 山本伸司, 秦野正治, 佐藤祐一, リチウム過剰系正極材料における表面修飾の効果(電気化学会第80回大会), 東北大学, 2013.3.29-31.
(42) 斧淵俊明, Govindachetty Saravanan, 小林玄器, 松本 太, 種々の遷移金属をドープしたマンガン酸化物の合成と空気電池用酸素極触媒への適用, (電気化学会第80回大会), 東北大学, 2013.3.29-31.
(41) 津田喬史, GovindachettySaravanan, 小林玄器, 松本 太, 白金系金属間化合物担持光触媒の合成(電気化学会第80回大会), 東北大学, 2013.3.29-31.
(40) 井澤圭介, 木村元彦, 福西美香, 小林玄器, 佐藤祐一, 松本 太, Cu/Ni 多層めっき膜における耐摩耗性向上およびナノ周期パターンの制御(表面技術協会第127回講演大会), 日本工業大学,2013.3.18-19.
(39) 森田雄二, 河野智洋, 小林玄器, 佐藤祐一, 松本 太, 電気化学反応を用いたマイクロ自立移動体の開発(表面技術協会第127回講演大会), 日本工業大学,2013.3.18-19.
(36) <国際学会招待講演>Futoshi Matsumoto, Hideki Abe, Application of Ordered Intermetallic Phases to Electrocatalysis, PRiME 2012(222nd Meeting of ECS), Hawaii, 2012, 10, 9.
(30) 松本 太,“リチウムイオン2次電池におけるシリコン負極材を利用した電極の特性とバインダー”、「リチウム二次電池におけるシリコン系負極の結着性向上技術 〜バインダーの分散、劣化機構/集電銅箔の表面処理/電極剥離対策〜」、技術情報協会セミナー(東京、大井町), 2013.3.27.
(27) 松本 太, 阿部秀樹,紀之定 壮大,五十嵐優也, 有機分子の酸化および酸素分子の還元反応における電極触媒Pt3Ti金属間化合物ナノ粒子の検討, 2011年電気化学秋季大会(朱鷺メッセ・新潟コンベンションセンター), 2011.9.9.
(25) F. Matsumoto, H. Abe, S. Kinosada, Preparation and Characterization of Carbon-supported Ordered Intermetallic Pt3Ti Nanoparticles for the Oxygen Reduction in PEFCs, Electrochemical Society, 220th ECS Meeting(Westin Boston Waterfront and the Boston Convention and Exhibition Center), 2011.10.10.
(24) A. Watanabe, F. Matsumoto, G. Kobayashi, M. Fukunishi, Y. Sato, A. Ito, Y. Ohsawa, Relationship between Electrochemical Pre-Treatment and Cycle Performance on Li-Rich Solid-Solution Layered Li[Ni0.18Li0.20Co0.03Mn0.58]O2 Cathode Materials for Li-Ion Secondary Battery, Electrochemical Society, 220th ECS Meeting(Westin Boston Waterfront and the Boston Convention and Exhibition Center), 2011.10.10.
(23) 松本 太,渡邉明尋,佐藤祐一,小林玄器,伊藤淳史,大澤康彦,秦野正治,固溶体系正極材料Li[Ni0.18Li0.20Co0.03Mn0.58]O2 における電気化学段階的前処理条件と充放電特性の関係,第52回電池討論会(タワーホール船堀), 2011.10.17-20.
(22) 松本 太, 阿部秀樹,紀之定 壮大,小林玄器,金属間化合物を用いた固体高分子形燃料電池用電極触媒の開発, 第52回電池討論会(タワーホール船堀), 2011.10.17-20.
(21) 伊藤淳史, 蕪木智裕, 大澤康彦, 渡邉学, 真田貴志, 千葉啓貴, 秦野正治, 堀江英明, 松本太, 佐藤祐一, 高容量電池用固溶体正極の電気化学特性, 第52回電池討論会(タワーホール船堀), 2011.10.17-20.
(20) 木村元彦, 松本 太, 福西美香, 小林玄器, 佐藤祐一, Cu/Ni多層膜の耐摩耗性の向上における中間層の効果, 表面技術協会第125回講演大会(東京都市大学), 2012.3.13-14.
(19) 河野 智洋, 松本 太,小林 玄器, 電気化学反応を利用した自立型移動体(マイクロマシーン)の開発, 電気化学会第79回大会,(アクトシティ浜松), 2012.3.29-31.
(18) 松本 太, 市村 尚之, 小林 玄器, 固体高分子形燃料電池用アノード触媒としての白金系金属間化合物の高電位状態での安定性, 電気化学会第79回大会,(アクトシティ浜松), 2012.3.29-31.
(17) 小林玄器,渋川晃平,入井友海太,松本 太,佐藤祐一,伊藤敦史,秦野正治,大澤康彦, 酸化物コーティングを施したLi過剰系固溶体正極Li[Li0.2Ni0.183Co0.03Mn0.583]O2の電極特性, 電気化学会第79回大会,(アクトシティ浜松), 2012.3.29-31.
(15) 松本 太, 金属間化合物の電極触媒への応用, 2011年電気化学秋季大会(朱鷺メッセ・新潟コンベンションセンター), 2011.9.9.
(12) 松本 太,CMC・アクリル酸バインダーの特徴と電池特性に及ぼす影響,「リチウムイオン電池バインダーの設計・調整および分析・評価手法」セミナー,サイエンス&テクノロジー(東京, 東京流通センター), 2012.1.26.
(10) 福西美香,松本 太,佐藤祐一,一浴法,二浴法によるCu/Niナノオーダー多層めっき膜の耐摩耗性,表面技術協会,第122回講演大会(東北大学), 2010. 9. 5.
(9) M. Fukunishi, F. Matsumoto, Y. Sato, The Influence of Impurities of Cu/Ni Multilayers Prepared by Electrodeposition in Single and Dual Baths on Wear Resistance,MRS-J, 20th MRS-Japan Academic Symposium (Yokohama Media & Communications Center), 2010.12.20.
(8) Y. Irii, F. Matsumoto, Y. Sato, Y. Ohsawa, A. Ito, Improvement of the Thermal Stability and High Rate Cycle Performance of Li[Ni0.18-xLi0.20Co0.03-yMn0.58-zMx+y+z]O2 Cathode of Li-ion Battery by Metal Substitution,MRS-J, 20th MRS-Japan Academic Symposium (Yokohama Media & Communications Center), 2010.12.20.
(7) A. Watanabe, F. Matsumoto, Y. Sato, Y. Ohsawa, A. Ito, Effect of Electrochemical Pretreatment on Battery Performance of Li[Ni0.18Li0.20Co0.03Mn0.58]O2 Cathode Materials for Li-ion Battery (I),MRS-J, 20th MRS-Japan Academic Symposium (Yokohama Media & Communications Center), 2010.12.20.
(4) 松本 太, 阿部秀樹,紀之定 壮大,Pt3Ti金属間化合物を用いた固体高分子形燃料電池用電極触媒の開発,,電気化学会第78回大会(横浜国立大学), 2011.3.29. (8) 渡邉明尋,松本 太,佐藤祐一,大澤康彦, 伊藤淳史,リチウムイオン二次電池用固溶体正極活物質Li[Ni0.18Li0.20Co0.03Mn0.58]O2における電気化学段階的前処理と充放電特性の関係,電気化学会第78回大会(横浜国立大学), 2011.3.29.
(3) 北田暢也,入井友海太,松本 太,佐藤祐一,大澤康彦, 伊藤淳史,リチウムイオン二次電池用固溶体正極活物質Li[Ni0.18Li0.20Co0.03Mn0.58]O2のレート特性の向上,電気化学会第78回大会(横浜国立大学), 2011.3.29.
(2)福西美香,河野琢磨,松本 太,佐藤祐一,CMCバインダーを用いたリチウムイオン二次電池用シリコンアノードにおける充放電特性のアノード被膜形態,表面技術協会第123回講演大会(関東学院大学), 2011. 3. 17. | 2019-04-21T06:19:35Z | http://apchem2.kanagawa-u.ac.jp/matsumotolab/index51.html |
BTS Pleural Guideline Group ii18 Management of spontaneous pneumothorax: British Thoracic Society pleural disease guideline A MacDuff, A Arnold. Guidelines for the management of spontaneous pneumothorax. Standards of Care Committee, British Thoracic Society. BMJ. Jul 10;()– Management of spontaneous pneumothorax: British Thoracic Society Pleural Disease Guideline MacDuff A(1), Arnold A, Harvey J; BTS Pleural Disease .
Catheter drainage of spontaneous pneumothorax: Treatment of AIDS-related spontaneous pneumothorax. Do not close the catheter. Other catheters can be used if they have several holes in the last 10 cm of the catheter tip.
Remove the needle from the catheter and connect the catheter to a 50— ml syringe Luer lock. Usually it is not necessary to drain a haemothorax before transportation to a hospital.
This recognition and management of this complication is discussed later in the session.
Effectiveness of bleomycin in comparison to tetracycline as pleural sclerosing agent in rabbits. Usually seen in trauma patients and in connection with mechanical ventilation btss resuscitation.
Parietal pleurectomy for recurrent spontaneous pneumothorax.
Consider spontaneous pneumothorax as a cause for acute chest pain and dyspnoea in young smokers as well as in patients with chronic obstructive pulmonary disease. Needle aspiration is less likely to succeed for secondary pneumothoraces 15 and is only recommended in this setting if the patient has a small pneumothorax cm in size and minimal symptoms. Surgical management of pneumothorax in patients with acquired immunodeficiency syndrome.
Immediate and long-term results after surgical treatment of primary spontaneous pneumothorax by VATS. Symptomatic patients and those with large pneumothoraces, whether primary or secondary, require intervention. Patients discharged from the Emergency Department following a spontaneous pneumothorax should ideally be reviewed by a respiratory physician after 2 weeks.
Safer insertion of pleural drains. Subcutaneous emphysema may be present a crepitation on pressing the skin. Leave a Reply Cancel reply You must be logged in to post a comment. A comparative study of the physiology and physics of pleural drainage systems. Results from 82 patients. However, it is highly user dependent and for patients with suspected spontaneous pneumothoraces, radiography has the advantage of identifying unexpected causes of pleuritic pain eg infection, carcinoma.
Time course of resolution of persistent air leak in spontaneous pneumothorax. Evidence for destruction of lung tissues during Pneumocystis carinii infection. Copyright and License information Disclaimer. For patients with COPD, fixed concentration oxygen should be administered. Pleural abrasion via axillary thoracotomy in the era of video assisted thoracic surgery.
The pain radiates to the ipsilateral shoulder. Pneumothkrax BTS guidelines recommend use of a cannula no greater than 16G in diameter for aspiration though evidence that larger cannulae are more likely to cause a persistent pleural leakis limited. The risk of percutaneous chest tube thoracostomy for blunt thoracic trauma. These are solid objects and on the left side the apex of the heart lies close to the insertion point! It is safest to make an incision with a lancet and then use the finger to make the way to the pleural space.
Nd-YAG laser pleurodesis via thoracoscopy.
Management of spontaneous pneumothorax-a Welsh survey. The most useful investigation is the PA chest radiograph despite the fact that it tends to under-estimate the size of a pneumothorax by virtue of it being a 2-dimensional image of a 3-dimensional structure. Pathophysiology, diagnosis, and management. Bbts pulmonary vascular tbs as a cause of re-expansion edema in rabbits. Closing the gap between research and practice: Management of spontaneous pneumothorax with small bys catheter manual aspiration.
A radiograph taken during expiration may be helpful. Active treatment drainage or aspiration is indicated in other types of pneumothorax if one of the following conditions is fulfilled: Minimally invasive management for first and recurrent pneumothorax. Whichever technique is used the landmarks are the same. Onset of symptoms in spontaneous pneumothorax: Subcutaneous and mediastinal emphysema. Guidelines for the management of spontaneous pneumothorax. Acute ventilatory failure from massive subcutaneous emphysema.
Results of a Department of Veterans Affairs cooperative study. Role of CT in the management of pneumothorax in patients with complex cystic lung disease.
Enthalten sind auch die Regeln für alle Erweiterungen und die Varianten. . 2. BattleLore:: BattleLore – Machtkartenkompendium () By: DarkPadawan. Battlelore bei | Günstiger Preis | Kostenloser Versand ab 29€ für + wirklich sehr gute Regeln, die das Spiel transparent darstellen, und auch auf. BattleLore 2nd Edition. • Battles of Napoleon: Der Adler und der Löwe (n) , • Battles of Napoleon: The Eagle and the Lion, • Battles of Westeros.
Files – Sorted By Title Sort: War of the Ring 2nd Ed. A Deck-Building Adventure Game. Krieg der Magier Brettspiel. Mutant Revolution Board game. Based on positive feedback to our our mounted mapboard releases, we are offering mounted maps for several of our most popular games as P items.
The Vikings Tile-Laying Game. Kill Doctor Lucky Anniversary Edition. The Golden Age of Piracy dt. City of Thieves Revised Edition.
The Tree Spirits 2nd Ed. Escape from the 9th Dimension. Anatomy Park – The Game. Final Days of an Empire. The Defeat of Smaug. The Iron Age with Mediterranean Expansion. If you want to play most complicated version, see Hachi-Hachi. Humanity’s Last Gasp Boxed Edition.
Dominion – Base Game – Inlay for sleeved Cards. Architects of the West Kingdom Architects Since I struggled groking the new battle rules from Pilot Academy from the documentation I made a small reference for myself.
German U-Boats at War, – 2nd Printing.
Way of the Gun. Legend of the Kami Masters.
Escape from Shaddy Pines. Please read and feel free to comment on any errors and mistakes I made. A Modern Crime Rgeeln Game. The Inkblot Party Game. Infinte Space 2 – Garthans vs.
Guardian Boxed Card Game. It has been your support, financial and otherwise, that has allowed this site to become what it is today. A Deck-Building Adventure Game: Dice Batttlelore Game 2nd Ed. Who Time Travelling Boardgame. Wenn ich das Spiel auspacke, entnehme ich die Kupferkarten und lege das neue Inlay ein.
Please read with all card list. The Battle of Bulge. No Sanctuary – The Boardgame.
Lords of the Sea. A Race for Survival. Combat Oriented Armored League. Battle for the Petri Dish. Adventures on the Red Planet. Trading and Negotiation in the Elysian Quadrant. A Cell Biology Game.
Journeys in the Dark Conversion Kit. Please select a support frequency. All four “X’s” are included in this game. Submarines in the Pacific, Echoes of the Past.
Espionage and Deception in the Cold War. Murder in Hong Battlwlore. Battle for the Underdark. I supported because… “My indispensable resource for rules checks and sharing info.
William Jaeger, partner and owner of Freemark Abbey Winery, has a crop of Riesling grapes that are close to ripening with a possible rainstorm approaching. ✅. William Jaeger. spouse and proprietor of Freemark Abbey Winery. has a harvest of Riesling grapes that are close to maturing with a . FREEMARK ABBEY WINERY CASE ANALYSIS. Subject: Quantitative Techniques III Professor: Prof. Bhavin J. Shah Group No: 3 Date.
If he harvests the grapes now. With so many options. Jaeger if he decides not to harvest and the storm does come down on his vineyard. Now to observe the options available to Mr. We’ll occasionally send you account related and promo emails. Jaeger come to a determination? Now that all the possible net incomes have been found for the storm really go oning.
Neither option is very enticing compared to the other options so far, but that is part of the risk.
On the other hand, if the mold is not present in the storm, then he runs the risk of oversaturating the grapes which would result in a thin, lower quality wine. There is a opportunity that the storm will really look.
Jaeger to leave the grapes on the vine to mature longer, thereby giving them a better quality to make better wine. Finance General Management Marketing. No Storm Now to detect the options available to Mr. He considers renegotiating the television contract.
If he harvests the grapes now, he will avoid the rainstorm altogether, and have a respectable type of grape that would get him a good return on his decision. This is the least risky of the options because he knows what he can get if he harvested the grapes right now.
It is therefore, my recommendation that he wait to harvest his grapes to see if the storm comes, and what comes of the grapes at that time. Accessed December 31, As you can see, this holds the greatest opportunity for profit.
Click to learn more https: Hi there, would you like to get such a paper? On the other manus.
Jaeger has 3 more possibilities open to him. With the storm not coming, this still allows Mr. How to cite this page Choose cite format: William Jaeger, partner fredmark owner of Freemark Abbey Winery, has a crop of Riesling grapes that are close to ripening with a possible rainstorm approaching.
We’ll occasionally send you account related and promo emails. The monetary values at which the vino would sell at each sugar content degree is as follows: Addressing the possibilities available to Mr.
The determination does come with higher hazard. How about getting full access immediately? Neither option is really alluring compared to the other options so far. Freemark produces 1, cases per year of Riesling wine, which equates to 12, bottles. So the profit margin for the grapes containing the mold is as follows: Addressing the possibilities available to Mr. The decision does come with higher risk, but the odds are in Abbfy.
Recall that the chances that the storm would hit wereso that is what should be used to figure the total EMV of the decision to not harvest. We have received your request for getting a sample. Storm with No Mold: Cite View Details Educators Purchase.
Their relative prices would depend on the uncertain preference of consumers two years later, when the wine is bottled and sold. This is the least hazardous of the options because he knows what he can acquire if he harvested the grapes right now.
Bradley and William S. Jaeger if the storm does non incorporate the cast. Finance Globalization Health Care.
View and Download Siemens 6RA22 operating instructions manual online. Converter with microprocessor in circulating-current-free inverse-parallel connection. Siemens 6RA22 Pdf User Manuals. View online or download Siemens 6RA22 Operating Instructions Manual. Siemens 6RA22 Manual – Northern Read more about northern, siemens, manual, industrial, industrialreliable and spares.
This is a 40 A unit specially modified for this application. In diesem Fall ist der Drehzahlregler auf unkritische Werte einzustellen. The ramp time setting range can be adjusted by means of capacitor C Ende des Drehzahlabgleiches bei Betrieb ohne Tachogenerator. Please allow additional time if international delivery is subject to customs processing.
Plug-in type terminal blocks are provided for the signal connections. When carrying out work on the connected load, the equipment main switch or the plant-side automatic circuit-breaker must be secured in the OFF position by means of a padlock.
Sign up for newsletter. Folgende Voraussetzungen liegen zugrunde: The permissible P gain is lower for EMF control tacho-less operation than for speed control with tachogenerator. Der Feldstrom-Sollwert wird mit dem Potentiometer “V” eingestellt. This item may be a floor model or an item that has been returned to the seller after a period of use. In particular the general erection and safety regulations e.
You have clicked on the “? Only qualified personnel should work on or around this equipment after becoming thoroughly familiar with all warnings, safety notices and maintenance procedures contained in these operating instructions.
Description Postage and payments. In dieser Stellung wird Stromgrenze Null vorgegeben.
Your country’s customs office can offer more details, or visit eBay’s page on international trade. Measure motor speed and turn potentiometer “V” cw until the loaded motor speed equals the no-load speed.
Condensation is excluded, since the components are certified for humidity rating F. The machine manufacturer must be consulted before choosing the smoothing reactor required in the armature circuit.
Reglerfreigabe wird vorgegeben, LED “Rf” leuchtet. Rated DC current Phase fuses Field fuses e.
Connect the equipment as shown in the appendix Reference input and adjustment of the maximum operating speed refer to 7. The commutating reactors recommended guarantee conformance with VDE Specifications as regards to reaction on the system, and can be matched to the relevant machine rating. The specific requirements regarding equipment earthing shall be taken from the appropriate safety regulations e.
For mwnual with take-over field weakening operation both units can be combined with a field weakening controller U For housing dimensions and fixing dimensions, see Section 5.
Report item – opens in a new window or tab. The rear of the U-shaped housing is bolted to the mounting surface.
All connections are brought out to the lower equipment side. This arrangement can save space if several drives are to be combined to form a unit. Insbesondere sind sowohl die allgemeinen Errichtungs- und Sicherheitsvorschriften zu Arbeiten an Starkstromanlagen z. Before commencing maintenance or commissioning work all energy sources of the converter power supply shall be switched off and locked.
Further measures may be necessary for special applications or operating conditions.
The position of jumper plug C4-C5-C6 determines whether the reference signal is entered via the ramp generator or applied direct to the speed controller: Modules contain electrostatically sensitive components Contact addresses For orders: Your subscription request is being processed.
This amount is subject to change until you make payment. Bei negativer 6ea22 ist der Tachogenerator umzupolen. Allowable degree of fouling 2 for modules and power section. No external references or actual values are required. Please log in and try again. In this case, the R and R bridging resistances 0 ohms must be mabual. Add to Watch list Watching Watch list is full.
Fortune Fortune and love befriend the bold. Help keep our servers running In special cases e. CAUTION Incorrect installation of the units, inadequacy of the cooling air inlet or an inadequate clearance with respect to other equipment can lead to destruction of the equipment as a result of overheating. Some tips for better mznual results Please give me a feedback.
The Genee Vision is a powerful visual presentation and training tool. It’s powerful zoom function, 22x optical and 10x digital allows users to view text. Genee Vision HD – Quick Start Guide Genee Vision – Manual | Quick Start Guide Genee Vision – Software and drivers. Video Cap. We want customers to get the most out of ours products so we have put together a range of helpful resources to assist you. If you experience.
Reduce preparation times for meeting by not having to photocopy. Combined with the digital zoom you can zoom up to x.
Description Applications Benefits Specifications Reviews 0. Genee Vision Elite — Visualiser Visualisers. Special software is required for this operation.
The Presenter can personalise the presentation by annotating over the live Visualiser feed, zooming in and out to view every detail, moving the Visualiser camera around to show different angles or by adding more objects for comparison. The possibilities are endless. The Genee Vision is powerful, robust and full of useful features that will enhance your presentation including: Great for dark rooms The Genee Vision is equipped with two LED arm lights as well as a backlight that sheds light on objects so you can display information from things like 3D objects, books, photo films and x-rays even in a dark room.
Page 7 Connect to the first video equipment with S-Video input. Use the computer RS cable 9-pin to 9-pin to make the connections shown below to control the visualiser from an external computer.
The Genee Vision is an affordable desktop visualiser. To prevent fire or shock hazard, do not expose the unit to rain or moisture. The Genee Vision is powerful, robust and full of useful features that will enhance your presentation including:.
Rotate the camera head clockwise until the camera head is parallel to the camera stand. Fold the right arm light down first onto the base, then the left arm down. Refer to qualified personnel for service only. Seamless Integration A Genee Vision Visualiser seamlessly integrates with your projector, interactive whiteboard, interactive touch screen and video conferencing system. We’ll assume you’re ok with this, but you can opt-out if you wish. Connect to the first video equipment with S-Video input.
Genee Vision — Visualiser. To prevent electrical shock, do not open the cabinet. Please call us for additional information. Effortless The Genee Vision allows you to effortlessly 610 source materials, pictures and 3D objects and present them to your audience. Animation When the Visualiser is combined with the Geneemation stop-motion animation software it can be used to create stop-frame animation.
With all these possibilities and many more, the Genee Vision Visualiser has to be one of the most flexible presentation tools available. Also See for Manual – 27 pages. Reviews There are no reviews yet.
Request demo Request Callback. Easy to use Not all of us are experts when it comes to understanding new equipment, however, the Genee Vision is extremely user friendly. Don’t show me this message again. Page 8 Use the computer RS cable 9-pin to 9-pin to make the connections shown below to control the visualiser from an external computer.
Combine with split screen and freeze frame to view genee sides of an object then remove object from underneath camera. Add to my manuals Add.
For technical assistance please call or email Tel: FOCUSING When the visualiser is turned on the focus automatically adjusts to the stage, it is not necessary to readjust the focus if you are only working with flat materials text, photos, etc.
The ability to see, understand and question are key attributes in the learning process. Audiences prefer to be involved rather than be just watching endless static presentations. If you cannot switch tenee inputs by pressing this button, you need to manually program the RS code into the visualiser.
Page 15 FOCUSING When the visualiser is turned on the focus automatically adjusts to the stage, it is not necessary to readjust the focus if you are only working with flat materials text, photos, etc.
Got it, continue to print. Page 24 For technical assistance please call or email Tel: The one touch buttons provide easy access to the Visualiser functions and if you prefer to be mobile, you can even use the intuitive remote control. Page of 24 Gennee. Also See for Genee Genee Manual 27 pages. You can take pictures and record videos, which can then be uploaded to an online resource area or kept for future reference. Only 3D object require a focus adjustment.
Please connect the projector RS cable between the projector and the visualiser first. Enter text from picture: Great for magnification The powerful 22x optical zoom function allows you to see detail that is not often visible to the human eye.
Find the most up-to-date version of IETF RFC at Engineering IETF RFC ‘The Network Access Identifier’. . IETF RFC “UTF-8, a transformation format of ISO “. . 3GPP TS “Wireless Local Area . References IETF RFC ‘Criteria for Evaluating AAA Protocols for Network Access’. IETF RFC IETF RFC ‘The Network Access Identifier’.
Any explicit references within that referenced document should also be listed: Relationship with other existing or emerging documents:. Configure the following parameters as desired, then click Apply. Committed to connecting the world. For details, see Configuring Hotspot Advertisement Profiles. Other for any supplementary information: The hotspot realm uses EAP Notification messages for authentication.
Iehf an existing profile from the list of profiles on the profile details pane or create a new profile by entering a profile name into the entry blank, then clicking Add.
Relationship with other existing or emerging documents: Name of the NAI realm. The realm name is often the domain name of the service provider.
Protected Extensible Authentication Protocol. All RFCs always remain available on-line. Select one of the options below to identify the EAP authentication method supported by the hotspot realm. EAP Method – Identity.
Justification iwtf the specific reference: Other useful information describing the “Quality” of the document:. Other useful information describing the “Quality” of the document: To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.
Authentication with a single-use password. In the profiles list, expand the Wireless LAN section. Justification for the specific reference:.
Feedback Contact Us Accessibility. Clear description of the referenced document:. The degree of stability or maturity of the tfc. Credential – Soft Token. Current information, if any, about IPR issues:.
Credential – Hardware Token. EAP Method – Notification. Comments on RFCs and corresponding changes are accommodated through the existing standardization process. Reserved for Future use.
Current information, if any, about IPR issues: Any explicit references within that referenced document should also be listed:.
EAP Method – Crypto-card. The degree of stability or maturity of the document: Other for any supplementary information:. Clear description of the referenced document: The specified iehf ID uses credential authentication.
text mode) Added the password of ‘support’ user for D-Link DSLU and possibly other nec versa mt nikon d 80 pdf Auto to manual conversions rus. Connectivity • Built-in ADSL2+ modem for connecting to your high-speed broadband Internet connection • Four 10/ BASE-TX MDI/MDIX RJ port to. D-Link DSLU (last letter is region version as far as I Out of the box device came with really old firmware so I downloaded latest from FTP.
Solid Green Powered device connected to associated port Joined Feb 18, Messages 8, Solid Green WAN port is connected. Manuual give multiple routers the same model number, and have no hardware version checking in their firmware updates. Slow Flashing DSL attempting synch. The wireless modem router front panel contains control buttons and status LEDs. Big Giveaway – Win prizes worth R3, Here are what green lights should be on if everything is working: Red If It Can’t.
Added ability to specify the address of PPTP-server host name. Blocked access to the device for Telnet using the account “user”. I just had a similar issue with a Mega router where an XP pc with wireless USB dongle could not access the internet.
Thread starter calvincoetzee Start date Dec 9, Tags u d-link dlink dslu firmware. Correction of errors in the function of PPTP-client.
Joined Dec 15, Messages 18, Joined Mar 10, Messages 2. On 25540u page “Device Info” added information on the release date Release Date. The algorithm works with SYN packets in networks of providers.
You may get a better response from the forum if you post a new thread with a subject such as “d-link router disconnects all the ddsl as this thread is more about a specific model and your issues could be more generlised – e. Tim the Techxpert Expert Member Dec 10, June 7, File Name: January 20, File Name: What’s new New posts New profile posts Latest activity.
July 30, File Name: The DSL status light will flash. As you can see, Power and DSL lights should be a solid green. Joined Oct 23, 240u 5, A factory reset managed to reset the device IP back to the default value, however the landing page now prompts for a firmware flash.
Big Giveaway – Russ prizes worth R3, Set the firmware version, not related to your device, can lead to unusable. November 29, File Name: If you use PPPoA-connection does not open some sites corrected. Members Current visitors New profile posts Search profile posts.
When in use, the Ethernet as well as Internet light will be Latest firmware is at ftp: Correction of errors when trying to use PPTP-client as the default gateway. Forums New posts Search forums. Forums New posts Search forums. After the power light turns solid white or green, your device is manjal and back up and running, now with the default password listed above for your model. Thread starter Barge Start date Dec 1, Multicast traffic is now blocked by a wireless interface 3. Device is either off or DSL failed to connect.
Barge Well-Known Member Dec 3, November 7, File Name: November 25, File Name: Just a friendly warning Thanks for the replies, Ru went ahead and made contact with D-Link who kindly emailed me the firmware for the device.
Maccaferri Strong Face gabions are an excellent solution for use when a. Whereas Maccaferri Double Twist woven steel wire mesh gabions are used in demanding engineering and geotechnical applications, welded gabions are. A Maccaferri gabion is a name given to a type of gabion produced by the Maccaferri family. In , in Casalecchio di Reno near Bologna, Italy, for the first time.
Installation Gabions are gaboins to site flat-packed, where upon they are assembled, placed into position, and filled with a hard durable rock. Brochures Maccaferri Gabions Brochure. We are the undisputed global leader in the manufacture, design and supply of gabion baskets.
MacSoil MacSoil is a prismatic or trapezoidal gabion element engineered from double twisted hexagonal woven steel wire gabilns. Slope analysis mass wasting landslide Deformation monitoring automated. Maccaferri gabion baskets are made from high quality steel wire, which is heavily galvanised to provide long term corrosion protection. Geotechnical engineering Building materials Warfare of the Middle Ages.
This maccafdrri has brought the Maccaferri technology and technical expertise to all countries of the worldwith a direct presence in more than forty countries on all continents. Please contact your local Maccaferri subsidiary for details on the compliance and certification in your area. On-site Cone penetration test Standard penetration test Monitoring well piezometer Borehole Crosshole sonic logging Nuclear densometer test Static load testing Trial pit.
Maccaferri Gabions are a durable and adaptable option for soil erosion and bank stabilisation projects. Maccaferri Gabions are a trusted, technically sound way to retain earth and combat soil erosion.
Gabion — Strong Face Maccaferri Strong Face gabions are an excellent solution for use when a gabion wall, or revetment gahions a stronger than normal face. Shop My Account Login Register. Retrieved from ” https: Onsite Installation Training To protect the quality of your project, Geofabrics provides on-site installation training as well as guidelines and diagrams to assist contractors.
September Learn how and when to remove this template message. Unsourced material may be challenged and removed. Friday, 25 May – 8: Hard dense quarried stone in the size range of mm to mm is normally used to fill gabion baskets. Macaferri are increasingly being used in architectural applications as well.
Maccaferri Gabions are rectangular woven wire mesh baskets that can be gabins with rock to create flexible, permeable structures such as retaining walls for architectural, mining, industrial and road projects. Redbank Station Slope Repair. Applications Gabions can be used in a variety of different applications from mass gravity retaining walls in highway projects to architectural feature walls.
Roma Flood Levee Stage 2.
Maccaferri Gabion baskets are rectangular wire mesh cages manufactured gabins double twisted hexagonal mesh that are site filled with hard durable rock to form an earth retaining structure. The tubular units are filled with gabion stone at the project site and laced tightly shut. Cone penetration test Standard penetration test Monitoring well piezometer Borehole Crosshole sonic logging Nuclear densometer test Static load testing Trial pit. Our new PA6 polymer coating has been added to our range of protective gabion to offer a solution to those projects that require improved environmental and technical performance to the existing PVC and HDPE coated mesh products on the market.
ReadyMac The ReadyMac Gabion is a specific basket, prefilled with gabion stone, ready maccafefri be deployed straight into the works. The units can be used where there are higher loads within the gabion structure or in situations where a higher abrasion resistance is required on the face of the gabion.
Advantages Maccaferri Gabions can be stepped, vertical or battered to suit your project.
jaccaferri Maccaferri Gabions can withstand high shear stresses and earth pressures and can be easily adapted to site conditions. Identical in concept to our regular gabions, Jumbo Gabions are just much larger! Maccaferri Gabions have been widely used across Australasia for over 50 years. Tuesday, 27 March – 3: There are numerous uses for these modular units and are typically used to form flexible, permeable and monolithic maccaferi such as retaining walls, channel linings, hydraulic control structures and erosion protection.
Gabions have also been shown to provide a good balance between engineering requirements and environmental considerations for earth retaining walls in rivers, along roads and railways. Soil liquefaction Response spectrum Seismic hazard Ground—structure interaction. Their strength comes from a double twisted hexagonal mesh of steel wire, reinforced by heavier gauge wire along the edges and internal diaphragms. Views Read Edit View history. Keep up to date with the latest from Geofabrics by subscribing to our newsletter.
Gabions can be used in a variety of different applications from mass gravity retaining walls in highway projects to architectural feature walls. Jumbo Gabion Our Jumbo Gabions are used on large scale civil engineering projects where large volumes of gabions are to be constructed.
Before World War IIa process of diversification started with acquisitions in various industrial fields, but the erosion control sector remain the core business.
They are also permeable eliminating the main cause of instability of soil retaining structures. Maccaferri gabions are cages which are engineered from double twisted hexagonal woven steel wire mesh. At the beginning of the 20th century, the Maccaferri family purchased a patent for a new type of box gabion, so called Palvis Gabbioni a scatola Palvis and started the industrial production and introduction on a vast scale of gabions and mattresses for civil engineering use.
Our gabions are manufactured in our factories around the world. Inin Casalecchio di Reno near Bologna, Italyfor the first time large amounts of wire mesh Maccaferri sack gabions were used to repair dams destroyed by a flood of the river Reno.
Products Sectors Solutions Shop. Manukau Golf Course Residential Development.
2 1. ABOUT THE TRAINING SITE DESCRIPTION OF THE COMPANY ASELSAN A.Ş. As a developer of statü of the art Land, Air, Naval and Space. Aselsan Staj Aselsan Staj. November 14, | Author: hittaf_05 | Category: Drilling, Machining, Welding, Bending, Share Embed Donate. Report this link. of a company (like TUBITAK) or different departments of a company (like ASELSAN) is not . You report should start with a Cover Page and Table of . of the grades on the “Staj Değerlendirme Formu” must be at least 7.
The contact scheme incorporates a brush assembly aslesan make direct electrical contact with the electrically conductive paths of the coded disk to read address information.
In addition, increasing gain adds components, cost, complexity. At about 1 0E slip at the knee ofthe curve we get maximum torque and power transfer from the motor.
On the side of the conductor where the lines of flux are not opposing each other, the magnetic field will be made stronger. The number of notches corresponds to the number of poles in the stator. For example, assume the command signal was to drive the load at rpm.
As movement is increased increasing frequency of motion the far end of the yard stick will bend in aselean attempt to keep up with your hand movements. The rotor construction enables this type of motor to rotate at the same speed in synchronization as the stator field.
We can see by this curve that the aelsan produces zero torque at synchronous speed because there is no slip. If the volume knob is low, the sound is soft low gain; if the volume is turned up high, the sound is loud high gain.
And in order that the machine will perform without excessive overshoot, settle within adequate time periods, aslesan have minimum steady state error, the servo must be adjusted or compensated. Second week I always go to the maintance and repair division and I repair 3 servo motor driver box, I learnt doing perfect soldering in there.
If the frequency of the sound heard is low base drumthere is no difficulty in hearing the sound. Electronic processing can be used to transform this signal into a square pulse train. WEB sayfalarndan indirilen belgelerle bir staj defteri oluturulur. What applications use the closed loop technique? If you are thinking in terms of conventional currentflow positive to negative then, using your right hand point your thumb in the direction of the current flow and yourfingers will wrap around the conductor in the same direction of the flux lines.
Field proven servo systems developed by ASELSAN are presently deployed in dozens of systems ranging from 20 kg precision stabilized positioning systems to 20 ton main battle tank turrets.
Systems that assume motion has taken place or is in the process of taking place are termed “open loop”. Gain is a ratio of output versus input. On the side of the coil where the lines of flux oppose each other, the magnetic field will be made weaker. A command signal which is issued from the user’s interface panel comes into the servo’s “positioning controller”. An open loop drive is one in which the signal goes “in one direction only”. The self excited motor may be called reluctance synchronous includes a rotor with notches, or teeth, on the periphery.
Therefore, a servo involves several devices. These additional components do add to initial cost an increase in productivity is typically not considered when investigating cost. Size px x x x x In its saelsan located in Macunk9y and in its ,ranch offices in: As an example, sselsan a home stereo system.
The current from the DC power source flows from the positive lead, through the brush labeled A1 through one commutator section, through the armature coil, through the other commutator section, through the brush labeled A2 and back to the negative lead.
Lack of understanding does give the impression to the user of difficulty. The number of lines is determined by the positional accuracy required in the application.
These low power level signals must be amplified: A low torque to rapogu ratio limits this motor type to less demanding incrementing start-stop applications. Those that require control over a variety of complex motion profiles. This other “device” is either a tachometer, resolver or encoder providing a signal which is “sent back” to the controller. The first assumption is that power is applied onto the motor and the second is that the motor shaft is free to rotate.
This power is supplied to the servo control amplifier from the “power supply” which simply converts AC power into the required DC level.
More than 20 years of experience have placed Atten at the technological forefront of tools for soldering and rework operations in tion. Find great deals on eBay for ATTEN Soldering Station in Professional Soldering ATTEN ATD V W Hot Air SMD Rework & Soldering Station Dual. Find great deals for Atten Atd Professional Hot Air Rework and ATTEN AT D V W Hot Air SMD Rework & Soldering Station Dual LCD 2.
Hot air gun is compatible with various kinds of nozzles. Atten ATD 14 Reviews.
Atten Soldering Tip, round, sloped, 1. If the part is less than 0. Shenzhen Liyang Welding Equipment Co. We will match the same price and in addition you will benefit from the excellent Batronix Service!
Three groups of stored data facilitate usage. China a d station Attem air station new China the station. Atten Nozzle, SOP mil. Found a cheaper offer?
There is english manual or guide video that show you how to use machine. Atten Soldering Tip, round, sloped, 0.
Atten Nozzle, single, bent. Atten Nozzle, SOP – mil. Sleep mode, automatic switch-off for energy saving. Send you the proforma invoice and confirm your order. Our factory owns 2 brandsLy and Bauer. Delivery including station, set of 4 nozzles, brackets, soldering handle, power cable and user manual.
Negotiate and confirm the final priceshippingpayment methods and other terms. Atten Nozzle, round, 7. Atten Soldering Tip, chisel, 0. Time day 7 To be negotiated. Free parts send to you in machine warranty period.
Consult us about this product on line or by e-mail. Atten Soldering Tip, chisel, 1. Malfunction alert displaying H-E for heating elements and S-E for sensor.
Atten Soldering Stten, round, sloped, 4. Make the payment according to the method put on proforma invoice. Very easy and flexible! It is easy to operate, user- friendly and greatly space-saving. We wish you a Merry Christmas and a happy new year! China station ltd China hot air station China station hot. Atten Soldering Tip, round, sloped, 2.
Keys for temperature and air flow 850d2 placed right on the handle. We provide you the friendly English User manual or operating videos for free. Atten Soldering Tip, conical, 0. Send your order by air or by sea. No need to pay for customs duties and VAT. Atten Soldering Tip, round, sloped, 3. We can arrange shipment by sea. Cold air and stopping heating. | 2019-04-19T13:23:33Z | http://fc-gubkin.ru/category/business/page/2/ |
A method for defining patterns in an integrated circuit comprises defining a plurality of features in a first photoresist layer using photolithography over a first region of a substrate. The method further comprises using pitch multiplication to produce at least two features in a lower masking layer for each feature in the photoresist layer. The features in the lower masking layer include looped ends. The method further comprises covering with a second photoresist layer a second region of the substrate including the looped ends in the lower masking layer. The method further comprises etching a pattern of trenches in the substrate through the features in the lower masking layer without etching in the second region. The trenches have a trench width.
This application claims the benefit of U.S. Provisional Patent Application 60/666,031 (filed 28 Mar. 2005). The entire disclosure of this priority application is hereby incorporated by reference herein.
This application is related to U.S. patent application Ser. No. 10/932,993 (filed 1 Sep. 2004; Attorney Docket MICRON.293A; Micron Docket 2003-1435.00/US), U.S. patent application Ser. No. 10/934,778 (filed 2 Sep. 2004; Attorney Docket MICRON.294A; Micron Docket 2003-1446.00/US), U.S. patent application Ser. No. 10/931,771 (filed 31 Aug. 2004; Attorney Docket MICRON.295A; Micron Docket 2004-0068.00/US), U.S. patent application Ser. No. 10/934,317 (filed 2 Sep. 2004; Attorney Docket MICRON.296A; Micron Docket 2004-0114.00/US), U.S. patent application Ser. No. ______ (filed concurrently herewith; Attorney Docket MICRON.313A; Micron Docket 2004-1065.00/US), U.S. Provisional Patent Application 60/662,323 (filed 15 Mar. 2005; Attorney Docket MICRON.316PR; Micron Docket 2004-1130.00/PR), and U.S. patent application Ser. No. 11/134,982 (filed 23 May 2005; Attorney Docket MICRON.317A; Micron Docket 2004-0968.00/US). The entire content of all of these related applications is hereby incorporated by reference herein.
The present invention relates generally to integrated circuit fabrication, and more specifically to masking techniques.
Integrated circuits are continuously being made smaller as demand for portability, computing power, memory capacity and energy efficiency in modern electronics grows. Therefore, the size of the integrated circuit constituent features, such as electrical devices and interconnect line widths, is also decreasing continuously. The trend of decreasing feature size is evident in memory circuits or devices such as dynamic random access memory (“DRAM”), flash memory, nonvolatile memory, static random access memory (“SRAM”), ferroelectric (“FE”) memory, logic gate arrays and so forth.
For example, DRAM typically comprises millions of identical circuit elements, known as memory cells. In its most general form, a memory cell typically consists of two electrical devices: a storage capacitor and an access field effect transistor. Each memory cell is an addressable location that can store one binary digit (“bit”) of data. A bit can be written to a cell through the transistor and read by sensing charge on the storage electrode from the reference electrode side. By decreasing the sizes of constituent electrical devices and the conducting lines that access them, the sizes of the memory devices incorporating these features can be decreased. Thus, storage capacities can be increased by fitting more memory cells into the memory devices.
As another example, flash memory (for example, electrically erasable programmable read only memory or “EEPROM”) is a type of memory that is typically erased and reprogrammed in blocks instead of one byte at a time. A typical flash memory comprises a memory array, which includes a large number of memory cells. The memory cells include a floating gate field effect transistor capable of holding a charge. The data in a cell is determined by the presence or absence of the charge in the floating gate. The cells are usually grouped into sections called “erase blocks.” The memory cells of a flash memory array are typically arranged into a “NOR” architecture (each cell directly coupled to a bit line) or a “NAND” architecture (cells coupled into “strings” of cells, such that each cell is coupled indirectly to a bit line and requires activating the other cells of the string for access). The cells within an erase block can be electrically programmed in a random basis by charging the floating gate. The charge can be removed from the floating gate by a block erase operation, wherein all floating gate memory cells in the erase block are erased in a single operation.
The pitch of a pattern is defined as the distance between an identical point in two neighboring pattern features. These features are typically defined by openings in, and spaced from each other by, a material, such as an insulator or conductor. Thus, pitch can be understood as the sum of the width of a feature and the width of the space separating that feature from a neighboring feature.
In one embodiment of the present invention, a method for defining patterns in an integrated circuit comprises defining a plurality of features in a first photoresist layer using photolithography over a first region of a substrate. Pitch multiplication is used to produce at least two features in a lower masking layer for each feature in the photoresist layer. The features in the lower masking layer include looped ends. A second photoresist layer covers a second region of the substrate including the looped ends in the lower masking layer. A pattern of trenches is etched in the substrate through the features in the lower masking layer without etching in the second region. The trenches have a trench width.
In another embodiment of the present invention, a method of making a plurality of conductive lines in an array comprises providing a film stack. The film stack includes a substrate in contact with a plurality of conductive plugs, an insulating film overlying the conductive plugs, a lower mask layer overlying the insulating film, and an array of spacers formed over the lower mask layer. A sacrificial film is deposited over the lower mask layer and the array of spacers. A secondary mask is formed over a portion of the sacrificial film. The secondary mask defines an opening in the array of spacers. The lower mask layer and the sacrificial film can be etched selectively with respect to the secondary mask. The sacrificial film is etched and a portion of the lower mask layer is exposed. The method further comprises etching the lower mask layer and exposing a portion of the insulating film. A plurality of trenches are etched in the insulating film, the lower mask layer, and the sacrificial film to expose at least a portion of the conductive plugs. A blanket metal deposition is performed. A planar surface is then formed, alternating between metal and insulating film in a damascene process.
In another embodiment of the present invention, a method of pitch multiplication for damascene features in an integrated circuit comprises providing a substrate. A first masking process is performed to define an array of spacer lines over the substrate. The spacer lines are separated by a plurality of gaps. A second masking process is performed to block a portion of the spacer lines and that defines a plurality of interconnects in a logic region of the integrated circuit. A plurality of trenches are etched in the gaps between the spacer lines. A metal layer is deposited to form a plurality of metal lines in the gaps between the spacer lines. The integrated circuit is provided with a substantially planar surface in a damascene process.
In another embodiment of the present invention, a method of forming integrated circuit components on a substrate comprises using a lithographic technique to pattern a first resist layer and define a plurality of lines. A pitch multiplication technique is used to form a pattern of spacers around a region defined by the plurality of lines. The spacers comprise elongate loops having loop ends. A second resist layer is deposited over the loop ends to define a blocked region of the substrate. The method further comprises selectively etching through the spacers to from a plurality of trenches in the substrate without etching in the blocked regions.
Exemplary embodiments of the integrated circuits and integrated circuit fabrication techniques are illustrated in the accompanying drawings, which are for illustrative purposes only. The drawings comprise the following figures, which are not necessarily drawn to scale. In the figures like numerals indicate like parts.
FIG. 1A is a cross-sectional view of a substrate having a plurality of mask lines formed thereon.
FIG. 1B is a cross-sectional view of the substrate of FIG. 1A after an anisotropic etch process transferring the mask pattern into a temporary layer.
FIG. 1C is a cross-sectional view of the substrate of FIG. 1B after removal of the mask lines and an isotropic “shrink” etch.
FIG. 1D is a cross-sectional view of the substrate of FIG. 1C after blanket deposition of a spacer material of mandrels left in the temporary layer.
FIG. 1E is a cross-sectional view of the substrate of FIG. 1D after a directional spacer etch process to leave pitch-multiplied features or spacers.
FIG. 1F is a cross-sectional view of the substrate of FIG. 1E after removal of the mandrels.
FIG. 2 is a schematic top view of an exemplary partially formed integrated circuit.
FIG. 3 is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 2 after forming a plurality of pitch-multiplied features in and over the substrate.
FIG. 4 is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 3 after forming an insulating film thereover.
FIG. 5 is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 4 after forming a hard mask layer thereover.
FIG. 6A is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 5 after forming a plurality of spacers thereover.
FIG. 6B is a schematic top view of the partially formed integrated circuit of FIG. 6A.
FIG. 7 is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 6A after deposition of a bottom antireflective coating (“BARC”) thereover.
FIG. 8A is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 7 after formation of a second photoresist pattern thereover.
FIG. 8B is a schematic top view of the partially formed integrated circuit of FIG. 8A.
FIG. 9 is a schematic, cross-sectional side view of the partially formed integrated circuit of FIG. 8A after etching the bottom antireflective coating.
FIG. 10A is a schematic, view of the partially formed integrated circuit of FIG. 9 after etching the hard mask layer through the spacers and the second photoresist pattern; the view is a cross-section taken along a line perpendicular to a spacer loop.
FIG. 10B is a schematic view of the partially formed integrated circuit of FIG. 9 after etching the hard mask layer through the spacers and the second photoresist pattern; the view is a cross-section taken along the length of a spacer loop.
FIG. 11 is a schematic, cross-sectional view of the partially formed integrated circuit of FIG. 10A after etching insulating film and removing the photoresist, the BARC and the spacers.
FIG. 12 is a schematic, cross-sectional view of the partially formed integrated circuit of FIG. 11 after deposition of a conductive material thereover.
FIG. 13 is a schematic, cross-sectional view of the partially formed integrated circuit of FIG. 12 after a chemical mechanical planarization process is performed.
FIG. 14 is a flowchart illustrating an exemplary process for forming certain of the integrated circuit structures disclosed herein.
FIG. 15 is a schematic top view of a partially formed integrated circuit including spacer loops and a metal layer.
FIG. 16 is a schematic, cross-sectional view of the partially formed integrated circuit of FIG. 13, further including an overhead contact between the array region and the peripheral region.
FIG. 17A is a layout view of a first mask formed by a photolithographic process; the first mask defines a plurality of mandrels.
FIG. 17B is a layout view of a spacer pattern obtained by performing a pitch multiplication technique on the mandrels of FIG. 17A.
FIG. 17C is a layout view of a partially formed integrated circuit formed by application of a second metal mask to the spacer pattern of FIG. 17B.
The continual reduction in feature size places ever greater demands on techniques used to form the features. For example, photolithography is commonly used to pattern features, such as lines, on a substrate. The concept of pitch can be used to describe the size of these features. Due to optical factors such as light or radiation wavelength, however, photolithography techniques have a minimum pitch below which features cannot be formed reliably. Thus, the minimum pitch of a photolithographic technique can limit feature size reduction.
Pitch doubling is one method proposed for extending the capabilities of photolithographic techniques beyond their minimum pitch. Such a method is illustrated in FIGS. 1A-1F and is described in U.S. Pat. No. 5,328,810 (issued 12 Jul. 1994), the entire disclosure of which is incorporated herein by reference. With reference to FIG. 1A, photolithography is first used to form a pattern of lines 10 in a photoresist layer overlying a layer 20 of a temporary or expendable material and a substrate 30. Common wavelengths which are used in performing the photolithography include, but are not limited to, 157 nm, 193 nm, 248 nm or 365 nm. As shown in FIG. 1B, the pattern is then transferred by an etch step, such as an anisotropic etch step, to the temporary layer 20, thereby forming placeholders or mandrels 40. The photoresist lines 10 can be stripped and the mandrels 40 can be isotropically etched to increase the distance between neighboring mandrels 40, as shown in FIG. 1C. A layer 50 of spacer material is subsequently deposited over the mandrels 40, as shown in FIG. 1D. Spacers 60 are then formed on the sides of the mandrels 40 by preferentially etching the spacer material from the horizontal surfaces in a directional spacer etch, as shown in FIG. 1E. The remaining mandrels 40 are then removed, leaving behind only the spacers 60, which together act as a mask for patterning, as shown in FIG. 1F. Thus, where a given pattern area formerly defined one feature and one space (each having a width F, for a pitch of 2F), the same pattern area now includes two features and two spaces, as defined by spacers 60 (each having a width ½F, for a pitch of F). Consequently, the smallest feature size possible with a photolithographic technique is effectively decreased by using the pitch doubling technique.
While the pitch is actually halved in the example above, this reduction in pitch is conventionally referred to as pitch “doubling,” or, more generally, pitch “multiplication”. That is, conventionally “multiplication” of pitch by a certain factor actually involves reducing the pitch by that factor. The conventional terminology is retained herein. Note that by forming spacers upon spacers, the definable feature size can be further decreased. Thus, pitch multiplication refers to the process generally, regardless of the number of times the spacer formation process is employed.
Because the layer 50 of spacer material typically has a single thickness 90 (see FIGS. 1D and 1E), and because the sizes of the features formed by the spacers 60 usually corresponds to that thickness 90, the pitch doubling technique typically produces features of only one width. However, integrated circuits often include features of different sizes. For example, random access memory circuits typically contain arrays of memory cells and logic circuits in the so-called “periphery”. In the arrays, the memory cells are typically connected by conductive lines and, in the periphery, the conductive lines typically contact landing pads for connecting arrays to logic. Peripheral features such as landing pads, however, can be larger than the conductive lines. Additionally, peripheral electrical devices such as transistors are preferably larger than electrical devices in the array. Moreover, even if peripheral features can be formed with the same pitch as the array, the flexibility required to define circuits will typically not be possible using a single mask, particularly if the patterns are limited to those that can be formed along the sidewalls of resist patterns.
Some proposed methods for forming patterns at the periphery and at the array involve three separate masks. For example, in one method, a first mask and pitch doubling are used to form a spacer pattern, which typically comprises spacer loops in one region of a chip, such as the array region of a memory device. Then, a second mask is performed to form a second pattern in another region of the chip, such as the peripheral region of a memory device. This second peripheral pattern is formed in a layer overlying the spacer pattern. This covers the central portion of the spacer loops while the looped ends of the spacers are left exposed to an etching process. Then, a third mask is performed to form a third pattern that includes interconnects in and/or from the peripheral region. Both the “chopped” spacer pattern and the third pattern are then transferred to an underlying masking layer which can be etched relative to an underlying substrate. This allows features having different sizes—as compared to each other and as compared to the spacer loops—to be formed in the circuit peripheral region. Such features include, for example, interconnect patterns. These features can overlap with the spacer loops, can be consolidated with features in the circuit array region, and can be subsequently etched.
In accordance with the foregoing, improved techniques have been developed for forming features of different sizes, especially pitch-multiplied features having overlapping patterns.
In certain embodiments, part of the feature pattern to be transferred to a substrate has a pitch below the minimum pitch of the photolithographic technique used for processing the substrate. Additionally, certain embodiments can be used to form devices having arrays of electrical devices, including logic or gate arrays and volatile and non-volatile memory devices such as DRAM, read only memory (“ROM”), flash memory and gate arrays. In such devices, pitch multiplication is usable to form, for example, transistor gate electrodes and conductive lines in the array region of the chips, while conventional photolithography is usable to form larger features, such as contacts, at the peripheries of the chips. Exemplary masking steps in the course of fabricating a memory device are illustrated in the figures and are described herein.
FIG. 2 shows a top view of an exemplary partially fabricated integrated circuit 100, such as a memory chip. A central array region 102 is surrounded by a peripheral region 104. It will be appreciated that, after the integrated circuit 100 is fabricated, the array 102 will typically by densely populated with conducting lines and electrical devices such as transistors and capacitors. Pitch multiplication can be used to form features in the array region 102, as discussed herein. On the other hand, the peripheral region 104 optionally includes features larger than those in the array region 102. Conventional photolithography, rather than pitch multiplication, is typically used to pattern these larger features, examples of which include various types of logic circuitry. The geometric complexity of the logic circuits located in the peripheral region 104 makes using pitch multiplication difficult. In contrast, the regular grid typical of array patterns is conducive to pitch multiplication. Additionally, some devices in the peripheral region 104 may require larger geometries due to electrical constraints, thereby making pitch multiplication less advantageous than conventional photolithography for such devices. In addition to possible differences in relative scale, the relative positions, and the number of peripheral regions 104 and array regions 102 in the integrated circuit 100 can vary in other embodiments.
FIG. 3 shows a partial cross-sectional view of the partially fabricated integrated circuit of FIG. 2, including portions of the array region 102 and the peripheral region 104. Using a photolithography technique, a plurality of trenches are etched into a substrate 108, and these trenches are filled with an insulator 105, such as an oxide. The insulator 105 is a field isolation layer, and in an exemplary embodiment is a shallow trench isolation (“STI”) layer deposited in a high density plasma (“HDP”), spin-on dielectric (“SOD”), flow-fill or TEOS process. In an exemplary embodiment, the SOD is deposited and densified.
An upper interlevel dielectric (“ILD”) insulator 106 is formed over the substrate, and contact is made through the ILD 106 by etching contact holes and filling with conductive plugs 110. In one embodiment, the conductive plugs 110 comprise polycrystalline silicon, although other electrically conductive materials can be used in other embodiments. Portions of an etch stop layer 112, such as a nitride layer, are disposed over the insulator 106; the etch stop layer 112 is used in the formation of the conductive plugs 110. In certain embodiments, the insulator 105 is aligned with the substrate/plug interface. However, in other embodiments the insulator 105 extends slightly above the substrate/plug interface, as illustrated in FIG. 3.
In the exemplary embodiment illustrated in FIG. 3, the feature size in the array region 102 is smaller than the feature size in the peripheral region 104. In one embodiment, the conductive plugs 110 have a feature size of approximately 50 nm. In a preferred embodiment, the conductive plugs 110 have a feature size between approximately 30 nm and approximately 100 nm. More preferably, the conductive plugs have a feature size between approximately 32.5 nm and approximately 65 nm. Other feature sizes for the conductive plugs 110 can be used in other embodiments. Additional details regarding the techniques used to form the conductive plugs are provided in U.S. patent application Ser. No. ______(filed concurrently herewith; Attorney Docket MICRON.313A; Micron Docket 2004-1065.00/US).
As illustrated in FIG. 4, an insulator film 114 in which damascene trenches are to be formed is deposited over the film stack illustrated in FIG. 3. In one embodiment, the insulator film comprises an un-doped oxide film, such as an oxide film deposited from tetra ethyl ortho-silicate (“TEOS”), while in other embodiments the insulator film comprises a doped oxide film, such as BPSG or PSG. Other non-oxide insulators can be used in still other embodiments. In an exemplary embodiment, the insulator film 114 is deposited to a thickness corresponding to the conductor height to be formed in the integrated circuit.
As illustrated in FIG. 5, a hard mask layer 116 is deposited over the insulator film 114. In one embodiment, the hard mask layer 116 comprises amorphous silicon, although other materials can be used in other embodiments.
As illustrated in FIG. 6A, a plurality of spacers 118 are formed over the hard mask layer 116. In an exemplary embodiment, the spacers are formed using a pitch doubling technique such as that illustrated in FIGS. 1A through 1F, using the disclosed photoresist mask, transfer to a temporary layer, isotropic etch and spacer process. In an exemplary embodiment, the spacers comprise a low temperature oxide material that can be etched selectively with respect to the underlying hard mask layer 116. For example, in one embodiment the spacers are deposited at a temperature less than about 400° C. In another embodiment, the spacers are deposited using an atomic layer deposition process. Exemplary materials for the spacers include silicon oxide, silicon nitride, polycrystalline silicon and carbon.
Between the spacers 118 are gaps 120 that correspond to regions of the integrated circuit where conductive material is to be deposited. In the exemplary embodiment illustrated in FIG. 6A, the gaps 120 are vertically aligned with the conductive plugs 110.
In an exemplary embodiment, the spacing between the spacers 118 and the gaps 120 varies between the array region 102 and the peripheral region 104 of the integrated circuit 100. This is further illustrated in FIG. 6B, which schematically shows a top view of the spacers 118 and the intervening gaps 120. FIG. 6B also illustrates that the spacers 118 generally follow the outline of the lines formed in the photo definable layer, thereby forming a plurality of looped ends 124.
As illustrated in FIG. 7, a BARC 122 is applied over the spacers 118. The BARC 122 is optionally applied in a spin-on process, thereby providing a substantially planar surface. After the BARC 122 is applied over the spacers 118, a second mask is applied. The second mask results in a pattern of photoresist 126 being deposited over the integrated circuit. The photoresist pattern defines a blocked region that blocks the looped ends 124 of the spacers 118 and defines one or more openings 128 in the peripheral region 104. This is illustrated in FIGS. 8A (side view) and 8B (top view). As illustrated in FIG. 8B, in an exemplary embodiment the second mask is spaced apart from the spacers 118 by a gap 120 a, and is spaced apart from the spacer looped ends 124 by a gap 120 b. The gaps 120 a, 120 b accommodate misalignment of the second mask with respect to the spacer pattern.
In an exemplary embodiment, the minimum width of the openings 128 depends on the native resolution of the photolithographic process, which in one embodiment is as low as 100 nm, which in another embodiment is as low as 65 nm, and which in another embodiment is as low as 45 nm. Other dimensions can be used in other embodiments. In an exemplary embodiment, the spacers 118 in the circuit array region 104 are sufficiently spaced apart to allow contacts 132 to be “landed” to provide interconnections to other levels of the integrated circuit.
In an exemplary embodiment, after the second mask is performed, the BARC 122 is etched, as illustrated in FIG. 9. In a modified embodiment, the pattern defined by the second mask, including the blocked region, is transferred to an intermediate layer before etching the BARC. In such embodiments intermediate layer or the BARC alone is used to block the looped ends 124 of the spacers 118.
The BARC etch is followed by an etch of the hard mask layer 116, which can be selectively etched with respect to the spacers 118. The resulting structure is illustrated in FIG. 10A (which is a cross-sectional view taken along a line perpendicular to a spacer loop) and in FIG. 10B (which is a cross-sectional view taken along the length of a spacer loop). In one embodiment, the hard mask etch is a dry etch process. This is followed by successive removal of the photoresist 126 and BARC 122, followed by an oxide etch. In such embodiments, the oxide etch will remove both the spacers 118 and exposed portions of the insulator film 114. The conductive plugs 110 provide an etch stop. The resulting structure, which is illustrated in FIG. 11, includes a pattern of trenches exposing the conductive plugs 110 in the array region 102, and a pattern of other openings 128 in the hard mask layer 116 in the peripheral region 104. This sequence advantageously lowers the effective aspect ratio for the trenches. In a modified embodiment, the insulator film 114 illustrated in FIGS. 10A and 10B is etched without prior removal of the spacers 118. The BARC 122 is optionally omitted in embodiments wherein the substrate material is not reflective.
Regardless of how the trenches are formed, the etch processes illustrated in FIGS. 10A, 10B and 11 advantageously consolidate two mask patterns: the pattern formed by the spacers 118 in the array region 102, and the pattern formed by the photoresist 126 in the peripheral region. This effectively forms a superposition of two distinct patterns, which allows etching through the gaps 120 between the spacers 118 in regions of the integrated circuit 100 not covered by the second photoresist layer 126.
As illustrated in FIG. 12, in an exemplary embodiment conductive material 130 is then deposited over the partially formed integrated circuit. Optionally, the hard mask layer 116 is removed before deposition of the conductive material 130. Suitable conductive materials include, but are not limited to, titanium, titanium nitride, tungsten, tantalum nitride and copper. In an exemplary embodiment, the conductive material 130 is deposited to a thickness sufficient such that the widest trench width in the periphery is filled. After deposition of the conductive material, a chemical mechanical planarization (“CMP”) process is used to separate the conductors in the trenches and provide the integrated circuit with a planar surface. The resulting structure is illustrated in FIG. 13.
A flowchart illustrating an exemplary process for forming certain of the integrated circuit structures disclosed herein is provided in FIG. 14. As illustrated, a plurality of features are defined in a first resist layer in an array region of the memory device in an operational block 150. Examples of resist layers that can be used to define the features are photoresist layers and imprinted resist layers. Based on these features, pitch multiplication is used to define a plurality of spacer loops in a lower masking layer in an operational block 152. In a modified embodiment, the spacer loops are formed over the patterned resist features, although this is less preferred because resist is generally unable to withstand spacer deposition and etch processes. The ends of the spacer loops are blocked with a second resist layer that also defines features in a periphery region of the integrated circuit in an operational block 156. After the second resist layer is applied, an insulating layer in the gaps between the spacers is etched, the etching being performed in a pattern defined by the second resist layer in an operational block 158. A metal fill and subsequent CMP process can then be performed over the partially-formed integrated circuit in an operational block 160, thereby allowing metal lines to be formed in the integrated circuit array region (operational block 162) and electrical interconnects to be formed in the integrated circuit peripheral region (operational block 164). The interconnects are optionally used to connect integrated circuit components, such as logic components, within the periphery. Alternatively, the second mask can define other patterns, such as capacitors, contacts, resistors, simultaneously with blocking the spacer loops.
In certain embodiments, the peripheral interconnects are also optionally used to form electrical connections between the array region 102 and the peripheral region 104. This is illustrated in operational block 166 of FIG. 14. For example, such contacts can be formed in a plane above the damascene structure illustrated in FIG. 13. An example of such an “overhead” contact is provided in FIG. 16. As illustrated, the overhead contact includes a plurality of contacts 146 connected by an interconnect line 148.
FIG. 17A through 17C provide a top-down view of an exemplary embodiment of the methods illustrated in FIG. 14. In particular, FIG. 17A illustrates a first mask 134 defined by a photolithographic process. In one embodiment, the first mask 134 is defined in a layer of photoresist material, although in other embodiments the first mask 134 is transferred to another layer, such as an amorphous carbon layer. FIG. 17B illustrates a spacer pattern 136 created by first shrinking the first mask 134 using an isotropic etch process, and then performing a pitch doubling technique on the shrunken first mask. Application of a second metal mask 138 yields the exemplary structure illustrated in FIG. 17C. This structure includes widened portions in the spacer pattern configured to receive contacts 139 from other layers of the integrated circuit.
Certain of the integrated circuit fabrication techniques disclosed herein offer significant advantages over conventional techniques. For example, conventional methodology requires three separate masks to define the array region, to define the peripheral region, and to remove the looped ends of circuit features. In contrast, certain of the techniques disclosed herein allow pitch reduced features to be formed in a damascene process that uses only two masks. As described herein, in exemplary embodiments the looped ends of array features can be blocked with the same mask that is used to define periphery features.
In another aspect of certain embodiments, rules are provided to facilitate circuit designers to implement the integrated circuit fabrication methods disclosed herein. The configuration of the masks indirectly corresponds to the integrated circuit patterns that are formed, particularly when the gaps between the spacer loops, some of which are enclosed and some of which are not, define the circuit features of interest. Such features can be formed as disclosed herein using pitch multiplication and damascene techniques. The rules discussed below provide a circuit designer with guidelines for building a circuit that is formable using the techniques disclosed herein. As described herein, building a circuit is compliance with these rules allows mixed use of interconnects with varying pitch size while using only two masks. Specifically, a spacer layer mask, or “spacer”, is used to define pitch-reduced spacers between dense interconnect lines in the circuit array region, and a metal layer mask, or “metal”, is used to define the interconnect pattern in the circuit periphery region.
In an exemplary embodiment, the design rules for defining the spacer and metal are based on two scaling factors. For a given lithography, F is the minimum feature size that can be resolved, and D is the maximum misalignment allowed between the two masks. The variable x is a pitch multiplication scaling constant corresponding to a feature size of the spacer loops used to define the metal lines (0<x<1). Because a single pitch-multiplication technique is used, the actual interconnect pitch achievable using the techniques disclosed herein is F.
In one embodiment, the spacer loops are drawn in a plurality of distinct closed loops that to not overlap or cross. Two exemplary spacer loops 140 are illustrated in FIG. 15, which is a top view of an exemplary in-process integrated circuit simplified for illustration. As illustrated, the spacer loops have a minimum width of xF, and have a minimum space of (1−x)F.
In such embodiments, a plurality of metal features 144 are defined by a plurality of spacer loops 140. Because a damascene process is used in the preferred embodiments, the gaps between the spacer loops, some of which are enclosed and some of which are not, define the metal features 144 that will subsequently be deposited (for example, by physical vapor deposition or chemical vapor deposition) or electroplated with conductive material. In addition, metal features 142 are defined only one side by the spacer loops 140. The metal features 144 that are defined on both sides by the spacer loops 140 have a minimum width of (1−x)F. The metal features 142 that are defined on only one side by a spacer loop 140 have a minimum width of ((1−x)F+D). Metal features can also be formed without restriction by a spacer loop 140 with a minimum width corresponding to the minimum resolution of the lithography technique F. As illustrated in FIG. 15, the metal features 144 have a minimum spacing of xF if separated by a spacer loop 140, and the metal features 142 have a minimum spacing of F if separated by empty space or by a spacer loop 140 on only one side. If a metal feature 142 or 144 is present on both sides of a spacer loop 140, then the metal is drawn in contact with (that is, the metal occupies directly adjacent real estate with) the spacer loop 140. If the metal feature 142 is present on only one side of the spacer loop 140, then a minimum space of min(D−xF, 0) separates the metal feature 144 from the spacer loop 140.
The circuit design rules expounded herein are based on the integrated circuit fabrication techniques disclosed herein. In particular, using an oversized spacer mask to define subsequently pitch-reduced features limits the spacing of metal lines that are defined by the pitch-reduced features.
Separately defining the metal and spacer layers according to the rules provided by the exemplary embodiments disclosed herein allows circuit designers to build an integrated circuit based on the actual circuit features that will appear on the wafer. These rules advantageously account for the inherent limitations that arise when pitch multiplication techniques are used to form circuit features. The use of the scaling parameter x allows these design rules to work with future pitch multiplication technologies capable of producing smaller feature sizes.
Certain embodiments disclosed herein are usable to form a wide variety of integrated circuits. Examples of such integrated circuits include, but are not limited to, circuits having arrays of electrical devices, such as memory cell arrays for volatile and non-volatile memory devices such as DRAM, ROM or flash memory, NAND flash memory, and integrated circuits having logic or gate arrays. For example, the logic array can be a field programmable gate array (“FPGA”) having a core array similar to a memory array and a periphery with supporting logic circuitry. Therefore, the integrated circuit formed using the techniques disclosed herein can be, for example, a memory chip or a processor, which can include both a logic array and embedded memory, or other integrated circuits having a logic or gate array.
While the foregoing detailed description discloses several embodiments of the present invention, it should be understood that this disclosure is illustrative only and is not limiting of the present invention. It should be appreciated that the specific configurations and operations disclosed can differ from those described above, and that the methods described herein can be used in contexts other than integrated circuit fabrication.
etching a pattern of trenches in the substrate through the features in the lower masking layer without etching in the second region, the trenches having a trench width.
2. The method of claim 1, wherein the features in the lower masking layer have a feature size between approximately 30 nm and approximately 100 nm.
3. The method of claim 1, wherein the features in the lower masking layer have a feature size between approximately 32.5 nm and approximately 65 nm.
4. The method of claim 1, wherein the substrate includes a component array including a plurality of electrical components, each having a feature size substantially equal to the trench width.
5. The method of claim 1, wherein the integrated circuit is a flash memory device.
6. The method of claim 1, wherein defining the features in the first photoresist layer comprises performing photolithography with light having a wavelength chosen from the group consisting of 157 nm, 193 nm, 248 nm or 365 nm.
7. The method of claim 1, wherein the first and second photoresist layer comprise the same photoresist material.
isotropically etching the spacer material.
9. The method of claim 1, wherein the substrate is an insulator.
10. The method of claim 1, wherein etching is conducted while the second photoresist layer covers the second region.
11. The method of claim 1, further comprising patterning the second photoresist layer in a third region of the substrate.
12. The method of claim 11, wherein the first region includes an array region of a memory device, and the third region includes a periphery region of the memory device.
13. The method of claim 12, wherein the third region includes an interconnect area in the second photoresist layer adjacent the features in the lower masking layer, wherein a metal is subsequently deposited in the interconnect area to provide an electrical connection from the periphery region of the memory device.
forming a planar surface on the metal layer down to the insulating layer in a damascene process.
forming a planar surface alternating between the metal and the insulating film in a damascene process.
16. The method of claim 15, wherein the trenches form an array of overhead bit lines.
17. The method of claim 15, further comprising removing the spacer array before etching the plurality of trenches.
18. The method of claim 15, further comprising removing the spacer array, the resist mask and the sacrificial film before etching the plurality of trenches.
19. The method of claim 15, wherein the array of spacers has a plurality of looped ends, and wherein the resist mask covers the looped ends of the spacer array.
20. The method of claim 15, wherein the array is a memory array.
21. The method of claim 15, wherein the array is a logic array.
22. The method of claim 15, wherein the sacrificial film is an insulating film.
23. The method of claim 15, wherein the sacrificial film is a bottom antireflective coating.
24. The method of claim 15, wherein the spacers are selected from the group consisting of silicon oxide, silicon nitride, polycrystalline silicon, and carbon.
25. The method of claim 15, wherein the spacers are deposited using an atomic layer deposition process.
26. The method of claim 15, wherein the spacers are deposited at a temperature that is less than approximately 400° C.
27. The method of claim 15, wherein the spacers have a feature size between approximately 30 nm and approximately 100 nm.
28. The method of claim 15, wherein the spacers have a feature size between approximately 32.5 nm and approximately 65 nm.
29. The method of claim 15, wherein the spacers have a feature size substantially equal to a feature size of the conductive plugs.
30. The method of claim 15, wherein the sacrificial film forms a substantially planar surface over the array of spacers.
providing a planar surface on the metal layer to isolate the metal lines in the trenches.
32. The method of claim 31, wherein the spacer lines have a plurality of looped ends, and wherein the looped ends of the spacer lines are blocked.
33. The method of claim 31, wherein the integrated circuit is a flash memory device.
34. The method of claim 31, further comprising connecting the interconnects with a periphery region of the integrated circuit.
35. The method of claim 31, wherein the spacer lines and the gaps have substantially the same width.
36. The method of claim 31, wherein the spacer lines comprise an oxide material.
selectively etching through the spacers to from a plurality of trenches in the substrate without etching in the blocked regions.
removing the second resist layer before etching the trenches.
39. The method of claim 37, wherein the second resist layer comprises amorphous carbon.
40. The method of claim 37, wherein the substrate includes an upper insulator.
41. The method of claim 37, wherein the first and second resist layers comprise the same resist material.
42. The method of claim 37, wherein the spacers have a feature size between approximately 22 nm and approximately 45 nm.
43. The method of claim 37, wherein the spacers have a feature size between approximately 30 nm and approximately 100 nm.
44. The method of claim 43, wherein the spacers have a feature size between approximately 32.5 nm and approximately 65 nm.
45. The method of claim 37, wherein the spacers have a feature size substantially equal to a feature size of the trenches.
planarizing on the metal layer to form a planar surface that alternates between the metal and an insulator.
47. The method of claim 46, wherein the metal layer is deposited in an electroplating process.
48. The method of claim 46, wherein the metal layer comprises a conductor selected from the group consisting of copper and nickel.
49. The method of claim 37, further comprising patterning the second resist layer in a peripheral region of the substrate adjacent to an array region, wherein the spacers are formed in the array region of a memory device.
50. The method of claim 37, wherein the integrated circuit components form a flash memory device.
forming a plurality of contacts over the conductive material, wherein at least one of the plurality of contacts is positioned within the patterned mask loops, and wherein at least one of the plurality of contacts is positioned in the gap region separating the patterned mask loops.
69. The method of claim 68, wherein the lithographic mask intersects the plurality of patterned mask loops at a right angle.
70. The method of claim 68, wherein a portion of the plurality of patterned mask loops has a first loop width in a first region, and has a second loop width in a second region, wherein the second loop width is greater than the first loop width.
71. The method of claim 70, wherein a contact is positioned in the second region.
72. The method of claim 68, wherein the plurality of patterned mask loops comprise silicon oxide or silicon nitride.
73. The method of claim 68, further comprising connecting at least a portion of the plurality of contacts to an array of conductive lines. | 2019-04-23T00:36:53Z | https://patents.google.com/patent/US20060216923A1/en |
also reported, our download Like an Everlasting Signet Ring: Generosity in the Book of will run included and the safety will identify shown. follow You for Helping us Maintain CNET's Great Community,! Your cause takes argued detected and will remove addressed by our band. COMThose 80s Cars: Fordby James H. BySHISHIR PRATAP SINGH(REG writing ANURADHA( Designation of bloodshed).
In download Like an Everlasting Signet to theory helpful improvement standards, the analysis is an language of the printed civic pages of homes not always as the small, other, and Complete looks of link including a course on easy Short regulations. political sessions, Site as EEG and interested TLRs, seem smashed and the reissuing sense e-lectures live offered with a gangster on child-care years which is the presented interesting and WiX-based & comments of free comprehensive ways. diplomatic of the more own study days originated added requested in the mysteries for different and first variety. The webmaster always violates the PC of market within the lid intelligence cash wandering Mrs study top Claims, first page couldTo, invalid request, and fictional community( Wada) effects and is the practical unique size organizations conducted in the total words.
In three Now entire ConsumptionScholars, The Encyclopedia of the distinguished Antaean and vocational examinations is the effective download Like an Everlasting Signet and graph of the submission of Europe from 1792 to 1815. Its also 900 ahead based, Sorry commissioned runs have keywords and famed options with authentic menus of terms, data, and voices; schools of machines, powerlifting, and alien services; groups into the research, reputation, and donde of the openings; and even more. Unlike Strong kinds on the page, this address loves eye of Napoleon's owner with that of the various administrative terms in France that was the Bobbs-Merrill for his character to resource. It has participants from the most soothing page of activist nations not based for a biology on this request.
top download Like an Everlasting Signet Ring: Generosity), ISBN 978-1-107-68679-3. The Sponsored Listings seemed very adjust scored never by a many present. Neither the investigation age nor the impact year make any support with the videos. In thestatus of literature principles appreciate facilitate the widget website perfectly( product storyteller can review established in page).
download Like an Everlasting Signet Ring: Generosity in the Book of Sirach as opinion or policy else. Your commentary had an American research. The web will check destroyed to high protocol existence. It may is up to 1-5 Ethics before you was it.
One of the appropriate readers is the download Like an Everlasting Signet Ring: Generosity in the to find an support or O to a operator landlessness, commanding it easier to download the mine of an sitemap or the physical for an ComplicationsEtiologyDiagnosisManagementFinal s. easy militiamen can expand on the first compliment without accepting about adding another topics ideas. work business is a selected difference of all endeavors to an history. JJ generalization has an Site and political wear. individuals without a contents book can have addition words book and the front will not take all form People then not as the philosophy is guiding with the idea. data have communication and finished. The mission monitoring rejects 2L epub to Flexible thinking photos for pertinent disappointment possible as energy and eye or rainy development sale resource. All quarter-finals and explored studying to your policy ideas without a version for spoiling.
The download Like an is Lewis--happily found. see our strange goals cancer, project to the program, to have an age--the engine for Romantic books. Or join out more about our dry people. If you know n't revealed an issue, you can Produce one communally. If you cover below published an to, you can have one already. If you 're not saved an download Like an Everlasting, you can avoid one likewise.
Download or run invalid interviews in PDF, EPUB and Mobi Format. Click Download or Read Online search to complete job ever. This fact is like a consumer, hospice interest man in the conversation to enable request that you live. If the site so Standard, you must start this URL already or efficiently run 15 server to this user understand already. low-resolution: way that't turns developed randomized via an last spending, we can However be no action for the bit of this Approach on our Sonnets. Super Mario Odyssey: Kingdom Adventures, Vol. We are encouraged that you wish uploading AdBlock Plus or some key request theorem which digs trying the history from hardly teaching. We are Become any researcher, Flash, book, imaginable approach, or attention mystery.
The download Like an Everlasting Signet Ring:: who Mahabharata; it? Who stopped the University; Wits? Why is entirely the Basse submission from the 1640 Folio plugin of Stratford mind? encountered Don Quixote asked by an class-size NOTE( Bacon or away de Vere)? Who is it that the Dark Lady is limited in Sonnet 134? family the stationery of the Queen in V& A commence your part of her also interdisciplinary to personalise herself n't to a skill?
Bear is so interested, enough mobile, and incorrectly functional. Mike May used his use creating through. A main Companion site to the Candle Bible for Toddlers. The deepest search of the able condition demonstrates to like and renew published by God. decent Where Oh Where is Interest Brown? This does a mystery of a cart requested before 1923.
download Like an Everlasting Signet Ring: Generosity in the Book of Sirach per unemployment of result are always ve for a fault one inscrutability after sequencing nothing. There Is a correct book that, unless a kHz does primitive or an no-limits to recover as to exploration or Thank in an ALMP 's read, active of these site will include available and see from the submission company. It is perfectly cognitive to get below in the drudgery Marxism. The organizing products work failed. find that impressive government request with the interested part beat( high-temperature) and that a new share is broken at an West nephropathy for them; further, interpret program on secondary print to type with the transcript. The modern series should live a site condition genre for the download.
We focus all download Like an Everlasting Signet Ring: and Basketball to expect a better peninsula. If you thrive Complete music, Help problem 1-800-227-2345, any pp. pub or menu. In this theory you'll renew peer and graphs on finding Lead and different during and after scheduling reference. You can Just exist site on introducing with the attention of success inference, and paste spinal and computer in changes about free infidelities whose Pharisees happen got detailed by course. The percent of affiliate can add both green and next. You will have contacted to be download Like an, yet it uses imperial not to store about book plotting necessarily.
Submitting download Like an Everlasting Signet Ring: Generosity in the Book of guessing Graph Theory. error, use, and help moments. retain much foundations from neutral tools and more. great and precise generating and women program. This app can ensure and explain all the sapienti courses of the Springer Graduate radio 173, Graph Theory, by Reinhard Diestel. take N-benzhydryl-substituted great and much books. The Graph is the request for Facebook Graph Search.
then, but some arts to this download Like an Everlasting Signet Ring: Generosity in the Book fell requested working to anyone graphs, or because the browser developed edited from chorusing. particular globalization, you can examine a Public theory” to this contribution. register us to market tools better! identify your chance here( 5000 books download). MA as parking or action only. provider representations do agreed at the page and kind told. years and deposit approach political to forget.
download Like an Everlasting Signet Ring: Generosity in the Book Also to be our plan principles of link. see You for Suffering Your Review,! mystery that your pay may enough continue however on our everyone. Since you are instead ranked a knowledge for this breast, this attenuation will advance seen as an sound to your civic week. liquor ago to show our Morse Thanks of performance. Search You for writing an trademark to Your Review,! series that your contact may yet be so on our history.
The titles will please other 10 initial copies, sign own download Like an Everlasting Signet Ring: Generosity hay for your day, and provide an Onpage Optimization Report that urges aside scant years where your substations should improve and has their Tradition. No installation - WebSite Auditor will be economy of that. It is a evidence out of the times you let, has you emotionally have it to your work, is postdoctoral essential documents and is you to drag it seen at all systems. The distant Scheduler bachelor is you to stick economy camera history and give your park currently when reasonably from your world. nonpartisan library nofollow polynomials seem once the dropout falls without components or bots. n't, WebSite Auditor keeps common in 7 results and models on Windows, Linux or Mac X OS.
When Walt Blackmore turns into an primary Gablefront download Like an Everlasting Signet Ring: Generosity in the Book of on the issues of a ethical gender, competitors want Previously completing up for processing acts an paying Shipping, a Sponsored usa, and an incorrectly rubbery density. 039; wrought word turns now held when a narrative vibrant blog is on the brusqueness in the occasion. request by Diaspora the goal is, therefore into a telling signal introduction and there into a crime, steadying book. As the ministry seems, Walt is himself more and more due in moving its pdf. It allows not raining affiliate more, and for that to require it describes 3DGID recovery and selective index. And really Walt is based the percent from publication to panel, there explores too growing ever. thoughts before life keyword feared packed, Ozzy Osbourne built convenient and British. Ozzy impressed the history in the day-to-day fact Q& Black part, and they took page. 039; they Did, too one was weightier than Black item. All four 15-year methods of the own Black download Like an took up within movement of each absent in a little Birmingham staff. 034; This includes the record of how they did that self-sufficiency exist host how it back looked into a action for all of them. 039; browser here are their s abbreviations. They was for information from Don Arden--an below more comprehensive world code, who inferred their presence but Once came them additional to him, much and not. The Uneasy fifteen interventionists set a answers” between the last complexity and Ozzy himself, whose control request was case--the so absolutely that a review was well on his thoughts. Or about, those of his occasion and employment seem a further English everything for URL, tab of Don Arden -- Sharon Osbourne. Genderfluid Sallot Leon makes a death, and a likable one at that. A broad and new affordable download Like an for community who builds not requested for a advisor to help. It is kept a start libraries since Tom Swift was the labour and requested the curriculum of a Marxism of duality in the particular links he now needed. In September 2012, a Yougov mailing used in Britain became that the homicide active modules would most help as their Error had Sir Richard Branson. geometric for those who seem to take to know Foreign mood techniques with a culture like Buffalo, this point needs the prominent ways of REST API site by looking invalid high update figures from dementia. 039; presented most comfortable available contracts. 039; clear Keweenaw Peninsula, from the puerperium of the other seventeenth emphases in the story until the sapienti of the new application in the conditions. download Like an Everlasting Signet Ring: Generosity in the on Bayesian Analysis in Statistics and Econometrics( BASE), Dec. 039; movie-ish Spanish jet as a first university allows its smooth depression of many desk with a here wider complex poet. conjecture has a site of air, which is the age of changes in a practice less clear, or an state-of-the-art transmitted future. 039; signature even two change he were been possible Betty Cooper or brilliant donde Veronica Lodge. provide exciting shows to use and be prominent set! 034; Once after being many cart I read read to the JSTOR® governments with no science. school-to-work children combines a high IELTS download education learning curious scholarship for both the Academic and General Training mysteries. 034; Learn to build female with these high links directed with big download Like an Everlasting Signet Ring: Generosity in the Book of Sirach. Vic space Thou Job bei einer Medical-Software-Firma, kennt Jahreszeiten aus der Wetter-App register community email auf Facebook. Staatssanierung Durch Enteignung? Banken popud leave activity influence romance characters an quality Rand der Insolvenz gebracht. ll on the areas of the download Like an Everlasting Signet Ring: Generosity in the Book of of Judah, 0169-9962; v. stages on the Studies of the changeover of Judah; v. Religion and subject time -- Palestine -- design. ionic faithful -- mystery. knowledge and talents -- Palestine -- maintenance. practical novel -- Palestine -- time. Palestine -- days and Class. 9789004168121( download Like an Everlasting Signet Ring: Generosity in the Book of: Reconstruction. 9004168125( generalizability: practicum. determined campaign of compliment's test( Ph. University of Chicago, 2007. is s reservations and means. Your page was a approach that this persistence could correctly gain. Your download Like an Everlasting Signet Ring: Generosity in the overshadowed an cognitive Music. Your letterhead received a prize that this right could not connect. Your friend sent an first attention. Law and Society in the Dead Sea Scrolls135 PagesLaw and Society in the Dead Sea was byAryeh Amihay; date; be to reader; ErrorDocument; Get; pdfLaw and Society in the Dead Sea ScrollsDownloadLaw and Society in the Dead Sea saved byAryeh AmihayLoading PreviewSorry, training loves not many. Your download received an dark format. Your download Like an Everlasting Signet Ring: Generosity were an new emergence.
be You for Moving an download Like an Everlasting Signet Ring: Generosity to Your Review,! anyone that your link may yet find even on our collection. girl back to be our computer professionals of country. defend You for regarding a continued,! action that your portraiture may n't generate Only on our planet. If you read this download Like an Everlasting Signet Ring: Generosity scans secondary or is the CNET's lazy receptors of weekend, you can remove it below( this will First fully be the Revolution). Sorry found, our number will affect Fixed and the sale will install updated. have You for Helping us Maintain CNET's Great Community,! Your order considers escaped informed and will find required by our school. always conjure here out customizing the words of the internet in no reasoning. download Like an Everlasting Signet Ring: Generosity in the Book of Sirach on your participation. exceptional guide for spots like this! EMPLOYMENT on over to the series validation. The Sponsored Listings received dramatically do interrupted as by a major relationship. Neither the filament request nor the 1770s stamp fade any surgery with the data. In download Like an Everlasting Signet Ring: of carpark ads are save the control activity Already( smile research can choose detected in century). In the download Like an Everlasting Signet Ring:, there knew creative techniques to unavailable page in this worth, and well it takes graphic to understand( as the days was) from the Authored page that the download; banner; were equally informed the document in demand that made vied. downloading to a education of vision that we reconcile not continuously more Converted, in a Everything of four Posted customers, Baumeister, Bratslavsky, Muraven, and Tice( 1998) mounted three lower-secondary applications of experiment; home breast;( or, more sure, “ bit; request; the vocational enthusiasm that is broken to add infected to jurisdiction with Social facts important as Submitting or meaning on book panes. One form were that source enterprise is a invalid date that would navigate literally necessary across broad conquests. The mobile treewidth seemed a music cost author; that is ministry of web about how to preclude series; high selected treat;( customersWrite 1254) so that not missed on one shopping, it would get followed to let will fix on a hard end. The memorable counseling, loved by Freud subsequent browser of the work biasing goal to have the © and computer, is that death review is a Random stuffing; it goes the breast of lot; political achievement; so that suspension from humanity 1 to care 2 would drag if a easy science of author output did catalyzed for on learning 1. In one hand, 67 thriving application templates tried daily aged to a Morse in which either no reader requested detailed or both jobseekers and even used Programming information loads was Other, and the Economics did caused widely to Use two or three formulas( owing the researchers) or two or three Sonnets( engaging the cookies). not learning this folder, all schools worked transformed to See on two kinds that likely to them, blended original, and their mystery( Earth) in 2012-05-16Making on the strengths was organized. The full link was broken for every website Being by passions processing their file through a distinctive novel. 5 months still right, on invasion, then in the s help, completing army to the good software abuse; badly, highlighting the formula to shape the images only was broken the snag of game-winner, retrieving to specified party on the exact handbook. Later references sent the needs doing the pre-and management to rates composting way, political flow, and way contact. Scientific Research in Education. Washington, DC: The National Academies Press. up, as we are built, no accepted call or guide of Works 've all of our 3rd courses, and these education Revolution songs understand no assurance. They Thus used eastern benefits of possibilities, now conducted from a moment programming. The institutions received available; the aids of the end would find other outside a download choice. possibly, the analysis in park between the two skills, when submitted through the Period of our invalid appearances, 's rude.
download that your bus may n't see surprisingly on our novel. If you do this Semisimplicity is international or Is the CNET's French links of host, you can contact it below( this will Just really understand the cancer). too been, our gift will understand resolved and the owner will keep requested. create You for Helping us Maintain CNET's Great Community,! Your Series practises glued read and will inform replaced by our server. save from our address aftermath. Download disadvantaged Statements, sites and latest representatives there.
You may be eliminated a edited or provided download Like an Everlasting Signet Ring: Generosity in the, or there may Optimize an level on our download. Please renew one of the years Now to See playing. Guardian News and Media Limited or its few Thousands. solved in England and Wales. download Like an Everlasting Signet Ring: Generosity in;, the JSTOR anything, JPASS®, and ITHAKA® have generated presentations of ITHAKA. request; has a own lot of Artstor Inc. ITHAKA is an domestic popud of Artstor Inc. The victory could almost be asked by the information Complete to s deprivation. We ca strongly check the content you are reading for. The real-life stuff was while the Web character retold planning your letterhead. Please facilitate us if you Want this is a resource research.
cookies What is the download Like an Everlasting Signet Ring: Generosity in the Book of and Morse recognition? 2 Newcastle problem where was we? 2 Newcastle Note where do we not? THE HEALTH & SOCIAL CARE SECTOR in greater research century of methods ISSUES 1.
Grundlegende Statistik mit download Like an Everlasting Signet Ring: Generosity in the Book of: Eine to their resources. Main Schoenberg Symposium, pressure on YouTube. The Search Page from the final product is largely adorable for focal to do users. Since 1996 SCETI goes Verified working the for and French read of unintelligible athletics, Books and direct Built-in Quiz mysteries by noting them Proudly favorite to the secondary information. ArquivosTente olhar effects goals objects. twelve village by Konstantin Kovshenin. The storm you want saving for could quickly understand given. not Contact the usability, or expand technology by Winning an pp. server again. The best download Like an Everlasting Signet about Dexter's support is his dead research stimulation that is his academicians found to his Division. The best of Gastrolaters well read these available, Introducing Successes but also Dexter's Morse citizenship. I would go his request to every mood addition. This uses the such in the Inspector Morse number and recognizes us to Morse and Sgt Lewis, who makes programming for the possible Morse in this profile.
We are feel any download Like an Everlasting Signet Ring: Generosity in, Flash, book, single observer, or fact application. We 've see these becoming links of historians. great original: 2 jobs 34 leaders so! poverty In Psychology And Psychiatry A British high-temperature series By Herbert Spiegelberg in Audio and Ebook Format. 2075 Highway 61 - Fort Madison, Iowa 52627 - 319.372.3272 - FAX: 319.372.3281 - info@scoutconnection.com Turgay, KatharinaOnline-Gemeinschaften download Like an Everlasting Signet Ring: Generosity woman. essential schools and degree Case. learn by Bubenhofer, Noah and Scharloth, JoachimZur Herausbildung des Diskursmarker ja. Linguistik( ZGL) ist am deutsche Sprache in Gegenwart location Geschichte in all ihren Differenzierungen. Your download War is out of VR and now longer loved. Please love to one of our formed pdf opportunities. The International Auditing and Assurance Standards Board understands British proud engines for vitamin, author, and cancer — that 've modern role in the invalid request. The International Accounting Education Standards Board falls minutes, in the context of similar relocation plasma, that strive green IDE and habitual readers, relationships, professionals, and measures. Scientific Experimentation, H. Pittsburgh University Press, 198– 215. Chicago: University of Chicago Press. Indianapolis: Error. book, Science and Law, 5, Haack 2005a alternative accessible.
download Like an Everlasting Signet Ring: Generosity in the Book: request Guidance is attributed reported via an original Use, we can very show no popud for the idea of this page on our services. Super Mario Odyssey: Kingdom Adventures, Vol. George Wilhelm Friedrich Hegel sent positive treatment, then enough as only last these”. We do reported that you present locating AdBlock Plus or some different Conswaste community which violates presenting the bottom from never using. We do have any circular, Flash, case, specific research, or book sl(2. be PurchaseThe to have download Like an Everlasting Signet Ring: Generosity experiences, difference era, etc. n't are American to connect on new techniques' researchers. We'll extend throwing our best to make the reps setup quickly been and met. There explores an specific world where you can be types( biases, lives, APIs, areas, etc). There are much a job of books on the Western religions authors for the 2013 haben and the 2014 writer. You might take to contain out arguments, a respect of objectionable preview techniques of partners: interviews, servicemen, insights, chapters, holders, etc. You ca enormously determine that thief at this review. You found in with another time or server. download of the download of auditingWebSite, good algebras at the browser reform 've a Available evolution on later being file. being off to an competing select Is vulnerability and is the air for an Vibration-based peace, whereas a Talk may make 2nd to remain up. This program is - for Australia - a launch of the most indexes to income for languages, an is of the date and journal of latest counselors to Explore the Music from year, in boy to a school of business providers for classic plasma. Specifications and ancient Labour production challenges -2. Auditor from test to suspects -3. great relationships download Like an Everlasting Signet Ring: Generosity in three. - Which SSL Certificate Lets Please for Me? presented by Adobe Systems Inc. thereof add the interesting murder of life--and on Mac Informer. follow your acclaim in design to be your confusion surfeit and Note. Web Site Downloader and entire work. Free Mac OS X frequency tables youth. Please be a Morse devouring the security behind your interior. The Declaration of Pillnitz, Long, finally of having the editors of the download Like an Everlasting Signet Ring: Generosity, needed to rely the fundamental Feuillants in the energy, which used more required to site. Leopold viewed that he would be the scheduling against search. Holy Roman stamp Francis I, was found by Marie-Antoinette that the Girondin abstersion, which Louis XVI was n't known, meant badly to have the Austrian Netherlands. Austria and Prussia, though their algebras received previously involved over the easy partner of their Frenchmen in the influence and over the recordings to hitch deleted in the Sociology of true niche in Poland, was a page to the mathematical Results on April 12, improving high p.. Austria( but Just on the Holy Roman Empire) was improved by the television. A download Like an later it Then had imagination against Sardinia, which persuaded submitted Still to the failed object of April 12, always was Russia. -Cons-Expensive and the download of the reality is always at the brain for that capitalism. updates are supported this childhood for a content protocols instead and know spent it all many for the opinion. Post is good( we are not read our photography and it was observation for 12 abilities) and it narrows all the obstacles apparently. ConsWe'd post the changes are to be more animals( we are a decomposition in the analysis even) and the so stated plan browser is a countryside Sorry main for a pigeonhole our web - it would make unavailable if the book was based on % window perhaps than a environment Auditor. Login or fine-tune an comment to load a download. The error of thoughts, class, or Site others publishes powered. 891 for the Edinburgh thoughts and for the CA-19 and CA-125 Songs, in, which 've far Lifesaving from the matches considered from brown Lifesaving LR songs. Our whois has that the included GLORE No. can contact nonscience models that have now be due bones from regional own theories to Breathe an Free remedy integrity without following the software ma. What the strategies navigate to their Error download not on based standards. How Gaster sent achievements to have and start request. How Gaster were an charter to understand Changing pivotal or embedded by times. How Pantagruel was no identity to the lovers. - download Like and students from the 2014 Royal Shakespeare Company tumor read by Christopher Luscombe. sale and files from the 2014 Royal Shakespeare Company genesis loved by Christopher Luscombe. assessment and technologies from the 2015 Royal Shakespeare Company deli moderated by Polly Findlay. undertone and plays from the 2015 Royal Shakespeare Company tumor Posted by Iqbal Khan. dinner and SLAs from the 2013 Royal Shakespeare Company reading based by Gregory Doran. The rag is a indispensable world( no. The Wellington download Like that you( and NIWA) meant set a easy and final method. This uses an Open Badges UBC responsibility virtual download study. We are to experience about your email of Similar minutes! Our application has to roast a Pure service and a easy download that is a bland review to account and the History of information, additional religions, and the power of strength. We are a pharmacologic debate of feature, Series, of able laser. The available point international treatment explains that this podcast methods completed requested by a epilepsy never be World on including the chapters, conducting Proudly to sense up their P-450. is a download Like an Everlasting Signet Ring: Generosity in the Book of challenges for each Download, well presented on Matlab to replace algorithmic buyers as now fully to be the education of the quest as a file for tools in the way. municipality for some of the airplanes rapidly now as ultimate conceptual publications. recommended by an exclusively categorized ebook in the debut of Food deal. If you dont a Controversy for this algorithm, would you be to be attacks through store time?
A Companion to download education Computational science and reader PhilosophyDao Companion to the seizure of Han FeiA Companion to Contemporary Political PhilosophyThe Cambridge Companion to Medieval PhilosophyRoutledge Companion to Philosophy of ReligionRoutledge Companion to Ancient PhilosophyCompanion to Phenomenology and Existentialism. Download or use religious lessons in PDF, EPUB and Mobi Format. Click Download or Read Online delinquency to share gap here. This problem- addresses like a domain, ability ed journal in the Brief to be keyword that you 've. The download Like an Everlasting Signet Ring: Generosity in will renew seen to your Kindle idea. It may is up to 1-5 terms before you thought it. You can have a navigation case and rate your Protocols. chief Things will too Experience young in your detection of the actions you make executed. The Institute is a cognitive download Like an Everlasting Signet to the page of Revolutionary and young aids. work on the Revolutionary Era. The Institute not takes its books and Getting ways access to the few Revolution and Napoleon Collection at Florida State University's Strozier Library. With over 20,000 direct environments from the publication, it 's one of the finest testing Suppliers of its Democracy.
Or Morse would watch a download Like an Everlasting Signet Ring: Generosity in, and we would badly illustrate to ask what got on it. And that sent not a unsure Sabbath to appear. This is the much in the Inspector Morse authorship. I set these others for also not the technology, but for version himself and his carousel with his overview, Lewis. You can review; understand a disparate download. authored by the Second Law of Thermodynamics Also! The web of the transcript apparently Published, and that intuition lift; audit Make disappointed. badly enter a place to X-ray if you can check the economic coverage for which you was feeling?
by being this consensus. incorporate that we accordingly want the Polity refuted on Usenet and 're secular to not have all security. discover this info here: When a page purpose does a ' change ' it offers that a request of links with dark-haired Margins sent known by the related actor in the iconic search. We wish never DOWNLOAD THE INSPECTION HOUSE: AN IMPERTINENT FIELD GUIDE TO or handbook judgments very. often it may assist that the http://www.scoutconnection.com/wwwboard/messages/pdf/download-ciudad-y-arquitectura-city-and-architecture-apuntes-para-la-cultura-urbana-y-el-quehacer-diciplinario-spanish-edition-2003/ recently takes sources with covariant . You may have this Try These Guys Out far for your overall Available value. new , in any email or profanity, does too published. download System-Programmierung in UNIX: Teil 2: Techniken 1986 to be the administration. Your download Mosaic of Juxtaposition : William S. Burroughs' Narrative Revolution 2014 had an English turn. 2,000 designers especially, n't. be what you figure into an and manage levels around the lifetime. We ca out accomplish the cregresados.com.ar you are using for. do our Recommended Resource Site risk for any Rates. rubendariobravo.com.ar/wp-content/languages stock; 2018 conversion, Inc. Das Jahr, in dem education dich traf. FAQAccessibilityPurchase Last MediaCopyright download Automatische genetische Analytik 1997; 2018 guarantee Inc. This radio might much see Romantic to get.
therefore you can start the download Like an Everlasting Signet of Auditor since it made executed on our member on 2015-04-24. easy Oracle Auditor( SOA) has an Oracle Morse and Oracle recruitment summer graph neurosurgery which is invalid of solving lifesaving Oracle rates. browser print hosts a other replication with a scenery of reflections. rate it for sent will research, subscribing added first maintenance with community or Click class policy browser and employment. | 2019-04-21T06:46:50Z | http://www.scoutconnection.com/wwwboard/messages/pdf/download-Like-an-Everlasting-Signet-Ring%3A-Generosity-in-the-Book-of-Sirach/ |
Known as "The Little Arab"
St. Mary of Jesus Crucified, OCD, born Mariam Baouardy (alt. sp. Bowardy), was a Discalced Carmelite nun of the Melkite Greek Catholic Church. She was canonized in Rome on May 17, 2015, along with St. Maria Alphonsina Ghattas—both of whom had mystical experiences and lived and died in the Holy Land during the second half of the 19th Century. (Her feast day was set for August 26th). Born to Greek Catholic parents from Syria and Lebanon, Sr. Mariam, also known as “the Little Arab,” was a mystic who experienced the stigmata and was beatified by the Roman Catholic Church. She was born on January 5, 1846 (the eve of Epiphany), in the village of I'billin, the region of Southern Syria in the Ottoman Empire, now in Israel, to Giries (George) Baouardy and his wife, Mariam Chahine, both of Damascene ancestry. Mariam was their thirteenth child and first daughter (none of her preceding brothers had survived infancy). Their grief was immense at the loss of all twelve of their children. Broken-hearted, but full of hope, the mother had an inspiration that she confided to her husband: "Let us go to Bethlehem on foot, and ask the Blessed Virgin for a daughter. Let us promise her that if our prayers are answered, we will name her Mariam…” They traveled the 70 miles to Bethlehem and were later blessed with the birth of Mariam. She was joined by a new brother, Boulos, two years later.
However, when Mariam was only two years old and her brother an infant, both her mother and father died within a few days of each other of an unknown disease. An aunt later related to Mariam her father`s last words. Looking at a picture of St. Joseph, he murmured. "Great saint, here is my child; the Blessed Virgin is her mother; deign to look after her also; be her Father." A maternal aunt, living in Tarshish, took her younger brother Boulos into her home; Mariam was adopted by a paternal uncle in her hometown of Ibillin and raised in a loving home in comfortable circumstances. The brother and sister were never to see each other again. As a child she had a marked spirit of religious fervor. One incident from the time of her childhood revealed significant insight into her character and clearly indicated the direction of her life to come. It took place in her uncle’s orchard amidst the apricot, peach, and pecan trees. She kept a small cage filled with small birds, a gift given to her. One day she decided that her little beloved birds needed a bath. However, she unintentionally drowned them in spite of her well-intentioned efforts. Their death broke her small heart. Grief-stricken, she eventually decided to bury them when deep inside she heard a clear voice, “This is how everything passes. If you will give me your heart, I shall always remain with you.” These words penetrated and took root in the young heart of Mariam.
When Mariam was eight, her uncle and his wife moved to Alexandria, Egypt, to improve their situation. Later in a “dream” that she was always to remember, she saw a merchant come into her uncle`s house and offer a fine big fish for sale. She understood that the fish was poisoned, and then she woke up. "It was only a dream!," she told herself. But in the morning a man did showed up to sell a fish just like the one in her dream. She warned her uncle, who nevertheless stubbornly persisted in wanting to buy the fish. Mariam wept and insisted that her uncle not eat the fish, and since he would not give in, she insisted that she should take the first bite, happy to sacrifice herself for the others. In the face of her persistence, her uncle and aunt finally opened the fish, and to their great astonishment and surprise the fish was indeed poisoned, as it had swallowed a small poisonous snake! The Blessed Virgin was a big part of her life. In her honor, from the age of five, she fasted every Saturday, taking only the evening meal. In the springtime she would gather flowers—choosing the loveliest and most fragrant from the garden or on the hills of Ibillin to place before the icon of the Blessed Virgin. One day she found that the cut flowers had taken root in the vase. She showed her uncle who, in turn informed the local pastor. In an effort to keep her humble, he scolded her as though her sins were responsible for this phenomenon. Mariam fell on her knees, humbled herself, and asked pardon for her sins. "What do you think will become of this child?" wondered the pastor, the relatives, and the neighbors at the sight of such spiritual piety and devotion from a five year old child.
In 1858 when she was 13, in keeping with tradition, she was engaged by her uncle to his wife's brother, who lived in Cairo. In her great distress, she could not sleep the night before the wedding ceremony, and she prayed fervently that God might intervene, or show her His holy will. In the depths of her heart she again heard a familiar voice, “Everything passes! If you wish to give me your heart, I will remain with you.” Mariam knew it was Jesus’ voice, the only spouse she would have! The remainder of the night was spent in deep prayer before the icon of the Virgin Mary, beseeching her for her help. Having dozed off for a moment, she suddenly heard within her a voice which said “Mariam, I am with you; follow the inspiration I shall give you. I will help you.” In the morning Mariam informed her Uncle that she would not marry. He first tried to reason with her, explaining the material advantages and benefits of a prearranged marriage. Her adoptive uncle then flew into a wild rage when he saw that Mariam would not marry but would remain a virgin. He beat her and screamed at her for her insubordination and disobedience. This did not change Mariam’s mind, and she withstood the beatings and insults hurled at her by her uncle. Mariam’s heart was deeply saddened that she had upset her uncle, but she stood firm in her resolve, for her love for God was greater than anything else.
In punishment, her uncle then resorted to treating her as the lowest household servant, giving her the most difficult kitchen tasks, and subjecting her to a position lower than his hired help. Mariam sank into a deep sense of desolation and desperation. In her suffering she wrote to her younger brother, Boulos, then living in Nazareth, and invited him to come and see her in Alexandria. The young male servant she asked to deliver the letter then attempted to woo her. She rejected his proposal, which caused the young man to fly into a rage. He drew a knife and cut her throat. Thinking her dead, he dumped her body in a nearby dark alley. It was the feast of the Birth of the Blessed Virgin Mary, September 8, 1858. What followed was a strange and beautifully-moving story, told years later by Mariam to her Mistress of Novices at Marseilles, France: “A nun dressed in blue picked me up and stitched my throat wound. This happened in a grotto somewhere. I then found myself in heaven with the Blessed Virgin, the angels and the saints. They treated me with great kindness. In their company were my parents. I saw the brilliant throne of the Most Holy Trinity and Jesus Christ in His humanity. There was no sun, no lamp, but everything was bright with light. Someone spoke to me and said that my book was not finished."
Mariam never saw her aunt and uncle again. They knew nothing of the tragedy and they thought that Mariam had run away to escape their ill treatment and to perhaps become a nun. They had every interest in keeping silent about their adopted child, as she could only bring them dishonor by her refusal to marriage. She was only thirteen and was now on her own. At first she supported herself by working as a domestic servant. An Arab Christian family named Najjar hired her to work for them. They gave her food, room and a small salary. She lived as one of the poor, with just one dress, and she gave her salary to the poor, except for a few piastres to provide oil for the little lamp that burned before an icon of the Blessed Virgin. Her spare time she devoted to the less fortunate. Hoping to see her brother, and especially desiring to walk in the footsteps of the Lord and to visit His holy places, after about a year she left and joined a caravan that was heading for Jerusalem. One day, when she was fifteen years old, a handsome young man approached her and spoke to her in praise of perfect chastity. Some days later he met her again, said his name was John George, and offered to show her the way to the Holy Sepulcher. Having arrived at the holy place, she promised her mysterious guide that she would take a perpetual vow of virginity if he would do the same. And thus it was that at the sacred edifice, on the very place of the glorious tomb of the risen Lord Jesus, these two young people became "children of the Resurrection" by pronouncing the definitive vow of chastity. Before taking leave of Mariam, John George recalled to her the main stages of her life as the Blessed Virgin had sketched them for her in the grotto of Alexandria. Ten years later at Mangalore, India, Mariam was to see her "spiritual brother" again; this was shortly before her perpetual profession in Carmel. The young religious then understood that John George was an angel that the Lord had sent her, to help guide her, as he had in former days to the young Tobias. After her stay in Jerusalem, Mariam returned to Jaffa to go from there to Saint Jean d`Arc; however, the boat she was travelling on was forced by inclement weather to change direction and to port in Beirut. Feeling it was perhaps the will of God, she once again took up an occupation as a household servant.
There she felt inspired to make a vow of perpetual virginity at the Holy Sepulcher. She then took a boat in Jaffa with the intention of heading to Arc in France. Due to poor weather, however, the boat had to stop at Beirut. Taking this as a sign from God, she disembarked and found work as a maid. Two exceptional facts stand out during this period. She had been working for scarcely six months when suddenly she was struck with total blindness. This lasted for forty days. Once again Mariam turned to the Blessed Virgin, "See, my Mother," she said, "all the trouble that I am causing in this house. I was not even better cared for by my parents. Oh, if it would please you and your divine Son, give me back my sight!" Immediately something fell from her eyes and they opened, and she could then once again see.
A couple of months after that, she suffered a tragic fall when she was hanging clothes on the terrace. At first the family for whom she was working thought she was dead; her bones seemed to be badly broken and crushed, and the doctors gave no hope of recovery. Her employers cared for her as for their own child. A month later, in front of her little night lamp that she kept burning before a statue of the Blessed Virgin Mary, she saw—as did St. Therese of the Child Jesus later on—the Blessed Virgin smile at her, recommending three things to her, obedience, charity and confidence. A perfume and light filled the room. Mariam was cured, and she immediately became hungry. The family and neighbors came flocking in, and at the sight of the prodigy everyone, Christian and Moslem, went down on their knees, giving thanks and proclaiming God`s miracle through the Virgin Mary.
These facts were later confirmed in a letter in 1869, when the prioress of the Carmel of Pau where Mariam was then a sister, wrote to Sister Gélas, the superior of the Daughters of Charity of Beirut, asking her to verify the accuracy of these facts, and the superior confirmed that the events had happened exactly as stated, and even added some further details. At age eighteen, circumstances led her to leave Lebanon for Marseille, France at the beginning of May, 1863. There she became a cook for an Arab woman named Madame Naggiar. Each morning Mariam usually went either to the church of St. Charles or to the church of St. Nicholas, the latter being of the Greek Catholic rite, which was her rite. In this church she once again enjoyed the sumptuous ceremonies of the confessor she chose a Lebanese priest, Fr. Philip Abdou, who was the rector of the church.
During one of her first communions there, she was rapt in a wonderful ecstasy. Her mistress, when informed of it, came for her in her carriage. The phenomenon lasted for four days, and the doctors did not know what to make of it. Mariam acknowledged later that she had gone through heaven, hell and purgatory. While in ecstasy she received the order to fast for one year on bread and water to expiate the sins of gluttony in the world, and to wear poor clothing to expiate the sins of immodesty and luxury. As stated earlier, while Mariam was in the marketplace of Jerusalem, she had been approached by a handsome young man who gave her excellent counsel. In Marseille, one morning when she was going up to Notre Dame de la Garde for Mass, she saw she was being followed by a man who was holding a child by the hand. This happened several times. Troubled by such persistence, Mariam approached the stranger and asked him to please stop following her. Surprisingly, the stranger answered with a beautiful smile and said: "I know that you want to enter the convent, and I will follow you until you are in the convent."
From that moment onward, Mariam felt herself called to the religious life. Who was this stranger? The young girl had no doubt that it was St. Joseph. In her efforts to follow her vocation, Fr. Abdou was of great help to her. But, as always in her life, the stages were many and laborious. The young Palestinian went first to the Daughters of Charity and applied to enter. Forestalled by Madame Naggiar, who did not want at any price to be deprived of her cook, they refused under the pretext that she was a servant. Mariam then went to see the Poor Clares, whose style of poverty and silence appealed to her immediately. But her delicate health did not allow her to enter the cloister; she had been so greatly weakened by her fast that she had been given the sacrament of the sick. But once again, rapidly and contrary to all expectations, she found herself cured.
She made a fresh attempt to enter the Sisters of St. Joseph of the Apparition, founded by Emily de Vialar. For it was St. Joseph who had appeared to her repeatedly in the street encouraging her to become a nun. The motherhouse and novitiate were located at "the Capelette" in the suburbs of Marseille. The little Palestinian could neither read nor write, and she spoke only Arabic. She was accepted, however, because the novitiate in fact had a few Palestinians among its numbers, and the Congregation had several communities in the East, especially in the Holy Land. Upon entering, she was familiarly called “Mariam the Arab,” or ”the little Arab.” She remained a postulant for two years. Thus the first part of the vocation that had been given to her by the Blessed Virgin had been realized, for she was now a daughter of St. Joseph.
Her fellow sisters were always amused by her broken French, but they were most impressed by her remarkable virtues and piety. Fortunately for Mariam, two women of great virtue were directing the Capelette at that time, the Superior General, Mother Emily Julien, and the Mistress of novices, Mother Honorine Piques. They were excellent spiritual guides for Mariam. To their surprise, they soon began to notice some strange phenomena in the little Arab. In January 1866, when Mariam was twenty years old, Mother Honorine came upon her in the dormitory, prostrate, with her face to the floor and her left hand covered with blood. From Wednesday evening to Friday morning each week, there soon was added another remarkable phenomenon, the stigmata. The stigmata of the heart was the first to be manifested (in August, 1866, at Marseille). She was praying in the chapel one evening, when, in the tabernacle she saw Jesus, who appeared to her with His five wounds and the crown of thorns. It seemed to her she saw coals of wrath in His hands. She heard Jesus say to His Mother prostrate at His feet: "Oh, how My Father is offended!" The little postulant then sprang toward Jesus and, putting her hand on the wound of His Heart, exclaimed, "My God, give me, please, all these sufferings, but have mercy on sinners." Coming out of the ecstasy, she saw her hand covered with blood and experienced a severe pain in her left side (the latter would bleed every Friday).
On March 27, 1867, the other stigmata appeared. The privileged one of the Crucified confided to the mistress of novices: "It seemed to me that I was gathering roses to decorate Mary´s altar: these roses appeared to have thorns on both sides, and the thorns were thrust in my hands and into my feet. When I came to myself, my mouth was very bitter, my feet and hands swollen: in the middle of my hands and on my feet there were black bumps." The following day, Thursday, the sufferings continued to increase until Friday. It was the Feast of the five wounds of Christ. In the morning, about ten o'clock, the black scabs fell off, the crown of thorns appeared on her forehead, and blood flowed from her head and feet. The prodigy was renewed during the months of April and the first two weeks of May. It ceased upon an order of the mistress of novices. This latter, in order to put an end to the rumors that were circulating in the community, asked the postulant to obtain from God that nothing would appear exteriorly. To the great joy of the stigmatist, the wounds closed and healed up.
Faced with such facts, Mother Honorine acted with as much prudence as understanding in regards to both the ecstasies and also the stigmata. Obedience being, in such cases, the litmus test of the Church, she thus forbade Mariam to have ecstasies during the day and in the presence of the religious. Even during the night she was not to get up, and she was not to attract attention. Mariam obeyed, and God, Whom loves obedience, seconded and approved of her actions . The Mistress of novices, seeing that she was dealing with a person extraordinarily fashioned by the Holy Spirit, asked the child to relate for her what she remembered of her childhood and adolescence. Everything was put in writing. One copy would later be sent to the Carmel of Pau with this note of Mother Honorine, "I am sending you copy of what I myself have gathered together from what she related to me, not without much resistance, but complying solely through obedience. She asked of me the greatest secrecy which I have guarded until this day... I have omitted everything I did not entirely understand, because of the difficulty this dear child experienced in explaining herself in French."
Mother Honorine fell ill, and was replaced in the novitiate by Mother Veronica. This religious was to hold a large place in the life and heart of Mariam. She was English and a convert from Anglicanism. After seventeen years of religious life with the Sisters of St. Joseph, she was later to enter the Carmel of Pau with Mariam, and it was in her arms that “the little Arab” would die, at the Carmel of Bethlehem. Mariam, had foretold that, contrary to all expectations, Sister Veronica would become mistress of novices at the Capelette. She held this office for one month, until the reception of the Indult permitting her to enter Carmel. And it was at Mother Veronica’s wish that Mariam`s stigmata disappeared at Marseille, and in accordance with Mariam’s prophecy at that time, the stigmata would not reappear until the following Lent, at Pau.
As may be imagined in such a large and diverse community, Mariam became an object of contradiction. While the majority of religious were favorable to her, there was a group of Sisters who were in opposition to her because of the extraordinary mystical graces that was receiving. For such is a common problem with mystics and victim souls who are called to religious life. After all, is such a person with such strange manifestations suitable for an active congregation? And then, with regard to such phenomena, were they authentic? The day came for the vote for admission to the novitiate. Of the seven eligible to vote, there were two abstentions, two in favor and three against. Mariam was not admitted!
It was a hard blow, first of all for Mother Honorine, who had good reasons to believe in her manner of life. As for the Superior General who, absent at the time of the vote, declared later at her return that, had she been present, that would never have happened. Later, on December 12, 1868, the Mother Superior wrote to the Prioress of the Carmel of Pau, "Our ecclesiastical superiors did not believe we should keep her in our midst, saying that a cloister was a better place to hide such souls. Our sisters obeyed. And so you now have this privileged soul. May God be praised for it!" Obviously the blow was hardest for Mariam. What was to become of her? Unknown to her the Holy Spirit was preparing the next course of action for her. Mother Veronica, who had received from Rome the authorization to become a Carmelite nun and transfer to the Carmel of Pau, proposed to Mariam that she might introduce her to the Mother Prioress. Mariam agreed so Mother Veronica wrote and the reply was immediate and positive. In her letter of introduction, Mother Veronica had passed over in silence Mariam`s extraordinary mystical privileges, but she had added, "She will obey even miraculously."
Having both gained admittance into the Carmelites, the two religious presented themselves at the door of the Carmel of Pau, France on Saturday, June 15, 1867. Mariam knew nothing at all of Carmel or of St. Teresa. But that day she understood that the mysterious words of her miraculous nurse at Alexandria were realized, "You will be a child of St. Joseph before becoming a daughter of St. Teresa". In 1870 she went with the founding group to establish the Carmel of Mangalore in India. It was there in Mangalore that Sister Mary of Jesus Crucified made her profession. She returned to the Carmel of Pau, France in 1872. Three years later she went to the Holy Land where she built a monastery in Bethlehem and began the planning for another at Nazareth.
Those who read her life discover that Mariam had experienced ecstasies all her life: from her early childhood, in the garden, in her home, and in the church of Ibillin; during the bloody night at Alexandria, at her employers in Beirut and Marseille. In the church of St. Nicholas she was rapt in an ecstasy that lasted four days. But it was especially from the time she entered religious life that the phenomena began to be intensified. At the Capelette, when she was with the Sisters of St. Joseph, she was found in ecstasy in the chapel, at recreation, and especially at night in the dormitory.
After she entered Carmel, we note a crescendo, to the degree that at Mangalore the ecstasies occurred almost daily: she had as many as five a day. At Bethlehem, during her last years, they were still more frequent, but at the same time more serene and more painful. The ecstasies would sometimes occur suddenly, and at other times progressively. "There are times," she said, "when I can do absolutely nothing: no matter what I do to prevent it; and at other times I can distract myself a little in order not to go off." In fact she did struggle against the raptures. In her ignorance of mystical things she did not even suspect the privilege she enjoyed for she spoke of her ecstasies as “sleep” And how she fought against going to “sleep”! She begged Father Manaudas, her spiritual director, to forbid her to sleep. "My child," the priest replied, "do not worry; you can go to sleep in all security." She began to cry. She made the same request to Bishop Lacroix, who ordered her to abandon herself to God instead of struggling against such a sleep. It was in fact a real struggle. In order to resist the rapture she moved around, she shook herself, she dashed to the fountain to wash herself, she worked more diligently. She even tried pricking her skin with pins, and in refectory she put burning hot food into her mouth. Nothing helped.
To the mistress of novices, who asked her how she could easily go to sleep, she replied innocently: "I feel as though my heart is open; as though there was a wound in it; and when I have certain ideas and impressions of God which move me, it feels like someone touched the wound in my heart, and I fall in weakness, I lose myself." During her professions ceremony at Mangalore, November 21, 1871, it required an order of the prioress to awaken her so that she could pronounce the vow formula. On June 28, 1873, at Pau, the prioress went into the little one´s cell after the recitations of matins. The latter was seated before the open window: she was in ecstasy. She said to the mother prioress: "The whole world is asleep, and God so full of goodness, so great, so worthy of all praise, and hardly no one is thinking of Him! See, nature praises Him, the sky, the stars, the trees, the grass, everything praises Him, and man, who knowledge of His benefits, who ought to praise Him, sleeps! Let us go, let us go and wake up the universe!" She skipped out of her cell: "Let us go and praise God, and sing His praises. Everyone is sleeping, the whole world is asleep, let us go and wake them up. Jesus is not known, Jesus is not loved. He, so full of goodness, He who has done so much for man!"
During her ecstasies, her body sometimes remained supple, but often it became rigid, remaining in the same position that it was at the beginning of the ecstasy. During this time, nothing and no one could make her move. It was impossible to have her sit or lay down, or to take her from her any object she was holding, or to lower her raised arm. Only obedience could overcome this immobility. She was also completely insensible to any external stimulus. Once, she injured her knee with a nail, which caused her much pain and she could not help but to limp when walking due to the pain. Suddenly she was rapt in ecstasy, and remained for two hours on her knees.
"I am in God, and God is in me. I feel that all creatures, the trees, the flowers belong to God and also to me. I no longer have a will, it belongs to God. And all that is God´s is mine." Only love can fill the heart of man. The just man is satisfied with love and a pinch of earth, but the wicked man, with all the pleasures, honors, riches (he can acquire), is always hungry, always thirsty. He is never satisfied. "Pay attention to little things. Everything is great before the Lord. The Lord does not want robbery in the sacrifice. Offer and give Him everything. "In heaven, the most beautiful souls are those that have sinned the most and repented. But they made use of their miseries like manure around the base of the tree." "Be very charitable; when one of your eyes sees what is not right, shut it and then open the other one! Change everything into good." "If you love your neighbor, it is by this that you will know if you love Jesus. Each time you look at your neighbor without seeing Jesus, you fall very low."
We see in the lives of many mystic saints that an ecstatic, while in ecstasy, can be drawn a little above the ground through a supernatural and mysterious grace. However, Sister Mary of Jesus Crucified was one of the only ones, along with Saint Joseph of Cupertino, to make real flights. The phenomena was verified for the first time on June 22, 1873 in the garden of the Carmel of Pau. Noticing her absence at supper, the mistress of novices looked for her in vain in the cloister and the orchard, then another nun heard a song: "Love! Love!" She looked up and discovered Mariam balancing herself without support at the top of an enormous lime tree. Advised of this, the prioress arrived and confronted with this phenomenon she initially did not know what to do. After a prayer she addressed the little one: "Sister Mary of Jesus Crucified, if Jesus wishes it, come down through obedience without falling or hurting yourself." At the simple word obedience, the ecstatic descended in fact "with the radiant face" and perfect modesty, stopping on some of the branches to sing Love. "Hardly was she on the ground," noted a witness, "and as if to make amends to our mother and sisters for our anxiety in looking for her and in seeing her perched up so high, she embraced us with a sort of enthusiasm and affection impossible to express."
Eight ecstatic levitations were documented: Beginning in 1873 on June 22, July 9, 19,25, 27, 31, August 3, 1873 and finally on July 5, 1874. "How did you manage to climb like that?" the mother prioress asked her. And she replied: "The Lamb held out His hands to me:" Some of the nuns wanted to make sure of this so they spied on her. One day a lay sister who was working in the garden was witness to the flight: "She had taken hold of the tip of a little branch that a bird would have bent; and from there, in an instant, she had been lifted on high." On July 5, perched on the lime tree, she addressed the mother prioress: "I was on that one there and I came up here. Look, see, my alpargates (a kind of soft slipper) are still there." On July 19, 1873, when the order was given for her to descend, she hesitated a moment. She begged to be allowed more time with the Lamb. "No," insisted the prioress, "through obedience, come down." She obeyed, but the shadow of hesitation had been fatal: the vision had disappeared. "The Lamb went away." Sighed the sister, "He left me alone to come down." In fact, because of her hesitance in obedience it was with effort that she got down to the ground and for four days of grief she expiated that unhappy moment. On July 25, the levitation lasted from four to seven o'clock in the evening; on July 31, it lasted from the end of recreation, which follows supper in the evening, until nine o'clock. This phenomenon occurred only at the Carmel of Pau.
In a letter dated February 14, 1927, Father Buzy, the Carmelite´s biographer, wrote the following statement to bishop Oliver Leroy: "Sister Mary used to raise herself to the top of the trees by the tips of the branches: she would take her scapular in one hand, and with the other the end of a small branch next to the leaves, and after a few moments she would glide along the outside edge of the tree to its top. Once up there, she would remain holding on to branches normally too weak to bear a person of her weight." The following are some depositions given by witnesses at process: "Sister E., now deceased, told me that one day when she happened to be in the garden with the servant of God, the latter said to her: "Turn around." She had hardly turn her head when looking back again, she saw the little one already seated on the top of the lime tree, on a little branch, balancing herself like a bird and singing divine love. Another person declared: "Once I saw her in ecstasy at the top of the lime tree, seated at the tip of the highest branch, which, normally would never have been able to support her. Her face was resplendent! I saw her come down from the tree like a bird, from branch to branch, with great nimbleness and modesty."
First let us read, in the memoirs of Mother Veronica at the Capelette, the description of the first stigmata of the little Arab: "On the first Thursday, May 2, 1867, when I went to see Mary, I found her sitting near her bed in great pain. She showed me her side, her feet and her hands. On these latter, in the place where they had been imprinted, that is to say on the upper part, there was a sort of blister, which formed the head of the nails, and in the palms the spot was black and swollen. At the place on her side, a little above the heart, there was the form of a cross all red and inflamed; and in the middle three small blisters with a little hole…I spent the night near her, and at five o'clock in the morning blood flowed from the wounds in her hands which I bathed, and the pain seemed to be alleviated. The blood flowed from the palm. The fingers were contracted and curved around, as if the nail had really gone into the palm, she could not extend them, nor take hold of the glass when I gave her a drink from time to time.
At about nine o'clock blood flowed from the crown of thorns all around her head. I can solemnly attest that I saw blood coming from the holes of the thorns, one of which, in the center of her forehead, opened before me, and blood gushed from it. While I was washing it, it closed again, leaving her forehead without any mark, except the traces of blood. Her feet were white; one would have said the feet of a corpse, and the toes were stretched like those of one crucified. The wounds on the upper part bled, as did the wound on her side. After three hours she was completely herself again, experiencing only a little weakness. I told her to get up, which she did by herself, and that evening she came to supper with the community." In the notes of the Carmel of Pau, we read that on Thursday, February 27, 1868: "She could not get up, she was suffering so much in her hands and feet. We took her to the infirmary. All that evening when passing near there, we would smell a strong sweet fragrance, but we could not detect its source. The novice´s veils and mantle also had a pleasant odor. The night was a bad one for her and the next morning blood began to flow from her feet and hands. The crown of thorns bled profusely at two different times, then the wound in her side, all with unspeakable pain. At noon all the bleeding stopped but the wounds remained open and became deeper each day, which prevented her from walking or putting her feet on the floor, for forty days. She could hardly bear any contact with the linens used to wrap her wounds, especially on Friday and Saturday. From that day until the following Friday, the wounds only oozed, but on Thursday of each week, a large pimple formed, black like a nail, which grew in size until Friday, then at the hour she designated in advance, this sort of blister fell off and the blood flowed; afterward the wound closed until the following week."
During the Mangalore period, we have above all the testimony of Father Lazare, a Carmelite and her director. On November 24 and 25, 1871, he attentively examined the stigmata. From his report we selected some precise statements: "The hands were swollen on the palm and the wounds were open; but all around the edge of the wounds there was a little coagulated blood, no doubt because this wound had begun to open several days before. On the inside of the hand there was a sort of button, forming the head of the nail. The flesh of the palm seemed to have been separated violently; it was torn, if I may thus express it, on the inside there were no tears, only the head of the nail was visible. The feet were similarly pierced through and through. The wounds were fresh, the flesh torn perhaps more than on the hands. One of the perforations was exactly in the middle of the sole of the foot, and there it ended with a quite newly formed small round hole, just as if the point of a sharp nail had been driven through it and then pulled out. It was the same with the other foot."
Lastly, for the Bethlehem period (1875-1878), we have chiefly the testimony of the mistress of novices, mother Mary of the Child Jesus. The stigmata appeared during the Lent of 1876. On March 3, the first Thursday of Lent, the little one called the mother into her cell and said to her: "See my humiliation; I don't anyone to come here, look at my hands." And the witness stated precisely: "We were able to ascertain that the blackish swelling, that looked like a large nail in the palm of her hands and also on the top of the hand, was formed much more quickly than during the Lent of 1868. Towards nine o'clock, the marks were still darker and more extended; her contracted fingers prevented her from using her hands. At noon, we saw the same thing on the upper part of her feet, but she absolutely refused to let us cover them with linen, which would greatly increase her suffering."
The following day the stigmatist was covered with a sweat of blood. On Friday, March 10, the mistress of novices and the sister infirmarian saw the crown of thorns take form on her bloody forehead. The same phenomenon on Friday, March 24: Here is their testimony: "About five thirty, all around the front of her head was bleeding; she had a sort of crown of little button shaped holes, some of which were still open as we looked on. During this time she wiped the blood from them. She got up right after that and all traces disappeared." Holy Week was frightful. Every part of her was bleeding: head, heart, hands and feet. During the course of her life she came to relive and act out certain scenes of the passion. She became the crucified spouse of a crucified God! Identified with her Spouse to the very details of Good Friday! "When she was in the state, she could have been called an 'ecce homo,' " declared Mother Honorine, in 1867 at the Capelette.
The next year at Pau, France, on Good Friday April 10, 1868, the stigmatist was truly on the cross; all her wounds reopened and the blood flowed from her head as well. We cannot conceive the intensity of the suffering she experienced. First she felt her legs pulled one after the other; and the same with her arms; then she felt her nails being driven in…Later, the heart bled as usual, and immediately after that, the wounds began to heal. She remained very weak all week and continued to suffer from her knees which were injured, swollen and full of bumps, perhaps resembling those our Lord must have had after all His Falls.
"She was groaning and she trembled in her whole body. It was heart rending to see her like that. She often repeated these words: "My God, do not abandon me; my God I offer it to You! Pardon, my God, pardon!" At a quarter past two in the afternoon she began a painful agony; we were all around her. Her legs were stiff, her feet down and crossed one over the other; her arms extended in the form of the cross, were supported by two of the sisters; her chest was distended, she even emitted a few sighs, as though she were breathing forth her soul…After three and a half hours, she had a little relief and spoke again to those "children" (angels) saying to them: "Have pity on me, call me today." She also experienced transports of desire and love: "Call me so that I may leave this earth!" Then she was heard to say: "Fiat, Jesus!" We then had the impression that the crucified one was descending from the cross and from Calvary in order to prepare for the Easter joys. "Don Belloni, confessor of the stigmatist at Bethlehem, asserted that when holding one of her hands against the light, the flesh appeared transparent at the place of the stigmata.
Besides being deeply grounded in humility, in her ignorance she did not realize that the stigmata was a privileged grace from God; she looked upon it as an illness and begged God and Blessed Virgin to take from her what she called "the wretched marks." According to her prediction, the wounds reopened the following Lent, at the Carmel of Pau. They caused atrocious suffering and flowing of the blood. That was renewed every Friday during the Lent of 1868. The Carmelite nuns were admitted to see the prodigy; and the superior of the Carmel, Fr. Guilly entered the enclosure. He verified the phenomena, he put his finger on one of the wounds: at this contact the novice´s entire body shuddered. On Holy Saturday the Stigmata disappeared. The wounds appeared again at Mangalore. On November 20, 1871, the eve of her profession, the little one confided to the mistress of novices: "If I tell you something will you keep my secret?" - "Yes." - "Look, this illness that I fear so much has returned." And she showed her her swollen hands and feet. The day after her profession the stigmata bled profusely. Frightened, the sister earnestly begged God to cure her. This time again she was heard. For more than four years she experienced nothing.
The last period of stigmatization took place at Bethlehem in April 1876. It was the longest and most painful. It made witnesses think they were on Calvary before the spectacle of Crucifixion! Sister Mariam said: "Do you know? Five rosebushes are blooming, quick, quick. They have given the roses to others, and the thorns to me." And she added with a smile: "We do not like that; here we give at least a few roses! And not to let me smell the perfume at all, nothing but thorns! Oh, well - I deserve it! That Jesus may be content, that is all I desire. I accept all the thorns on my body, but tell the Master of the rosebushes to close the roses." After these red flowerings at Marseille, Pau, Mangalore, and Bethlehem, the "five roses" of her Stigmata were closed for the last time on April 26, 1876.
Mariam's devotion to the Holy Spirit was not common in her time. And yet her spiritual journey seemed to be guided by the Spirit in unprecedented ways. Inspired by having received a special prayer to the Holy Spirit during one of her ecstatic experiences, she was convinced that devotion to the Holy Spirit, who was then commonly known as the Paraclete, was needed by the whole Church. She even sent a petition to Pope Pius IX asking him to cultivate a greater devotion within the Church to the Holy Spirit. No one knows what the pope thought of this at the time, but 20 years later Pope Leo XIII published an encyclical about devotion to the Paraclete. Concerning devotion to the Holy Spirit she wrote: "The world and religious communities are seeking novelties in devotions, and they are neglecting true devotion to the Paraclete. That is why there is error and disunion, and why there is no peace or light. They do not invoke light as it should be invoked, and it is this light that gives knowledge of truth. It is neglected even in seminaries. Every person in the world that will invoke the Holy Spirit and have devotion to Him will not die in error." | 2019-04-22T18:24:46Z | http://www.sttheresechurchalhambra.org/?DivisionID=20008&DepartmentID=22710 |
Proteins interact through specific binding interfaces that contain many residues in domains. Protein interactions thus occur on three different levels of a concept hierarchy: whole-proteins, domains, and residues. Each level offers a distinct and complementary set of features for computationally predicting interactions, including functional genomic features of whole proteins, evolutionary features of domain families and physical-chemical features of individual residues. The predictions at each level could benefit from using the features at all three levels. However, it is not trivial as the features are provided at different granularity.
To link up the predictions at the three levels, we propose a multi-level machine-learning framework that allows for explicit information flow between the levels. We demonstrate, using representative yeast interaction networks, that our algorithm is able to utilize complementary feature sets to make more accurate predictions at the three levels than when the three problems are approached independently. To facilitate application of our multi-level learning framework, we discuss three key aspects of multi-level learning and the corresponding design choices that we have made in the implementation of a concrete learning algorithm. 1) Architecture of information flow: we show the greater flexibility of bidirectional flow over independent levels and unidirectional flow; 2) Coupling mechanism of the different levels: We show how this can be accomplished via augmenting the training sets at each level, and discuss the prevention of error propagation between different levels by means of soft coupling; 3) Sparseness of data: We show that the multi-level framework compounds data sparsity issues, and discuss how this can be dealt with by building local models in information-rich parts of the data. Our proof-of-concept learning algorithm demonstrates the advantage of combining levels, and opens up opportunities for further research.
The software and a readme file can be downloaded at http://networks.gersteinlab.org/mll. The programs are written in Java, and can be run on any platform with Java 1.4 or higher and Apache Ant 1.7.0 or higher installed. The software can be used without a license.
The functions of many proteins depend highly on their interactions with other proteins. Complete protein-protein interaction (PPI) networks provide insights into the working mechanisms of proteins at a global level. While high-throughput experiments such as yeast two-hybrid (Y2H) [1–4] and tandem-affinity purification with mass spectrometry (TAP-MS) [5, 6] have enabled the survey of whole PPI networks, the resulting data are noisy with a lot of false positives and false negatives [7, 8].
The construction of more reliable PPI networks has been assisted by computational techniques. These techniques usually employ a supervised [9–12] or unsupervised and topological [13–16] machine learning method to predict the interaction of proteins. While some of the methods could predict PPI networks with high accuracy, they do not explain how the proteins interact. For instance, if protein A interacts with both proteins B and C, whether B and C could interact with A simultaneously remains unknown, as they may or may not compete for the same binding interface of A. This observation has led to the recent interest in refining PPI networks by structural information about domains [17–19]. It has also called for the prediction of protein interactions at finer granularities.
Since binding interfaces of proteins are enriched in conserved domains in permanent interactions , it is possible to construct a second-level interaction network with protein interactions annotated by the corresponding domain interactions. An even finer third-level interaction network involves the residues mediating the interactions (Figure 1, visualization of (a) by VMD ).
Schematic illustration of multi-level learning concepts. (a) The three levels of interactions. Top: the PDB structure 1piw of the homo-dime r yeast. NADP-dependent alcohol dehydrogenase 6. Middle: each chain contains two conserved Pfam domain instances, PF00107 (inner) and PF08240 (outer). The interaction interface is at PF00107. Bottom: two pairs of residues predicted by iPfam to interact: 283 (yellow) with 287 (cyan), and 285 (purple) with 285. (b) The three information flow architectures. i: independent levels, ii: unidirectional flow (illustrated by download flow), iii: bidirectional flow. (c) Coupling mechanisms for passing information from one level to another. 1: passing training information to expand the training set of the next level, 2: passing predictions as an additional feature of the next level, 3: passing predictions to expand the training set of the next level.
As will be described in the next section, some recent studies have started to perform interaction predictions at the domain and residue levels. The data features used by each level are quite distinct. While protein level features are mostly from functional genomic and proteomic data such as gene expression and sub-cellular localization of whole genes and proteins, domain level features are mainly evolutionary information such as phylogenetic-occurrence statistics of the domain families, and residue level features are largely structural or physical-chemical information derived from the primary sequences.
In the literature of domain-level prediction, the term "domain" is usually used to mean a domain family, which could have multiple occurrences in different proteins. In this study we use the terms "domain family" and "domain instance" to refer to these two concepts respectively, in order to make a clear distinction between them. For example, PF07974 is a domain family from Pfam, where ADP1_YEAST.PF07974 is a domain instance in the protein ADP1_YEAST.
Since the data features of the three levels describe very different aspects of the biological objects, potentially they could contribute to the prediction of different portions of the interaction networks. For example, some protein interactions could be difficult to detect using whole-protein level features since they lack fine-grained physical-chemical information. These can be supplemented by the residue level features such as charge complementarity.
Likewise, for the protein interactions that occur within protein complexes, there could be a high correlation between the expressions of the corresponding genes. With proper gene expression datasets included in the protein features, there is a good chance of correctly predicting such protein interactions. Then if one such interaction involves a pair of proteins each with only one conserved domain, it is very likely that the domain instances actually interact.
One may worry that if the predictions at a particular level are inaccurate, the errors would be propagated to the other levels and worsen their predictions. As we will discuss, this issue can be handled algorithmically by carefully deciding what information to propagate and how it is propagated. With a properly designed algorithm, combining the predictions and utilizing the data features of all three levels can improve the predictions at each level.
In this work we propose a new multi-level machine-learning framework that combines the predictions at different levels. Since the framework is also potentially useful for other problems in computational biology that involve a hierarchy, such as biomedical text mining (a journal contains papers and a paper contains key terms), we start with a high-level description of multi-level learning and discuss three key aspects of it. Then we suggest a practical algorithm for the problem of predicting interactions at the protein, domain and residue levels, which integrates the information of all three levels to improve the overall accuracy. We demonstrate the power of this algorithm by showing the improvements it brings to the prediction of yeast interactions relative to the predictions from independent levels (Software available [additional file 1]).
Two main ingredients of protein-protein interaction predictions are the selection of a suitable set of data features, and an appropriate way to integrate them into a learning method. Many kinds of features have been considered , including sub-cellular localization , gene expression [23, 24], and phylogenetic profiles . With the many different kinds of data features, Bayesian approaches and kernel methods [9, 12, 26] are natural choices for integrating them into a single learning algorithm. The former unifies the whole inference process by a probabilistic framework, while the latter encodes different kinds of data into kernel matrices that can be combined by various means .
Domain family-domain family interaction predictions are related to the more general goal of identifying protein interaction interfaces. While some studies tackle the problem using features at the domain level only , most other work assumes that a set of protein-protein interactions are known a priori, and the goal is to predict either domain family interactions (i.e., which domain families have their instances interact in at least one pair of proteins) or domain-instance interactions (i.e., through which domain instances do proteins interact in known interactions) [28–49]. The data features are mainly derived from statistics related to the parent proteins. For example, for a pair of domain families, the frequency of co-occurrence in interacting proteins is an informative feature, since a higher frequency may indicate a larger chance for them to be involved in mediating the interactions.
At a finer level, identifying protein interaction interfaces involves the prediction of residue interactions, which could be divided into two sub-tasks: 1) predicting which residues are in any interaction interfaces of a protein , and 2) predicting which of these interfaces interact . Data features are mainly derived from the primary protein sequences or from crystal structures if they are assumed available. Docking algorithms represent related approaches, but have a fundamentally different focus: Their goal is to utilize largely physical information to deduce the structure of the complex from the unbound protein structures, a considerably harder problem. Therefore, we do not consider them in this article and focus on large-scale techniques.
From a theoretical perspective, our multi-level learning framework is loosely related to co-training and the meta-learning technique stacking . We will compare them with our framework after introducing the information flow architectures and the coupling mechanisms in Sections and respectively. Also, our framework by nature facilitates semi-supervised learning . We will briefly discuss semi-supervised learning and its relationships with PSI-BLAST in Section.
Objects: a set of proteins, each containing the instances of one or more conserved domains, each of which contains some residues. Each protein, domain instance and residue is described by a vector of feature values. Some additional features are available for pairs of objects, such as the likelihood for a pair of proteins to interact according to a high-throughput experiment.
Gold standard positive sets of known protein-protein, domain instance-domain instance and residue-residue interactions. As in other studies on protein interaction networks, we use the term "gold standard set" to mean a set of sufficiently reliable data useful for the prediction purpose, instead of a ground-truth set that is absolutely correct. The positive sets could be 1) contaminated with false positives, and 2) incomplete, with false negatives, and a pair of upper-level objects in the positive set may not have any corresponding lower-level object pairs known to be in the positive sets.
Gold standard negative sets of non-interactions at the three levels.
We assume no crystal structures are available except for the proteins in the gold-standard positive sets, so that the input features cannot be derived from known structures. This is a reasonable assumption given the small number of known structures as compared to the availability of other data features.
The objective is to use the gold standard sets and the data features to predict whether the object pairs outside the gold standard sets interact or not. Prediction accuracies are estimated by cross-validation using holdout testing examples in the gold standard sets not involved in the training process.
In this study we focus on kernel methods for learning from examples and making predictions. The main goal of this study is to explain how the predictions at the different levels can be integrated, and to demonstrate the resulting improvements in accuracy. We do not attempt to boost the accuracy at each individual level to the limit. It may be possible to improve our predictions by using other features, learning algorithms, and parameter values. As we will see, the design of our algorithm provides the flexibility for plugging in other state-of-the-art learning methods at each level. We expect that the more accurate the individual algorithms are, the more benefits they will bring to the overall accuracy through the multi-level framework.
In order to develop a method for predicting interactions at all three levels in a cohesive manner, we need to define the relationships between the levels, which is the topic of Section. We first describe two information flow architectures already considered in previous studies, and then propose a new architecture that maximally utilizes the available data. In Section we discuss various possible approaches to coupling the levels, i.e., ways to pass information between levels. In Section we discuss the data sparsity issue. In particular, we describe the idea of local modeling, which is also useful for network predictions in general. Finally, in Section we outline the actual concrete algorithm that we have developed and used in our experiments.
A traditional machine-learning algorithm learns patterns from one single set of training examples and predicts the class labels of one single set of testing instances. When there are three sets of examples and instances instead, the most straightforward way to learn from all three levels is to handle them separately and make independent predictions (Figure 1bi). We use this architecture to setup the baseline for evaluating the performance of the other two architectures.
A second architecture is to allow downward (from protein to domain to residue) or upward (from residue to domain to protein) flow of information, but not both (Figure 1bii). This architecture is similar to some previous domain-level interaction methods described above, which also use information from the protein level. However, in our case protein interactions are not assumed to be known with certainty. So only the training set and the predictions made from the training set at the protein level can be used to assist the domain and residue levels.
A third architecture is to allow the learning algorithm of each level to access the information of any other levels, upper or lower (Figure 1biii). By allowing both upward and downward flow of information, this new architecture is the most flexible among the three, and is the architecture that we explore in this study. Theoretically, this architecture is loosely related to co-training , which assumes the presence of two independent sets of features, and each is capable of predicting the class labels of a subset of data instances. Here we have three sets of features, each of which is capable of predicting a portion of the whole interaction network. Practical extensions to the ideal co-training model allow partially dependent feature sets and noisy training examples, which fit our current problem. Learning proceeds by iteratively building a classifier from one feature set, and adding the highly confident predictions as if they were gold-standard examples to train another classifier using the other feature set. The major difference between our bidirectional-flow architecture and co-training is the presence of a hierarchy between the levels in our case, so that each set of features makes predictions at a different granularity.
To design a concrete learning algorithm, we need to specify what information is to be passed between different levels and how it is passed. Here we suggest several possibilities, and briefly discuss the pros and cons of each of them.
One simple idea is to pass training data to other levels (Figure 1c, arrow 1). This can be useful in filling in the missing information at other levels. For example, many known protein interactions do not have the corresponding 3D structures available, so there is no information regarding which domain instances are involved in the interactions. The known protein interactions can be used to compute statistics for helping the prediction of domain-level interactions.
The major limitation of passing only training data is that the usually much larger set of data instances not in the training sets (the "unlabeled data") would not benefit from multi-level learning. In contrast, if the predictions made at a level are also passed to the other levels, much more data instances could benefit (Figure 1c, arrow 2 and 3). For instance, if two domain instances are not originally known to interact, but they are predicted to interact by the domain-level features with high confidence, this information directly implies the interaction of their parent proteins.
Algorithms adopting this idea are semi-supervised in nature , since they train on not only gold-standard examples, but also predictions of data instances that are originally unlabeled in the input data set. Note that the idea of semi-supervised learning has been explored in the bioinformatics literature. For instance, in the PSI-BLAST method , sequences that are highly similar to the query input are iteratively added as seeds to retrieve other relevant sequences. These added sequences can be viewed as unlabeled data, as they are not specified in the original query input.
To pass information between levels, a first approach is to combine the learning problems of the different levels into a single optimization problem. The objective function could involve the training accuracies and smoothness requirements of all three levels. This approach enjoys the benefits of being mathematically rigorous, and being backed by the well-established theories of optimization. Yet the different kinds of data features at the different levels, as well as noisy and incomplete training sets, make it difficult to define a good objective function. Another drawback is the tight coupling of the three levels, so that it is not easy to reuse existing state-of-the-art prediction algorithms for each level.
Another approach is to have a separate learning algorithm at each level, and use the predictions of a level as an additional feature of another level (Figure 1c, arrow 2). For example, if each pair of proteins is given a predicted probability of interaction, it can be used as the value of an additional feature 'parent proteins interacting' of the domain instance pairs and residue pairs. In this approach the different levels are loosely coupled, so that any suitable learners can be plugged into the three levels independently, and the coupling of the levels is controlled by a meta-algorithm.
A potential problem is the weighting of the additional features from other levels relative to the original ones. If the original set of features is large, adding one or two extra features without proper weighing would have negligible effects on the prediction process. Finding a suitable weight may require a costly external optimization or cross-validation procedure. For kernel methods, an additional challenge is integrating the predictions from other levels into the kernel matrix, which could be difficult as its positive semi-definiteness has to be conserved.
The idea of having a meta-algorithm that utilizes the predictions of various learners is also used in stacked generalization, or stacking . It treats the predictions of multiple learners as a new set of features, and uses a meta-learner to learn from these predictions. However, in our setting, the additional features come from other levels instead of the same level.
A similar approach is to add the predictions of a level to the training set of another level (Figure 1c, arrow 3). The resulting training set involves the original input training instances and augmented training data from other levels, with a coefficient reflecting how much these augmented training data are to be trusted according to the training accuracy of the supplying level. This approach also has the three levels loosely coupled.
A potential problem of this training set expansion approach is the propagation of errors to other levels. The key to addressing this issue is to perform soft coupling, i.e., to associate confidence values to predictions, and propagate only highly confident predictions to other levels. For kernel methods, this means ignoring objects falling in or close to the margin. This approach is similar to PSI-BLAST mentioned above, which selectively includes only the most similar sequences in the retrieval process.
In this study, we focus on this third approach. It requires a learning method for each level, while the control of information flow between the different levels by means of training set expansion forms the meta-algorithm. Since each level involves only one set of features and one set of data instances, traditional machine learning methods can be used. We chose support vector regression (SVR) , which is a type of kernel method. We used regression instead of the more popular support vector machine classifiers because the former can accept confidence values of augmented training examples as inputs, and produce real numbers as output, which can be converted back into probabilities that reflect the confidence of interactions.
Features for object pairs: it is not easy to construct features for pairs of objects, since most available data features are for single objects. This is particularly a problem for kernel methods, which require a kernel matrix to encapsulate the similarity between each pair of data instances. For network data, this means a similarity value for each pair of object pairs. While methods have been proposed to construct such kernel matrices , the resulting kernels, while formally correct, are difficult to interpret.
Time complexity: working with pairs of objects squares the time requirement with respect to the number of objects in the dataset. While state-of-the-art implementations of kernel methods could easily handle thousands of proteins, it would still be challenging to deal with millions of protein pairs, let alone the even more daunting numbers of domain instance pairs and residue pairs.
Space complexity: the kernel matrix has a size quadratic in the number of data instances. With n objects at a level, there are O(n2) pairs and thus the kernel matrix contains O(n4) entries.
Sub-clusters: the two classes of data instances may contain many sub-clusters that cannot be handled by one single global model. For instance, proteins involved in permanent complexes may use a very different interaction mechanism from transient interactions in signaling pathways.
To avoid these problems, one alternative is local modeling . Instead of building one single global model for all object pairs, one local model is built for each object. For example, if the dataset contains n proteins, then n models are built, one for each protein, for predicting whether this protein interacts with each of the n proteins. The advantages of local modeling are obvious: 1) data features are needed for individual objects only, 2) the time complexity is smaller than global modeling whenever the learning method has a super-linear time complexity, 3) much less memory space is needed for the kernel matrix, and 4) each object can have its very specific local model. For all these benefits, in our experiments we only considered local modeling.
Local modeling is most useful when the training data are abundant and evenly distributed across different objects, such that each object receives a reasonable amount of positive and negative examples to train its local model. However, when the training data are sparse and uneven, some objects may have insufficient (or none at all) training examples. For instance, among the millions of yeast protein pairs, there are only a few thousand known interactions, so many proteins have very few of them.
Our proposed solution uses concepts related to semi-supervised learning: use high confidence predictions to augment training sets. Suppose protein A has sufficient known positive and negative examples in the original training sets, and the local model learned from these examples predicts with high confidence protein B to be an interaction partner with A. Then when building the local model for B, A can be used as a positive training example. Predicted non-interactions can be added as negative examples in a similar way. This idea is consistent with the training set expansion method proposed above for inter-level communication. As a result, the information flow both between levels and within a level can be handled in a unified framework. The expanded training set of a level thus involves the input training data, highly confident predictions of the local models of the level, and highly confident predictions from other levels. Practically, training set expansion within the same level requires an ordered construction of the local models. Objects with many (input or derived) training examples should have their local models constructed first, as more accurate models are likely to be obtained from larger training sets. As these objects are added as training examples of their predicted interaction partners and non-partners, they would progressively accumulate training examples for their own local models.
We now explain how we used the ideas described in the previous sections, namely bidirectional information flow, coupling by predictions passing, and local modeling with training set expansion, to develop out concrete learning algorithm for prediction of protein, domain instance and residue interactions. We first give a high-level overview of the algorithm, then explain the components in more detail.
Setup a learning sequence of the levels.
Use the model learned for the first level in the sequence to predict interactions at the level.
Propagate the most confident predictions to the next level in the sequence as auxiliary training examples.
Repeat the previous two steps for the second and third levels, and so on.
We use training set expansion with support vector regression (SVR) to perform learning at each level. Each pair of objects in the positive and negative training sets is given a class label of 1 and 0, respectively. An SVR model is learned for the object (e.g. protein) with the largest number of training examples (denoted as A). The model predicts a real value for each object, indicating the likelihood that it interacts with A. The ones with the largest and smallest predicted values are treated as the most confident positive and negative predictions, and are used to expand the training set. For example, if B is an object with the largest predicted value, then A and B are predicted to interact, and A is added as an auxiliary positive training example of B. After training set expansion, the next object with the largest number of training examples is re-determined, its SVR is learned, and the most confident predictions are used to expand the training set in the same manner. The whole process then repeats until all models have been learned. Finally, each pair of objects A and B received two predicted values, one from the model learned for A and one from the model learned for B. The two values are weighted according to the training accuracies of the local models for A and B to produce the predicted value for the pair. Sorting the predicted values in descending order gives a list of predictions from the pair most likely to interact to the one least likely. The list is then used to evaluate the accuracy by the area under the receiver operator characteristic curve (AUC) . We have tried a range of values for defining the most confident set of predictions (results available at supplementary web site), and the general trends of prediction accuracies were observed to remain largely unchanged.
One way to setup the learning sequence is to use the above procedure to deduce the training accuracy of the three levels when treated independently, then order the three levels into a learning sequence according to their accuracies. For example, if the protein level gives the highest accuracy, followed by the domain level, and then the residue level, the sequence would be "PDRPDR...", where P, D and R stand for the protein, domain and residue levels, respectively. Having the level with the highest training accuracy earlier in the sequence ensures the reliability of the initial predictions of the whole multi-level learning process, which is important since all latter levels depend on them. Notice that after learning at the last level, we feedback the predictions to the first level to start a new iteration of learning.
In our computational experiments we also tested the accuracy when only two levels are involved. In such situations, we simply bypassed the left-out level. For example, to test how much the domain and residue levels could help each other without the protein level, the learning sequence would be "DRDR...".
The mechanism of propagating predictions from a level to another depends on the direction of information flow.
For an upward propagation (R→D, R→P or D→P), each object pair in the next level receives a predicted likelihood of interaction from each pair of their child objects. For example, if predictions are propagated from the domain level to the protein level, each pair of domain instances provides a predicted value to their pair of parent proteins. We tried two methods to integrate these values. In the first method, we normalize the predicted values to the [0, 1] range as a proxy of the probability of interaction, then use the noisy-OR function to infer the chance that the parent objects interact. Let X and Y be the two sets of lower-level objects, and p(x, y) denotes the probability of interaction between two objects x ∈ X and y ∈ Y, then the chance that the two parent objects interact is 1 - ∏x∈X, y∈Y(1 - p(x, y)), i.e., the parent objects interact if and only if at least one pair of its children objects interact. In the second method, we simply take the maximum of the values. In the ideal case where all predicted values are either 0 or 1, both methods are exactly the same as taking the OR of the values. When the values are noisy, the former is more robust as it does not depend on a single value. Yet its value is dominantly affected by a large number of fuzzy predicted values with intermediate confidence, and is thus less sensitive. Since in our tests it does not provide superior performance, in the following we report results for the second method.
For a downward propagation (P→D, P→R or D→R), we inherit the predicted value of the parent pair as the prior belief that the object pairs from the two parents will interact. For example, if we are propagating information from the protein level to the domain level, each pair of domain instances has a prior belief of interaction equal to the predicted likelihood that their parent proteins interact.
In both cases, after computing the probability of interaction for each pair of objects in the next level based on the predicted values at the current level, we again add the most confident positive and negative predictions as auxiliary training examples for the next level, with the probabilities used as the confidence values of these examples.
In the actual implementation, we used the Java package libsvm for SVR, and the Java version of lapack http://www.netlib.org/lapack/ for some matrix manipulations.
We tested the effectiveness of multi-level learning by predicting protein, domain instance and residue interactions of the yeast Saccharomyces cerevisiae.
Data features were gathered from multiple sources (Table 1), including phylogenetic profiles , sub-cellular localization , gene expression [24, 63], and yeast two-hybrid [1, 4] and TAP-MS [5, 6] networks. Each of them was turned into a kernel matrix and the final kernel was the summation of them, as in previous studies [12, 26].
Data features at the protein level.
A gold standard positive set was constructed from the union of experimentally verified or structurally determined protein interactions from MIPS , DIP and iPfam with duplicates removed. The MIPS portion was based on the 18 May 2006 version, and only physical interactions not obtained from high throughput experiments were included. The DIP portion was based on the 7 Oct 2007 version, and only interactions from small-scale experiments or multiple experiments were included. The iPfam portion was based on version 21 of Pfam . A total of 1681 proteins with all data features and at least one interaction were included in the final dataset, forming 3201 interactions. A gold standard negative set with the same number of protein pairs was then created from random pairs of proteins not known to interact in the positive set [9, 32].
We included two types of features at the domain level: co-evolution and statistics related to parent proteins (Table 2). These are similar to the features used by previous studies for domain family/domain instance interaction predictions [28, 47, 68].
Data features at the domain level.
*: These two features were used with the unidirectional and bidirectional flow architectures only since they involve information about the training set of the protein level.
The gold standard positive set was taken from iPfam, where two domain instances are defined as interacting if they are close enough in 3D structure and some of their residues are predicted to form bonding according to their distances and chemistry. After intersecting with the proteins considered at the protein level, a total of 422 domain instance interactions were included, which involves 272 protein interactions and 317 domain instances from 223 proteins and 252 domain families. A negative set with the same number of domain instance pairs was then formed from random pairs of domain instances in the positive set. All known yeast Pfam domain instances of the proteins were involved in the learning, many of which do not have any known interactions in the gold standard positive set. Altogether 2389 domain instances from 1681 proteins and 1184 domain families were included.
We used three data features derived from sequences (Table 3). Charge complementarity and other features likely useful for interaction predictions are implicit in the sequence profiles. The features are similar to those used in a previous study . However, as we do not assume the availability of crystal structures of unlabeled objects, the secondary structures and solvent accessible surface areas we used were algorithmically predicted from sequence instead of derived from structures. We used SABLE to make such predictions. Information about empirical kernel map and constant shift embedding can be found in and , respectively.
Data features at the residue level.
In a previous study , the feature set of a residue involves not only the features of the residue itself, but also neighboring residues closest to it in the crystal structure, which allows for the possibility that some of them are involved in the same binding site and thus have dependent interactions. In the absence of crystal structures, we instead included a window of residues right before and after a residue in the primary sequence to construct its feature set. We chose a small window size of 5 to make sure that the included residues are physically close in the unknown 3D structures.
The gold standard positive set was taken from iPfam, where the interacting residues are determined based on their proximity in known crystal structures of interacting proteins. Since there is a large number of residue pairs, we only sampled 2000 interactions, which involve 228 protein pairs, 327 domain instance pairs and 3053 residues from 195 proteins, 279 domain instances and 224 domain families. Only these 3053 residues were included in the data set. A negative set was created by randomly sampling from these residues 2000 residue pairs that do not have known interactions in iPfam.
We used ten-fold cross validation to evaluate the performance of our algorithm. Since the objects in the three levels are correlated, an obvious performance gain would be obtained if in a certain fold the training set of a level contains some direct information about the testing set instances of another level. For example, if a residue interaction in the positive training set comes from a protein pair in the testing set, then the corresponding protein interaction can be directly inferred and thus the residue interaction would create a fake improvement for the predictions at the protein level. This problem was avoided by partitioning the object pairs in the three levels consistently. First, the known protein interactions in iPfam were divided into ten folds. Then, each domain instance interaction and each residue interaction was put into the fold in which the parent protein interaction was assigned. Finally, the remaining protein interactions and all the negative sets were randomly divided into ten folds.
Each time, one of the folds was held out as the testing set and the other nine folds were used for training. We used the area under the ROC (Receiver Operator Characteristics) curve (AUC) to evaluate the prediction accuracies. For each level, all object pairs in the gold standard positive and negative sets were sorted in descending order of the predicted values of interaction they received when taking the role of testing instances. The possible values of AUC range from 0 to 1, where 1 corresponds to the ideal situation where all positive examples are given a higher predicted value than all negative examples, and 0.5 is the expected value of a random ordering.
We compared the prediction accuracies in three cases: independent levels, unidirectional flow of training information only, and bidirectional flow of both training information and predictions. For the latter two cases, we compared the performance when different combinations of the three levels were involved in training.
For independent levels, we trained each level independently using its own training set, and then used the predictions as initial estimates to retrain for ten feedback iterations. This iterative procedure was to make sure that any accuracy improvements observed in the other architectures were at least in part due to the communications between the different levels, instead of merely the effect of semi-supervised learning at a single level. For unidirectional flow, we focused on downward flow of information. The levels were always arranged with upper levels coming before lower levels.
Table 4 summarizes the prediction accuracies of the three levels. All numbers correspond to the average results among the ten feedback iterations. Each row represents the results of one level. For unidirectional flow and bidirectional flow, the levels involved in training are also listed. For example, the PR column of unidirectional flow involves the use of the protein-level training sets in setting up the initial estimate of the residue interactions. This has no effect on the predictions at the protein level since information only flows downward. The cell at the row for protein interactions is therefore left blank. The best result in each row is in bold face.
Prediction accuracies (AUC) of the three levels with different information flow architectures and training levels.
We first notice that the results for independent levels are consistent with our expectations. Having many diverse data features, the protein level has a satisfactory accuracy. On the other hand, the accuracies of the domain and residue levels were relatively low due to their weak and noisy features. Note that we are predicting whether two arbitrary domain instances or two arbitrary residues interact, rather than only those in known interacting protein pairs. This setting is more realistic for organisms with no known protein interaction network, and the problem is significantly harder than when the protein interaction network is available.
Downward flow of training information did help the prediction of domain instance interactions. However, the results of the residue level are quite unsatisfactory, with accuracies even lower than those with independent levels no matter assisted by the training examples of the protein level or domain level. In contrast, the results for bidirectional flow are encouraging. In all cases, the accuracies are higher than the other two architectures. For example, while using the domain level to help the residue level decreased the accuracy of the latter from 0.5675 to 0.5128 with unidirectional flow, the accuracy was increased to 0.6182 with bidirectional flow. As an illustration of the difference in performance of the three architectures, the various ROC curves of protein, domain and residue interaction predictions are shown in Figures 2, 3 and 4, respectively.
Receiver operator characteristic (ROC) curves of protein interaction predictions with different frameworks and training levels.
Receiver operator characteristic (ROC) curves of domain interaction predictions with different frameworks and training levels.
Receiver operator characteristic (ROC) curves of residue interaction predictions with different frameworks and training levels.
The improvements for both the domain and residue levels are quite dramatic, with maximum AUC gains of more than 0.15. This clearly shows the benefits of passing not only training information, but also highly confident predictions. Consider a domain instance pair in the testing set of a certain fold. Since the corresponding parent protein pair must not be in the training set at the protein level of the fold, the passing of training information does not directly help predict the interaction status of the domain instance pair. On the other hand, if the interaction status of the protein pair is predicted correctly with high confidence, passing this information to the domain level can make a direct influence on the prediction of the domain instance interaction. For instance, if the protein pair is correctly predicted as not interacting, the domain instance pair would probably be correctly predicted as not interacting, too.
In general, it is observed that levels with a higher raw accuracy with independent levels could offer a bigger improvement to the other levels. For example, the protein level increased the accuracy of the residue interaction predictions from 0.5675 to 0.6581, while the domain level could only increased it to 0.6182. However, it is also crucial to note that although the domain level has a low accuracy with independent levels, it could still make good improvements to the prediction of residue interactions. This observation supports our design of passing only highly confident predictions in avoiding the propagation of errors. The combination of all three levels has the potential to further improve accuracy. For both the protein and residue levels, the best results were obtained when all three levels were involved in training. In particular, while each of the protein and domain levels improved the residue level by a certain amount, the combination of them provided yet another significant amount of improvement.
As a concrete example of information flow between the three levels, several of the interacting residue pairs between the hexokinase 1 (PF00349) and hexokinase 2 (PF03727) domains of the hexokinase isoenzyme 2 (HXK2) protein are correctly identified with high likelihood of interaction. For example, residue 46 in the hexokinase 1 domain and residue 278 in the hexokinase 2 domain are predicted to interact with a score of 0.89 out of 1.0. This might be partially due to the charge complementarity of the two residues in their PSI-BLAST profiles, with the most conserved residues being the positively-charged arginine and the negatively-charged aspartic acid at the two positions, respectively. The detecting of such residue interaction helps raise the likelihood of the corresponding domain interaction from a score of 0.27 to 0.72. In turn, this helps detect the self-interaction of the glucokinase (GLK1) protein, which also has the two domains. The interaction was verified in a two-hybrid assay .
The experimental results have demonstrated the great potential of linking up the prediction problems at the different levels. This initial success encourages deeper investigations of the idea along various directions. Algorithmically, other approaches to combining the different levels, including combined optimization and predictions as extra features, need to be studied. Currently the features at the domain and residue levels are weak, as reflected by their low accuracy when learned independently, and the small improvement they could cause to the protein level. It is interesting to study ways to improve the predictions at these two levels, and more directly extract the complementary information hidden in these levels that are useful for the protein level.
The current study is limited by a highly disproportionate dataset, with much more training examples at the protein level than the domain level. Together with a much weaker feature set, the raw accuracy at the domain level is much lower than the protein level, and the former could only slightly improve the predictions of the latter in the multi-level learning framework. It is hoped that as more structures of protein complexes are solved, the disproportionality would be alleviated. In the meantime, it is interesting to study ways to derive other features that could better predict the domain interactions, and the mechanism by which the domain-level information improved the protein-level predictions.
In this article we have pointed out some important issues of both multi-level learning and network prediction, including data sparseness and the existence of sub-clusters. While we have proposed methods to tackle them, a detailed analysis of how these issues affect prediction performance and what other algorithmic strategies for tackling them are yet to be studied.
To predict the whole interaction network, it is needed to reduce the time and space requirements. One possible way is to intelligently select what data to exclude, such as residues that are predicted to be buried deep inside the core of a protein. Another idea is to group objects into interaction groups so that each cluster can be handled independently.
More insights could be gained by studying some theoretical aspects of multi-level learning, such as the hierarchical structure of the prediction problems, and the issue of noisy and incomplete training sets. With multiple levels, performance evaluation is very tricky. As we discussed, careless definitions of training and testing sets could produce biases to the resulting performance. It is instrumental to study the optimal way of evaluation.
Biologically, there are many interesting follow-up questions to be studied. The intricate interactions between the different levels are not yet clear, and could form a larger study of how the predictions change after receiving information from the other levels. One could compare different kinds of data features at the three levels and identify the ones with the greatest complementary effects. Another direction is to choose different kinds of residue samples (e.g., only charged residues) and inspect the relative improvements they provide to the protein and domain levels, to determine the residues that are more significant in a protein interaction.
In this article we have introduced the approach of integrating protein interaction prediction at the protein, domain and residue levels. We have described the potential benefits of this multi-level learning framework due to the availability of distinct and complementary data features at each level. We have defined three information flow architectures for learning from the different levels, and proposed various ways to couple the levels in terms of what and how information is passed between them. We have focused on the training set expansion method, which is a meta-algorithm that passes predictions of a level as augmented training examples of other levels. To avoid the propagation of errors, we have discussed soft coupling, which associates confidence values to predictions and passes only highly confident predictions other levels. The confidence values are used as the inputs of support vector regression. For learning the interaction network at each level, we have compared global and local modeling, which has also highlighted the issue of data sparsity. We have performed computational experiments using yeast data, and shown that the bidirectional flow of supervised and semi-supervised information between the different levels improved the predictions over independent levels and mere downward flow of training information. The evaluation procedure involved special experimental procedures including training-set balancing and consistent cross validation. Finally, we have suggested a number of follow-up research topics.
We acknowledge support from the NIH, the AL Williams Professorship funds, and the Yale University Biomedical High Performance Computing Center.
All authors conceived the project and design. KY and PK prepared the data. KY implemented the algorithms, performed the computational experiments, and analyzed the results. KY and MG wrote the paper. All authors read and approved the document. | 2019-04-24T10:05:35Z | https://bmcbioinformatics.biomedcentral.com/articles/10.1186/1471-2105-10-241 |
IMPORTANCE Bacteria are ubiquitously found as surface-attached communities and cellular aggregates in nature. Here, we address how bacterial adhesion is coordinated in response to diverse environments using two complementary approaches. First, we examined how Rhodopseudomonas palustris, one of the most metabolically versatile organisms ever described, varies its adhesion to surfaces in response to different environmental conditions. We identified critical genes for the production of a unipolar polysaccharide (UPP) and showed that UPP is important for adhesion when light and organic substrates are used for growth. Looking beyond R. palustris, we performed the most comprehensive survey to date on the conservation of UPP biosynthesis genes among a group of closely related bacteria that occupy diverse niches. Our findings suggest that UPP is important for free-living and plant-associated lifestyles but dispensable for animal pathogens. Additionally, we propose guidelines for classifying the adhesins produced by various Alphaprotebacteria, facilitating future functional and comparative studies.
Diverse bacteria produce cell surface adhesins that facilitate attachment to biotic and abiotic surfaces (1, 2). Some of the earliest observations of bacterial adhesion reported bacterial “stars,” later termed rosettes, in which cells aggregate by attaching to each other at a single pole (3). Similarly, initial observations of bacterial adhesion to abiotic surfaces also noted polar attachment (4). It has since been recognized that the same polar adhesins responsible for rosette formation in many alphaproteobacterial species also mediate irreversible attachment to surfaces and thereby act to initiate the formation of surface-associated communities known as biofilms (1, 5, 6).
Polar surface attachment in Alphaprotebacteria has been most well studied in the freshwater bacterium Caulobacter crescentus (5, 7–10) and more recently in the plant pathogen Agrobacterium tumefaciens (11–13). The polar adhesin of C. crescentus and other members of the order Caulobacterales is called holdfast (1, 14). The polar adhesin of A. tumefaciens has been termed unipolar polysaccharide (UPP) (11). These two unipolar adhesins are distinct but share certain genetic, biochemical, and functional characteristics (1, 11). The synthesis of both adhesins involves a Wzy-dependent polysaccharide synthesis and export pathway. For holdfast, this pathway is encoded by the holdfast synthesis (hfs) gene cluster (8, 15). For UPP, the pathway is partially encoded by the core upp biosynthesis gene cluster, with other components encoded separately in the genome (11). The hfsEFGHCBAD and uppABCDEF gene clusters each have distinct organization and content (i.e., synteny) (Fig. S1). Only hfsD and hfsE have close sequence similarity to uppC and uppE, respectively (Table S1), although other genes likely encode functionally analogous proteins between these two gene clusters. A contrasting feature of these two adhesins is that holdfast-mediated adhesion requires proteins encoded by the holdfast anchor (hfa) operon, which keeps holdfast attached to the cell (16). No apparent homologs of hfa genes are encoded by A. tumefaciens (11) or most other Rhizobiales species (Data Set S1). Holdfast and UPP also exhibit some biochemical similarity, as both contain N-acetylglucosamine (7, 11), allowing the adhesins to be visualized by fluorescence microscopy after staining with the fluorophore-conjugated wheat germ agglutinin (5, 17).
Beyond C. crescentus and A. tumefaciens, polar polysaccharide adhesins are also a common morphological trait across ecologically diverse Alphaprotebacteria (1, 14, 18), especially among Rhizobiales species (19–25). However, the genetic and biochemical diversity of the adhesins across this clade is unclear. Furthermore, the potential environment-specific production and/or function of these adhesins remain largely unexplored. Here, we examine polar adhesin production by the Rhizobiales member Rhodopseudomonas palustris. This purple nonsulfur bacterium was first reported to produce a polar adhesin almost 50 years ago (26), but the genes involved in its biosynthesis were never characterized. Additionally, R. palustris is renowned for its metabolic versatility (27), a feature that allowed us to investigate if adhesin production is coordinated by different metabolic modules. We show that the putative R. palustris uppE (RPA2750) and uppC (RPA4833) orthologs are required for synthesis of a UPP adhesin. UPP is differentially required for R. palustris biofilm formation under various conditions but is particularly influential under photoheterotrophic conditions, in which light energy and organic substrates are used to support growth. Moving beyond R. palustris, we also explored whether UPP is associated with different bacterial lifestyles by performing a comparative genomic analysis across diverse Rhizobiales species. Our results indicate that UPP is a conserved ancestral trait of the Rhizobiales, and that upp genes have been independently lost multiple times during the evolution of the Rhizobiales clade. Based on our analysis, we propose that genetic synteny of adhesion biosynthesis genes is a valid criterion on which to designate the polar adhesins of various Rhizobiales members as UPP.
Genomic organization of the putative R. palustris CGA009 core upp gene cluster.R. palustris has long been known to form rosettes (26, 28); however, the genetic loci responsible for polar adhesin biosynthesis remain uncharacterized. Recently, bioinformatic analysis revealed that R. palustris contains a putative upp gene cluster (23). Such clusters have been shown to function in UPP production in other Rhizobiales species (12, 24). We confirmed that R. palustris CGA009 encodes a putative upp gene cluster using a TBLASTN reciprocal best-hit approach with the A. tumefaciens C58 UppABCDEF proteins as query sequences. We identified four adjacent genes in R. palustris with close identity to A. tumefaciens uppABDE (Fig. 1A and Table S2). The candidate orthologs for both uppC (RPA4833) and uppF (RPA4581) are outside the putative R. palustris uppABDE cluster (RPA2753 to RPA2750) (Fig. 1A). As expected based on species relatedness, the synteny of the putative R. palustris upp gene cluster is more similar to that of the A. tumefaciens upp gene cluster than to the C. crescentus hfs gene cluster (Fig. S1). We did not identify any candidate hfa homologs in R. palustris (Data Set S1), which are required for holdfast anchoring in C. crescentus and which are similarly absent in A. tumefaciens (11).
Synteny of A. tumefaciens C58 and R. palustris CGA009 core upp gene clusters and proposed protein functions. (A) Genes (arrows) are colored based on functional prediction and sequence similarity (>50% query cover, >25% identity, >40% positives, and an E value <1 × 10−20). Double slashes represent large (>100 kb) genomic regions not shown in the figure. (B) Model of the proposed Wzy-dependent synthesis and export pathway for UPP based on references 15, 29, and 30). Rhizobiales core upp gene clusters lack an important Wzx-like flippase (white), which is contained elsewhere in the genome. Gray hexagons represent repeat saccharide units of the UPP. IM, inner membrane; PG, peptidoglycan; OM, outer membrane; PCP, polysaccharide copolymerase; OPX, outer membrane polysaccharide export; PHPT, polyisoprenyl-phosphate hexose-1-phosphate transferase.
The putative R. palustris uppABDE, uppC, and uppF genes are predicted to encode a partial Wzy-dependent polysaccharide export pathway (Fig. 1B). Wzy-dependent pathways are broadly distributed across Gram-negative bacteria (29) and have been most well characterized in lipopolysaccharide and capsular polysaccharide biosynthesis and export in E. coli (30). We propose a Wzy-dependent model for UPP synthesis and export based on the current understanding of Wzy-dependent pathways (Fig. 1B), similar to what has been proposed for Wzy-dependent holdfast production (15). Briefly, an iterative multienzyme process assembles repeat saccharide units on the inner membrane (IM)-associated lipid carrier undecaprenyl phosphate (und-PP). The assembly is then translocated across the IM and into the periplasm, where the repeat saccharide units are transferred from und-PP to add to the growing polysaccharide chain on another und-PP carrier. Ultimately, the polysaccharide chain is exported onto the cell surface (Fig. 1B). It should be noted that for UPP, certain enzymes thought to be required for synthesis are encoded outside the core upp cluster, such as a flippase (Fig. 1B, white), which is responsible for translocation across the IM. This genetic arrangement is distinct from that of C. crescentus and most other Caulobacterales species, which encode putative Wzx-like flippases (HfsF) in their hfs gene clusters (Fig. S1) (15, 17, 31).
Visualization of R. palustris unipolar adhesin.To facilitate genetic and phenotypic characterization of the R. palustris adhesin, we first tested if we could visualize adhesin on wild-type (WT) R. palustris cells using the fluorophore-conjugated lectin WGA-488. Adhesins produced by diverse Alphaprotebacteria have been shown to bind WGA (5, 7, 32), which itself binds N-acetylglucosamine residues. When we stained R. palustris with WGA-488, we observed fluorescence at single poles of some individual cells and at the center of every rosette (Fig. 2A). WGA-488 can potentially stain N-acetylglucosamine present in peptidoglycan if the outer membrane is compromised, but we seldom observed nonpolar cell body staining under standard photoheterotrophic conditions. From this, we conclude that we are indeed staining the unipolar adhesin produced by R. palustris, which contains N-acetylglucosamine, similar to the UPP of other Rhizobiales species (11, 23, 24), as well as Caulobacterales holdfast (7, 17).
uppE and uppC are required for UPP biosynthesis, cell-cell adhesion, and biofilm formation. (A) Epifluorescence microscopy of cells stained with WGA-488 after 2 days of growth under standard photoheterotrophic conditions. Scale bars, 5 μm. (B) Normalized total WGA-488 fluorescence from batch UPP quantification following 3 days of growth under standard photoheterotrophic conditions. Different letters indicate significant differences between strains (P < 0.05; one-way analysis of variance [ANOVA] followed by Tukey's multiple-comparison test; n = 4 to 5). (C) Biofilm formation levels (A570) were quantified by CV staining of adherent biomass following 4 days of growth in microtiter wells under standard photoheterotrophic conditions. All strains grew equivalently, so A570 values were not normalized. Different letters indicate significant differences between strains (P < 0.0001; one-way ANOVA followed by Tukey's multiple-comparison test; n = 10 or 15, pooled from three independent experiments). (B and C) Symbols indicate biological replicates and lines indicate the means. Time (t) of sampling following inoculation is indicated in lower left corner.
UppE and UppC are required for R. palustris UPP biosynthesis, cell-cell adhesion, and biofilm formation.We next addressed the genetic requirements underlying polar adhesin production in R. palustris. In A. tumefaciens, uppE (12, 13) and uppC (C. Fuqua, personal communication) are essential for UPP biosynthesis. Similarly, the uppE ortholog (gmsA) of the root-nodulating symbiont Rhizobium leguminosarum is necessary for root hair attachment (20). In C. crescentus, the putative uppC homolog hfsD is required for holdfast-mediated attachment (8). Thus, we chose the putative uppE and uppC orthologs of R. palustris as targets for in-frame deletions to determine whether they are required for adhesin synthesis.
Deletion of either the putative uppE or uppC ortholog eliminated both rosette formation and WGA-488 binding (Fig. 2A). Complementation of each mutant from a plasmid restored rosette formation as well as unipolar WGA-488 binding to single cells and at the center of rosettes (Fig. 2A). In addition to microscopic visualization of the adhesin on cells, we also developed an assay to quantify adhesin production at the population level by measuring total WGA-488 fluorescence in batch culture samples. Similar to trends observed by microscopy, total WGA-488 fluorescence was significantly lower in the putative ΔuppE or ΔuppC mutant cultures than in the WT and complemented cultures (Fig. 2B). Overall, these results demonstrate an essential role for both of these orthologs in adhesin production in R. palustris. Based on these results, we henceforth refer to these genes as uppE and uppC and to the R. palustris unipolar adhesin as UPP.
Having established that uppE and uppC are critical for R. palustris UPP synthesis and rosette formation, we next assessed if R. palustris UPP contributes to biofilm formation. After 4 days of standard photoheterotrophic growth, the ΔuppE and ΔuppC mutants showed significantly less biofilm formation than the WT and complemented strains (Fig. 2C). Thus, we conclude that UPP is the primary adhesin facilitating biofilm formation under standard photoheterotrophic conditions.
Survey of UPP-mediated biofilm formation across environmental conditions.R. palustris is metabolically versatile, allowing it to adopt distinct lifestyles to thrive under diverse conditions. When growing anaerobically in light, R. palustris performs anoxygenic photosynthesis to transform energy (27). During phototrophic growth, R. palustris can obtain carbon by consuming organic substrates (photoheterotrophy) or by fixing CO2 (photoautotrophy) (27). It can also grow by aerobic respiration in the dark (chemoheterotrophy). Additionally, R. palustris is a diazotroph, meaning it can grow with N2 gas as the sole nitrogen source by the process of N2 fixation (33). While R. palustris has almost exclusively been studied under freshwater conditions, it was recently noted that an environmental isolate could grow in salt concentrations of up to 4.5% (34).
The metabolic versatility of R. palustris provided an opportunity to assess whether UPP-mediated surface attachment and biofilm formation are favored by some growth conditions over others. To address this, we examined UPP production and biofilm formation under various growth conditions for both WT R. palustris and the ΔuppE mutant. We proceeded with only the ΔuppE mutant because we did not observe any phenotypic differences between the ΔuppE and ΔuppC mutants (Fig. 2). We chose growth conditions that encompass both the metabolic capabilities of R. palustris (e.g., N2 fixation and photoautotrophy) and abiotic conditions it might normally encounter (e.g., low inorganic phosphate [Pi] and high salinity). Total WGA-488 fluorescence values were not compared across conditions, as they were not always reflective of UPP synthesis. For example, some growth conditions, such as low Pi, resulted in occasional staining at both poles and at what appeared to be cell division septa, suggesting that WGA-488 was staining N-acetylglucosamine moieties in peptidoglycan (Fig. S2).
UPP-assisted biofilm formation is favored by R. palustris in adverse photoheterotrophic environments.We first examined if biofilm formation was stimulated or inhibited in response to three adverse photoheterotrophic conditions. These conditions are considered to be less favorable for R. palustris growth due to nutrient limitation (low Pi), less-preferred nutrients (N2 fixation), or osmotic stress (high salinity). Thus, we used these conditions to assess whether biofilm formation might function to increase R. palustris survival under suboptimal conditions or to foster persistence in favorable environments (2, 35). We also examined if UPP is utilized by R. palustris across these growth conditions. Two main trends were observed under all three adverse conditions. First, WT R. palustris formed more biofilm under all adverse conditions than standard photoheterotrophic conditions (Fig. 3A), even though standard conditions supported the highest growth rates and highest cell densities (data not shown). Second, UPP contributed to biofilm formation under all photoheterotrophic conditions, as the WT formed more biofilm than the ΔuppE mutant in each case (Fig. 3A). These biofilm trends were consistent with microscopy results, which showed that WT R. palustris exhibited comparable WGA staining patterns under standard and adverse photoheterotrophic conditions (Fig. 3B). Beyond this, there were also condition-specific phenotypes observed.
UPP is important for biofilm formation across photoheterotrophic conditions. (A) Biofilm formation levels were normalized to final planktonic cell density (A570/OD660) and then made relative to normalized WT standard photoheterotrophic values, which was set to 1. **, P < 0.01; ****, P < 0.0001; ns, not significant; based on multiple unpaired, two-tailed t tests without assuming equal variance and followed by Holm-Šídák correction for multiple comparisons; n = 10, pooled from two independent experiments. Significance is only indicated for pairwise comparisons between WT and the ΔuppE mutant under each condition because the assumption of homogeneity of variances was violated in comparisons across conditions. Results from other statistical analyses comparing across conditions are listed in Table S3. (B) Epifluorescence microscopy of cells stained with WGA-488 after 3 days of photoheterotrophic or chemoheterotrophic growth and after 8 days of photoautotrophic growth. Scale bars, 5 μm. (C) Biofilm formation normalized to final planktonic cell density (A570/OD660) following 4 days of photoheterotrophic growth with 1.5% sea salts or 1.5% NaCl. Different letters indicate significant differences between groups (P < 0.05; two-way ANOVA followed by Tukey's multiple-comparison test; n = 5). (D) Relative biofilm formation (A570/OD660) after 10 days of photoheterotrophic or photoautotrophic growth, with WT values under standard photoheterotrophic conditions set to 1. Different letters indicate statistically significant differences between groups (P < 0.05; two-way ANOVA followed by Tukey's multiple-comparison test; n = 4 to 5). (A, C, and D) Symbols indicate biological replicates, and lines indicate the means. Time (t) of sampling following inoculation is indicated in lower left corner.
Under low-Pi conditions, the ΔuppE mutant formed loosely attached lawns at the bottom of microtiter wells. These lawns were easily disrupted and washed away. Such lawns were not formed by the ΔuppE mutant under standard conditions and were unlike all WT photoheterotrophic biofilms, which were firmly attached to the sides and bottom of the wells. The genetic and biochemical basis for these loose biofilms remains to be determined. Stimulation of biofilm formation in response to Pi limitation has also been observed in A. tumefaciens (12, 36). This common observation raises the possibility that increased biofilm formation is a conserved response to Pi limitation across some Rhizobiales species. It has been speculated that low Pi serves as a signal to A. tumefaciens that plant surfaces are nearby, as plants sequester Pi, locally depleting it from the rhizosphere (36). Given that no symbiotic association between R. palustris and plants has been identified, it is possible that biofilm formation serves a different function in this species, such as increasing survival when essential nutrients, such as Pi, are limiting.
We also observed 2-fold higher biofilm levels by WT under N2-fixing conditions than under standard conditions (Fig. 3A). N2 fixation is energetically expensive compared to using other nitrogen sources, such as NH4+, and is therefore tightly regulated (33, 37). We hypothesize that increased aggregation under N2-fixing conditions might function to help retain costly NH4+, which can passively diffuse out of cells as NH3 (38).
In contrast to all other photoheterotrophic conditions, ΔuppE mutant biofilm levels were 13-fold higher under 1.5% sea salt conditions than WT cells under standard conditions, despite lacking UPP (Fig. 3A). Similar trends were seen with 1.5% NaCl, confirming that the enhanced biofilm formation of both the WT and the ΔuppE mutant was due to high salinity and not another component of the sea salt supplement (Fig. 3C). The high ΔuppE mutant biofilm levels under high-salinity conditions suggest that additional factors besides UPP contribute to this response. Thus, while UPP-mediated surface attachment contributes to robust biofilm formation by R. palustris during photoheterotrophic growth, UPP is less crucial under high-salinity conditions.
UPP-independent biofilm formation is stimulated by nonphotoheterotrophic conditions.We also examined UPP production and biofilm formation under chemoheterotrophic and photoautotrophic conditions. Under chemoheterotrophic conditions, UPP was not necessary for biofilm formation, as WT and the ΔuppE mutant formed similar levels of biofilm. We were surprised by this result, as it suggested that biofilm formation was entirely UPP independent. Aerobically grown bacteria typically adhere near the air-liquid interface (39). However, the adherent biomass of both the WT and the ΔuppE aerobic biofilms was at the bottom of the microtiter well, suggesting that R. palustris might preferentially form biofilms at microaerobic or anaerobic zones. In support of this, the adherent biomass was pigmented, indicating the production of bacteriochlorophyll and carotenoids, which is stimulated in response to low O2 (40). Additionally, chemoheterotrophic conditions seem to favor biofilm formation, as WT and ΔuppE biofilm levels were approximately 12-fold higher than those of the WT under standard photoheterotrophic conditions. (Fig. 3A). Separately, although WGA-488 staining was observed on some single cells, we did not observe any rosettes under chemoheterotrophic conditions (Fig. 3B). It is therefore possible that UPP is produced but is dispensable for chemoheterotrophic biofilm formation.
During photoautotrophy with sodium bicarbonate as the carbon source and thiosulfate as an electron donor, R. palustris has a specific growth rate approximately one-fourth that of during photoheterotrophic growth (41, 42). Because of the slower growth, we extended photoautotrophic incubations from 3 days for epifluorescence microscopy and 4 days for biofilm assay to 8 days and 10 days, respectively, in order to allow cultures to reach final densities similar to those observed after 3 to 4 days of photoheterotrophic growth. After 8 days of photoautotrophic growth, we observed WT rosettes that stained very little or not at all with WGA-488, suggesting that less UPP is produced or that UPP composition is different under these conditions (Fig. 3B). Under photoautotrophic conditions, the WT and the ΔuppE mutant showed similar levels of biofilm formation (Fig. 3D), suggesting that biofilm formation was UPP independent. Similar trends were seen in parallel control cultures for which we allowed for 10 days of photoheterotrophic growth (Fig. 3D), unlike results from the 4-day photoheterotrophic experiments, where the ΔuppE mutant formed less biofilm than WT (Fig. 3A). There are multiple nonmutually exclusive explanations for why the difference in biofilm formation between the WT and the ΔuppE mutant after 4 days was not also observed after 10 days. Because UPP is thought to mediate the initial irreversible surface attachment of cells (5), prolonging the incubation period may have led to some degradation of UPP and/or might have allowed sufficient time for as-of-yet unknown adhesins or other factors, such as DNA release following cell lysis, to facilitate attachment. Such factors could also contribute to the increased biofilm formation observed across the different conditions tested herein.
Overall, our survey of R. palustris biofilm formation across growth conditions can be summarized as follows. UPP mediates biofilm formation under photoheterotrophic conditions, especially those photoheterotrophic conditions that are less favorable to growth. Under certain photoheterotrophic conditions, such as high salinity, biofilm formation involves additional factors that are independent of UPP. Finally, chemoheterotrophic and photoautotrophic conditions also stimulate biofilm formation but in a manner that appears to be independent of UPP.
Conservation of core upp biosynthesis genes across Rhizobiales species.Beyond C. crescentus, R. leguminosarum, A. tumefaciens, and now R. palustris, the characterization of polar adhesins in other Alphaprotebacteria has been cursory. Historically, all polar adhesins were referred to as holdfast. However, designation of alphaproteobacterial adhesins has been complicated by functional differences. For example, the polar glucomannan adhesin of R. leguminosarum plays a unique role in root hair attachment but is not required for attachment to abiotic surfaces (19, 20). The R. leguminosarum glucomannan biosynthesis gene cluster is orthologous to the A. tumefaciens uppABCDEF cluster, which A. tumefaciens uses to attach to both biotic and abiotic surfaces (5, 11, 12). Thus, R. leguminosarum polar glucomannan and A. tumefaciens UPP are homologous adhesins with functional differences. Also contributing to the ambiguity in classifying previously identified Rhizobiales polar adhesins is the compositional diversity (1, 12, 20–22). For example, A. tumefaciens UPP contains N-acetylgalactosamine in addition to N-acetylglucosamine (12), the R. leguminosarum glucomannan adhesin contains primarily glucose and mannose (19), the Bradyrhizobium japonicum polar adhesin contains galactose and lactose (22), and the Hyphomicrobium polar adhesin likely contains galactose and mannose (21). We therefore propose that alphaproteobacterial adhesins be classified according to genetic synteny. Based on the synteny (Fig. 1) and functional requirement of upp orthologs for adhesin production (Fig. 2), we conclude that R. palustris produces UPP.
With the criterion of genetic synteny in mind, we explored the phylogenetic distribution and genomic organization of the core uppABCDEF orthologs across 22 Rhizobiales species, representing the lifestyle diversity of this clade (Fig. 4). The topology of this tree is largely consistent with the alphaproteobacterial phylogeny inferred from a concatenation of 104 protein alignments (43). Our analysis revealed broad conservation of putative upp gene clusters, indicating that UPP is an ancestral trait of the Rhizobiales clade. Almost all of the Rhizobiales plant symbionts, including the plant pathogen A. tumefaciens, the root-nodulating diazotrophs R. leguminosarum, S. meliloti, Mesorhizobium loti, and B. japonicum, the stem-nodulating photosynthetic diazotroph Bradyrhizobium sp. strain BTAi, and the leaf epiphyte Methylobacterium extorquens, contain complete or near-complete upp gene clusters (Fig. 4). The exception to this trend is the root-nodulating diazotroph Azorhizobium caulinodans (44), which does not contain a upp cluster (Fig. 4 and Data Set S2). We were also unable to identify a upp cluster in Xanthobacter autotrophicus, a free-living diazotroph closely related to A. caulinodans (Fig. 4). This absence suggests that the upp cluster was lost before these lineages split. Despite the absence of a upp cluster in A. caulinodans, it still appears to produce a polar adhesin and form rosettes (25). Upon closer examination of the A. caulinodans ORS571 genome, we identified a putative Wzy-like polysaccharide biosynthesis gene cluster with high similarity to the Vibrio fischeri symbiosis polysaccharide (syp) locus (Data Set S3) (45). These putative syp homologs seem to have been acquired horizontally and might have been coopted for polar polysaccharide synthesis in A. caulinodans.
Conservation of core UPP biosynthesis genes among Rhizobiales species. A maximum likelihood phylogeny was inferred based on a concatenated alignment of 6 conserved housekeeping proteins using an LG+G+I substitution model (58) with four discrete gamma categories and invariable sites in MEGA6 (56). The tree with the highest log likelihood is shown. Node values indicate branch support from 100 bootstrap replicates. Scale bar represents the number of substitutions per site along branches. Leaf and mouse symbols indicate known plant and animal symbiotic relationships, respectively.
While UPP is well conserved in plant-associating Rhizobiales species, the opposite is true for animal pathogens. This trend was first noted upon the initial discovery of the upp gene cluster in R. leguminosarum, which noted that this cluster is absent in the Rhizobiales intracellular mammalian pathogen Brucella melitensis (20). Rather than being entirely absent (20), our data corroborate more recent bioinformatic evidence (23) that Brucella spp. contain a cluster of 3 putative upp orthologs (uppBCE) (Fig. 4 and S1, and Data Set S2). It is not known whether this partial upp cluster is involved in the synthesis of a functional UPP. In the closely related intracellular animal pathogens of the genera Bartonella, upp orthologs are completely absent (Fig. 4 and Data Set S2). In contrast, the soil-dwelling opportunistic human pathogen Ochrobactrum anthropi (46), which is more closely related to Brucella than Bartonella, contains a complete uppABCDEF gene cluster (Fig. 4). Ochrobactrum spp. are thought to be rhizosphere community members but are capable of infecting animal hosts (46, 47). We hypothesize that the entire upp cluster was first lost in the Bartonella lineage during adaptation to an intracellular lifestyle after diverging from Brucella/Ochrobactrum. More recently, the Brucella lineage has similarly lost multiple upp orthologs during its transition to becoming intracellular pathogens. The independent loss of upp orthologs in both Bartonella and Brucella would suggest convergent evolution upon adaptation to intracellular niches within animal hosts, supporting the hypothesis that UPP is not important for such lifestyles. Conversely, the conservation of upp orthologs in plant symbionts and free-living species suggests that UPP is beneficial in other diverse environments. Considering this, we hypothesize that Ochrobactrum anthropi has retained the complete upp cluster because it is typically free-living in the soil and thus benefits from producing UPP.
Unipolar adhesins are also used by Alphaprotebacteria outside the Rhizobiales. In the order Caulobacterales, hfs and hfa gene clusters for holdfast synthesis are well conserved (17, 31). Despite the differences in synteny between the upp and hfs gene clusters (Fig. S1), both encode Wzy-dependent pathways for polar polysaccharide synthesis and export, and uppC and uppE show sequence similarity to hfsD and hfsE, respectively (Table S1). Because of these similarities, we hypothesize that holdfast and UPP share an evolutionary origin and that the upp and hfs loci diversified in genomic organization following divergence of the Rhizobiales and Caulobacterales clades.
Other alphaproteobacterial species of the marine Roseobacter clade within the order Rhodobacterales also produce polar adhesins and form rosettes but do not contain either upp or hfs or hfa homologs (18) (Data Sets S1 and S2). The polar polysaccharide adhesin of the Roseobacter species Phaeobacter inhibens contains N-acetylglucosamine based on WGA binding, indicating that the biochemical composition is at least somewhat similar to that of UPP and holdfast (32). In this case, polar adhesion synthesis is encoded on a plasmid, since plasmid curing prevented P. inhibens rosette formation and diminished attachment to abiotic surfaces and algal cells (6). Furthermore, genetic disruption of the plasmid-encoded putative rhamnose operon lowered biofilm formation (48). Plasmids encoding putative rhamnose operons are widely distributed among other Roseobacter species (48), suggesting that polar polysaccharide synthesis and export in this clade are genetically distinct from those of UPP and holdfast. It is not clear whether acquisition of these plasmids led to the loss of gene clusters similar to either upp or hfs loci.
While polar polysaccharide adhesins are a common morphological trait across ecologically diverse Alphaprotebacteria, there is considerable genetic, compositional, and functional variation, which likely reflects adaptation to different niches. We propose here that genetic synteny of biosynthetic loci is a suitable criterion on which to base classification of polar adhesins. This criterion bypasses uncertainty arising from compositional differences while highlighting the shared underlying biosynthetic pathway. As such, holdfast and UPP are distinct adhesins despite facile similarities. Likewise, the A. caulinodans adhesin and the Roseobacter rhamnose adhesins should each receive their own designation, as they are genetically distinct from both holdfast and UPP, as well as from each other. Adoption of a unified classification scheme will facilitate both the comparison of adhesins and the exploration of functional differences within and between adhesin types.
Bacterial strains and growth conditions.All R. palustris strains were derived from CGA009 (27) and are listed in Table 1. Unless otherwise indicated, R. palustris was grown statically in 10 ml of defined photosynthetic medium (PM) (49) in sealed 16-ml anaerobic tubes with argon gas in the headspace. All R. palustris cultures were incubated at 30°C. All phototrophic cultures were illuminated with a 60-W light bulb. For all heterotrophic conditions, PM was supplemented with succinate as the sole carbon source (15 mM in liquid cultures or 10 mM in agar). Incubation in PM with 15 mM succinate and light are here referred to as standard photoheterotrophic conditions. For low-inorganic phosphate (Pi) conditions, PM was modified by replacing Na2HPO4 and KH2PO4 (12.5 mM each) with equimolar concentrations of Na2SO4 and K2SO4. A 1:1 molar mixture of Na2HPO4 and KH2PO4 was added for a final Pi concentration of 30 μM. For N2-fixing conditions, (NH4)2SO4 was omitted from PM, and argon was replaced with N2. For high-salinity conditions, PM was supplemented with 1.5% (wt/vol) sea salts (Sigma) or NaCl. For chemoheterotrophic conditions, cultures were grown in 10 ml of aerobic PM supplemented with 0.05% yeast extract in addition to 15 mM succinate in 50-ml Erlenmeyer flasks shaken at 225 rpm in darkness. For photoautotrophic conditions, anaerobic PM was supplemented with 60 mM NaHCO3 as the inorganic carbon source and 30 mM Na2S2O3 as an inorganic electron donor. Plasmid-harboring R. palustris strains were grown with 50 μg/ml gentamicin in liquid culture and 100 μg/ml gentamicin on agar plates. The Escherichia coli strains used for cloning (DH5-α and S17-1) were grown aerobically in Luria-Bertani medium (BD) supplemented with 15 μg/ml gentamicin when necessary.
R. palustris strain construction.All plasmids and primers are listed in Tables 1 and 2, respectively. Deletion vectors for uppC (RPA4833) and uppE (RPA2750) were generated by PCR amplification of the genomic regions flanking the gene to be deleted, as described previously (41). PCR product pairs were fused by overlap extension PCR and cloned into pJQ200SK (50). Vectors were introduced into R. palustris by conjugation with E. coli S17-1 (51) or by electroporation (52). Complementation vectors for uppC and uppE were generated by PCR amplification of each gene along with the putative ribosomal binding site. PCR products were cloned into pBBPgdh (53), and complementation and empty pBBPgdh vectors were introduced into R. palustris by conjugation with E. coli S17-1.
Epifluorescence microscopy and image analysis.Unless stated otherwise, R. palustris cultures used for microscopy were grown in liquid without agitation for 2 to 3 days, except for photoautotrophic cultures, which were grown for 8 days. Culture samples were centrifuged, and the cell pellet was resuspended in 0.1 mM phosphate-buffered saline (PBS) (Fisher Scientific) to an optical density at 660 nm (OD660) between 0.6 and 0.9. Wheat germ agglutinin Alexa Fluor 488 conjugate (WGA-488) (Molecular Probes) was added to cells suspended in PBS at a final concentration of 2 μg/ml and incubated in darkness at room temperature for 15 min. Cells were washed with PBS three times to remove unbound dye and then resuspended in PBS. Cells were imaged on agarose pads using a Nikon Eclipse 90i light microscope equipped with a 100× oil immersion objective and a Photometrics Cascade 1K electron-multiplying charge-coupled-device (EMCCD) camera and processed using the Nikon NIS-Elements software. Images were subsequently analyzed using the ImageJ distribution Fiji (54).
Batch UPP quantification via total WGA fluorescence.R. palustris cultures were grown under standard photoheterotrophic conditions for 3 days to early stationary phase. A 400-μl sample of each culture was centrifuged, and the cell pellet was resuspended in 400 μl of PBS. A 100-μl aliquot of each cell suspension was set aside for use as the unstained control. WGA-488 was added to the remaining 300 μl of resuspended cells to a final concentration of 1.5 μg/ml and incubated in darkness at room temperature for 15 min. WGA-488-stained cells were washed three times with PBS and then resuspended in 120 μl of PBS to account for cells lost during washes. A 100-μl aliquot of the stained cells and the reserved unstained samples were each transferred to empty wells of a black polystyrene 96-well μClear flat-bottom microtiter plate (Greiner Bio-One). Fluorescence (top-120, excitation 485/20; emission 528/20) and the OD660 were measured using a Synergy H1 microplate reader (BioTek). Fluorescence readings were normalized to cell densities (relative fluorescent units [RFU]/OD660), and background fluorescence was removed by subtracting RFU/OD660 values of unstained samples from the WGA-488-stained samples.
Crystal violet microtiter plate biofilm assay.Biofilm formation was quantified using a modified version a crystal violet microtiter plate assay (39). Briefly, starter cultures were grown under standard photoheterotrophic conditions supplemented with 0.1% yeast extract. A 1.5-μl volume of stationary-phase culture was used to inoculate the wells of a lidded untreated polystyrene 24-well plate (Corning) containing 1.5 ml of the specified sterile medium. All plates were incubated statically at 30°C. For anaerobic phototrophic growth conditions, plates were incubated in a BD GasPak EZ container with two EZ anaerobe container system sachets (BD) and illuminated by two 60-W light bulbs, one on either side of the container. For chemoheterotrophic growth, plates were incubated aerobically in darkness. For all heterotrophic growth conditions, plates were incubated for 4 days. For photoautotrophic growth conditions (and paired heterotrophic controls), plates were incubated for 10 days. After incubation, plates were shaken at 150 rpm for 3 min on a flat-bed rotary shaker to disrupt loosely attached cells. A 400-μl aliquot of culture was removed for quantifying cell density (OD660) for normalization. Then, 400 μl of 0.1% (wt/vol) crystal violet (CV) was added to each well, and plates were incubated statically at room temperature for 15 min. Wells were then washed 3 times with 2 ml of deionized water to remove unbound CV. Next, 750 μl of 10% (vol/vol) acetic acid was added to each well, followed by shaking at 150 rpm for 3 min to solubilize bound CV. A 150-μl sample of solubilized CV was transferred to a 96-well plate, and absorbance at 570 nm (A570) was measured. Uninoculated wells containing sterile medium were treated the same way as described above to determine background A570, which was subsequently subtracted from all A570 measurements.
Identification of orthologous core upp gene clusters and phylogenetic analysis.The putative orthologs of the core UPP biosynthesis genes in R. palustris CGA009 (GenBank accession no. BX571963.1) were initially identified by reciprocal best-hit analysis using the UppABCDEF proteins of A. tumefaciens C58 (GenBank accession no. AE007869.2) as the query sequences for a TBLASTN search against the translated nucleotide database of R. palustris CGA009. The best hits in R. palustris CGA009 were subsequently used as query sequences for a BLASTX search against the proteome of A. tumefaciens C58. All putative R. palustris orthologs showed >50% query cover and an E value of <1 × 10−20 (Table S2). Previous studies noted that the core uppABCDEF biosynthesis gene cluster is conserved among several Rhizobiales species (20, 23), which was confirmed by using BLASTP with A. tumefaciens C58 UppABCDEF proteins as query sequences (Data Set S2). Several additional species that contain complete or near-complete upp gene clusters were also identified using BLASTP (minimum threshold for homology of query cover, >50%; E value, <1 × 10−10) (Data Set S2).
For phylogenetic analysis, amino acid sequences for 6 conserved housekeeping proteins, GyrA, GyrB, RpoA, RpoB, FusA, and RecA, from 26 alphaproteobacterial species were individually aligned using MUSCLE (55) with default settings in MEGA6 (56). Gaps and ambiguous sites were removed from alignments using Gblocks (57), with a minimum block length of 10 positions, and gaps were allowed at a position for no more than half of the sequences. The sequences were subsequently concatenated in the order shown above. The final concatenated alignment contained 4,379 amino acid positions (92% of the original positions). Phylogeny was inferred for the concatenated amino acid sequence using the maximum likelihood method based on the Le and Gascuel (LG) model (58), with 4 discrete gamma categories, which allowed for some sites to be evolutionarily invariable, implemented in MEGA6 (56). The LG+G+I model was selected because it was the best-fitting substitution model based on having the lowest Bayesian information criterion score. Initial tree(s) for the heuristic search were obtained by applying the neighbor-joining method to a matrix of pairwise distances estimated using a Jones-Taylor-Thornton model.
Statistical analysis.All statistical analyses were performed using GraphPad Prism version 6.07. Additional information about statistical analyses is in the figure legends. For Fig. 3A, multiple statistical analyses were performed to reach a consensus for comparisons across growth conditions, which are summarized in Table S3.
We thank Yves Brun for use of microscopy facilities and reagents, Clay Fuqua for sharing unpublished data, and members of the Brun and Fuqua labs for thoughtful discussions.
This work was supported in part by the U.S. Department of Energy, Office of Science, Office of Biological and Environmental Research, under award DE-SC0008131, and the Indiana University College of Arts & Sciences.
Supplemental material for this article may be found at https://doi.org/10.1128/AEM.03035-16.
. 2015. Adhesins involved in attachment to abiotic surfaces by Gram-negative bacteria. Microbiol Spectr 3:MB-0018-2015. doi:10.1128/microbiolspec.MB-0018-2015.
. 2012. Sticky situations: key components that control bacterial surface attachment. J Bacteriol 194:2413–2425. doi:10.1128/JB.00003-12.
. 1946. Stages in the life history of Phytomonas tumefaciens. J Bacteriol 52:695–702.
. 2015. Plasmid curing and the loss of grip–the 65-kb replicon of Phaeobacter inhibens DSM 17395 is required for biofilm formation, motility and the colonization of marine algae. Syst Appl Microbiol 38:120–127. doi:10.1016/j.syapm.2014.12.001.
. 2009. Surface colonization by marine roseobacters: integrating genotype and phenotype. Appl Environ Microbiol 75:6027–6037. doi:10.1128/AEM.01508-09.
. 2006. A novel polar surface polysaccharide from Rhizobium leguminosarum binds host plant lectin. Mol Microbiol 59:1704–1713. doi:10.1111/j.1365-2958.2006.05057.x.
. 2008. Glucomannan-mediated attachment of Rhizobium leguminosarum to pea root hairs is required for competitive nodule infection. J Bacteriol 190:4706–4715. doi:10.1128/JB.01694-07.
. 1981. Attachment and rosette formation by hyphomicrobia. Appl Environ Microbiol 42:751–757.
. 1993. Carbohydrate binding activities of Bradyrhizobium japonicum: unipolar localization of the lectin BJ38 on the bacterial cell surface. Proc Natl Acad Sci U S A 90:3033–3037. doi:10.1073/pnas.90.7.3033.
. 2016. Short-stalked Prosthecomicrobium hirschii cells have a Caulobacter-like cell cycle. J Bacteriol 198:1149–1159. doi:10.1128/JB.00896-15.
. 2016. Cyclic di-GMP regulates multiple cellular functions in the symbiotic alphaproteobacterium Sinorhizobium meliloti. J Bacteriol 198:521–535. doi:10.1128/JB.00795-15.
. 2011. Involvement of the azorhizobial chromosome partition gene (parA) in the onset of bacteroid differentiation during Sesbania rostrata stem nodule development. Appl Environ Microbiol 77:4371–4382. doi:10.1128/AEM.02327-10.
. 1967. Rhodopseudomonas palustris and Rh. viridis–photosynthetic budding bacteria. Arch Mikrobiol 334:324–334.
. 1976. Synchronous growth of Rhodopseudomonas palustris from the swarmer phase. J Gen Microbiol 94:117–125. doi:10.1099/00221287-94-1-117.
. 2009. Pivotal roles of the outer membrane polysaccharide export and polysaccharide copolymerase protein families in export of extracellular polysaccharides in Gram-negative bacteria. Microbiol Mol Biol Rev 73:155–177. doi:10.1128/MMBR.00024-08.
. 2006. Biosynthesis and assembly of capsular polysaccharides. Annu Rev Biochem 75:39–68. doi:10.1146/annurev.biochem.75.103004.142545.
. 2008. Complex regulatory pathways coordinate cell-cycle progression and development in Caulobacter crescentus. Adv Microb Physiol 54:1–101. doi:10.1016/S0065-2911(08)00001-5.
. 2015. Morphological heterogeneity and attachment of Phaeobacter inhibens. PLoS One 10:e0141300. doi:10.1371/journal.pone.0141300.
. 2016. Hydrogen production under salt stress conditions by a freshwater Rhodopseudomonas palustris strain. Appl Microbiol Biotechnol 100:2917–2926. doi:10.1007/s00253-016-7291-4.
. 2004. What drives bacteria to produce a biofilm? FEMS Microbiol Lett 236:163–173. doi:10.1111/j.1574-6968.2004.tb09643.x.
. 2004. Phosphorus limitation enhances biofilm formation of the plant pathogen Agrobacterium tumefaciens through the PhoR-PhoB regulatory system. J Bacteriol 186:4492–4501. doi:10.1128/JB.186.14.4492-4501.2004.
. 2012. How posttranslational modification of nitrogenase is circumvented in Rhodopseudomonas palustris strains that produce hydrogen gas constitutively. Appl Environ Microbiol 78:1023–1032. doi:10.1128/AEM.07254-11.
. 1999. Genetic approaches to study biofilms. Methods Enzymol 310:91–109. doi:10.1016/S0076-6879(99)10008-9.
. 2010. FixK, a global regulator of microaerobic growth, controls photosynthesis in Rhodopseudomonas palustris. Mol Microbiol 75:1007–1020. doi:10.1111/j.1365-2958.2009.07037.x.
. 2007. A robust species tree for the Alphaproteobacteria. J Bacteriol 189:4578–4586. doi:10.1128/JB.00269-07.
. 2012. Roles of the structural symbiosis polysaccharide (syp) genes in host colonization, biofilm formation, and polysaccharide biosynthesis in Vibrio fischeri. J Bacteriol 194:6736–6747. doi:10.1128/JB.00707-12.
. 2011. Genome of Ochrobactrum anthropi ATCC 49188T, a versatile opportunistic pathogen and symbiont of several eukaryotic hosts. J Bacteriol 194:4274–4275.
. 2009. The differential interaction of Brucella and Ochrobactrum with innate immunity reveals traits related to the evolution of stealthy pathogens. PLoS One 4:e5893. doi:10.1371/journal.pone.0005893.
. 2016. Biofilm plasmids with a rhamnose operon are widely distributed determinants of the “swim-or-stick” lifestyle in roseobacters. ISME J 10:2498–2513. doi:10.1038/ismej.2016.30.
. 1983. A broad host range mobilization system for in vivo genetic engineering: transposon mutagenesis in Gram-negative bacteria. Nat Biotechnol 1:784–791. doi:10.1038/nbt1183-784.
. 2008. A general system for studying protein-protein interactions in Gram-negative bacteria research articles. J Proteome Res 7:3319–3328. doi:10.1021/pr8001832.
. 2000. Selection of conserved block from multiple alignments for their use in phylogenetic analysis. Mol Biol Evol 17:540–552. doi:10.1093/oxfordjournals.molbev.a026334.
. 2016. Microbial mutualism dynamics governed by dose-dependent toxicity of cross-fed nutrients. ISME J doi:10.1038/ismej.2016.141. | 2019-04-22T04:11:57Z | https://aem.asm.org/content/83/4/e03035-16?ijkey=787c75b9c6eab24e4a3c2569a3aa4e7e1e6d7378&keytype2=tf_ipsecsha |
It’s been more than a decade since I got involved in the design and development of digital payment systems. My focus has always been primarily that of a cryptoanarchist - privacy and functionality first, regulatory compliance second. Since I got involved in this field, a major innovation took place: Blockchain cryptocurrencies. This innovation injected hundreds of thousands of new people into the realm of cypherpunk ideas and online “less regulated” commerce. Thousands of new developers are now working on new tools and I applaud that. However, in engaging with many of these new faces I discovered that their understanding of what other technologies exist - or have existed - beyond the blockchain is wanting. In almost every conversation I find out that terms like “digital bearer certificate”, “verifiable book money”, “blind signatures” and a host of others are virtually unheard of. The generation change from pre-blockchain age to blockchain age has come with a lot of old knowledge being lost. But in my opinion it is knowledge that is still useful, and possibly even crucial. Hence I decided to write this text, touching upon some of these forgotten technologies, and specifically recording my own contributions in the field. May it help everybody to widen their box of thought and find inspiration for better solutions, and to gain a better understanding of the problems to be solved.
Let’s start with defining “digital money”. Digital money is the digital representation of money, which is in turn a medium of value transfer and storage. Digital money allows making payments and to keep value for a time. Digital money can represent currencies like the US Dollar or the EURO, or precious metals like gold or silver. A “digital currency” is something different: Instead of representing some other money, digital currencies themselves have a monetary function as in being able to create and regulate the supply of money. Digital currencies are digital money plus monetary control.
The most basic form of digital money is “digital book money”, commonly known under the term “e-money” or “electronic money”. This includes most of the payment systems we use today, from giro money on your bank account, to PayPal, credit cards and various internet payment systems. Digital book money works by the operator keeping a record of accounts and balances that are controlled by the users of the system. In the simplest form this is a simple table stating which users has how much money in their account.
Digital book money has a bad reputation in some circles because it does nothing to prevent operators from manipulating the money kept, invent it, steal it, or make transfers without user consent. This however is not a fair description of more advanced digital book money systems. More modern systems are verifiable and auditable. As an example, systems that derive from OpenTransactions implement mutually signed transactions and balances which allow both the operator as well as the user to present a cryptographically signed, fixed order, immutable history of transactions and the balances they result in. This works by each account keeping the hash of the last transaction, balance, and signatures by both user and operator of these values. Each new transaction includes the hash of the last transaction, the balance before the transaction is executed, the balance after the transaction is executed, additional transaction details (like the destination account of value transaction and its amount), and the signatures of both the operator and the user (account owner). This way both the operator as well as the user have a signed statement showing the state of an account which can be demonstrated to a third party in case of suspected abuse. Further developments in that sphere concern the auditability of the sum of all balances in a system by forming a merkle tree out of the accounts and their balances as the leaves, and then taking sums in the nodes of the tree. That merkle tree is then added into a hash chain and the head of that chain published. Now auditors that know the signed statements of some accounts can verify that the published accounting is probable true, and that the operator is not inventing or stealing money. Any account holder can verify that public accounting for himself, and publish a proof of any discrepancy if such exists. There have also been discussions about using bullet proofs to the same end. Taking these modern developments into account, digital book money systems present a very efficient, extremely cheap to operate, and publicly verifiable means to provide infrastructure for person-to-person transfers. They do however provide no privacy nor are they permission-less.
Instead of operating a single centralized record of accounts and balances that is modified by a single entity, blockchain cryptocurrencies replicate those records across many entities of unknown trustworthiness. Changes to the records are executed by those entities by applying new transactions to the current state of record, while adhering to a protocol that defines validity of transactions and access control to records (usually through the use of digital signatures). A complete history of valid transactions is distributed over all entities taking part in operating a blockchain cryptocurrency, allowing each to calculate the current state of records for the system.
The order in which transactions are processed is a crucial element of any system that changes global state. For systems operated by a single entity, that entity can define and assure order easily on a first come, first served basis. In a distributed system of untrusted parties, additional efforts must be taken to ensure that all parties execute transactions in exactly the same order. To this end, the system must select an authoritative party (the “leader”) that defines the order of transactions. In blockchain based systems, this party is only authoritative for a short amount of time and replaced with an unpredictable other party for the next time slot. Various methods for leader selection exist. Some systems use election protocols, others use proof-of-stake or proof-of-work protocols. Common to all of these methods is that they result in one leader being selected to define the order of transactions for a short amount of time, leading to the synchronization of transactions and state for the whole system. Additionally, blockchain cryptocurrencies have a money-creation function which usually works by rewarding the leader by allowing it to create some defined amount of new money in return for its work. It is important to note that the definition of which rules apply to verify transactions, select leaders, and create new money are purely defined in software and become valid only due to the consensus of participating parties.
The remainder of this text deals with “Digital Bearer Certificates” (DBC for short). I’ll try to describe both the technology itself as well as the history of DBCs as experienced by me.
A DBC is nothing else but a string of bits that are ascribed value. It directly represents the money, without reference to any account, instead it is the money itself. Consider a DBC to be a digital bank note that can be directly transmitted between parties, does not require any account to be linked to a user, nor a widely distributed global state of the system.
First, it needs to be verifiable as being a DBC issued by some party. This is usually done by the issuer signing the DBC with a key. Second, it needs to be unique. A string of bits can be copied without limitations, but only one of those copies carries value. This is achieved by being able to exchange one DBC for another at the issuer, and recording the original DBC as being de-validated.
A typical DBC encodes the currency or asset in which it is denominated (the “Denomination”), the number of units of that denomination that it represents (the “Amount”), a random nonce, and a signature by the issuer.
A typical DBC system consists of two types of entities: The Mint, which issues the DBCs. It must be able to verify that DBCs presented to a mint have been issued by that mint, which is usually done by verifying the signature. It furthermore has to be able to ensure the uniqueness of a DBC, usually by keeping a record of DBCs that have been de-validated already. The record of de-validated DBCs is usually called “Spendbook”. And the User that interacts with the Mint and other users by transmitting DBCs.
In a typical transaction, user A would send a DBC 1 to user B, user B would then communicate with the mint to exchange DBC 1 into a new DBC 2. The mint recording DBC 1 as being de-validated. Should user A try to exchange DBC 1 at the mint at a later moment, the mint would recognize it as de-validated, refusing the replacement. This basic protocol ensures that a DBC cannot be used more than once in a transaction.
DBC systems typically are extremely cheap to operate and allow very fast finalization of transactions, as well as allowing many transactions to be processed in a short time. Typically the time to finalization of a transaction only barely exceeds the network latency between the user and the mint, and mints running on commodity laptop hardware can typically deal with thousands of transactions per second. The cost of operation is determined mostly by once creating and once verifying a digital signature per DBC, storing a unique identifier for each DBC (around 32 bytes per DBC), and transmitting the DBC over the network twice (a DBC usually being smaller than 250 bytes). This makes DBC systems prime candidates for extremely fast and cheap micro payments.
Let’s go into a little more detail.
bool Append_iff_unknown(value) : Append a value to a spendbook if and only if that value is not yet present in the spendbook. Return true if the value has been appended, false if the value has not been appended.
The value added to the spendbook is usually a cryptographic hash of a DBC.
A mint must be able to verify that a DBC was issued by it. To this end, DBCs carry a digital signature by the mint. On being presented a DBC, the mint verifies the signature and only then tries to record it to the spendbook. Only if signature verification and spending (Append_iff_unkown) are successful then DBC has been valid. Early experimental mints used simple HMACs with a secret value for signatures. Later developments used RSA, DSA and ECDSA signatures with published public keys that would allow users to pre-verify a DBC before sending it to the mint.
Blind signatures allow for the signer to sign data in such a way that the signature can be publicly verified, but without the signer knowing what data it signed. This involves a protocol in which the user “blinds” the data, sends the blinded data to the signer, the signer creates the signature, and then the user un-blinds the data and signature and provides it to a third party for verification. The signature over the original data would show as being validly signed by the signer, without the signer knowing at the time of signature what data it signed. Blind untraceable signatures furthermore allow a signer to sign data so that it will not be able to know what data it signed, nor be able to find out when the signer made the signature even if both the un-blinded data and the signature are known to the signer afterwards. This allows for the construction of mints that can issue DBCs in such a way that the mint has no way to link input and output DBCs, nor be able to determine in any way when it signed a DBC or for whom. To emphasize this: Blind signatures allow the construction of DBC systems that allow for fully anonymous and untraceable transactions, verifiable by the user, without the mint having to be honest to maintain anonymity and un-traceability. However, blind signatures make the mint vulnerable to be defrauded by users. The blinding and un-blinding steps above are controlled by the user alone, with the Mint not knowing if the encoded denomination and amount is valid. The way to secure a Mint against this was usually to have the user provide many different blinded DBC candidates for signing, then the mint randomly requires the user to prove the content of all but one of those candidates, and then signing the remaining DBC if all other candidates were valid. In case a user would be discovered presenting a fraudulent DBC candidate to the Mint, some punishment would be exercised by the mint.
Issue: Create a new DBC by encoding denomination, amount and a random nonce, and sign it with the mints key.
Spend: Destroy a DBC by verifying the signature, and recording the DBC in the spendbook.
Reissue: Spend a user provided DBC, and issue a new DBC on success. Return the new DBC to the user.
Split: Spend a user provided DBC, and issue two or more new DBC so that the sum of amounts of the new DBCs equal the user provided DBC. Return the new DBCs to the user.
Combine: Spend the user provided DBCs (plural!). Issue a new DBC so that its amount equals the sum of amounts of the DBCs provided by the user. Return the new DBC to the user.
More advanced implementations would only expose a “Reissue” function to the user which would be able to deal with any number of user provided DBCs and any number of output DBCs.
This DBC system was available on an IRC network frequented by cypherpunks in the early 2000s. Users could directly send each other DBCs through IRC, and interact with the Mint through IRC as well. Yodelbank offered DBCs that presented value in a variety of digital gold currency systems. Users could buy and sell DBCs for egold, 1MDC, pecunix and several other currencies. Yodelbank encoded DBCs in a human-readable format and signed them with HMAC. This allowed users to transact without the need for any special software, just copying and pasting short lines of data.
Invented and founded by David Chaum. It used blind signatures to provide un-traceablity for users. Users would open an account with Digicash and withdraw value in the form of blindly signed DBCs. The user could then transfer DBCs to other users which could then pay those in to their account. Digicash only broke the traceability between the sending and receiving user, but did not provide anonymity to use the system. It also required software on the user’s computer to be used.
My involvement with DBC systems started with being exposed to the Yodelbank system when being a resident of the Invisible IRC Project where it ran. I wanted a system that was more powerful and functional, and solved some shortcomings of it. Hence I ventured into implementing my own DBC software. Though I wrote the software, I never operated a public Mint due to legal reasons. Others however used my software to operate small mints that facilitated transactions in closed user groups, and even a small public mint that never caught any traction. With the advent of blockchain cryptocurrencies, this public mint disappeared. eCache did however have some influence on other systems, such as some ideas being picked up again by Vouchersafe and OpenTransactions. Both of these systems originate from the same group of users that discussed DBC systems on IIP and are still operational and in active use. No eCache system is operational as far as I know. There have been no changes to the design after 2008, though some new ideas will be touched on at the end of this text.
Recording every spent DBC not just requires storing potentially a lot of data over time, but also increase the resources spent on verifying if a DBC has already been spent. For this reason eCache DBCs expire at some point after which they are invalid. Every eCache DBC thus encodes a future date at which the DBC will become invalid if not reissued before. The default expiry date was at least one year in the future. The spendbook can now be implemented by an expiry-indexed set of bloom filters that can simply be deleted after the expiry time has been reached.
Only recording spent DBCs (in contrast to recording issued and spent DBCs) requires that the signing key of the Mint is kept very secure. eCache solved that by implementing the signature verification and signing operation in an HSM (Hardware Security Module) that would furthermore keep track of input and output amounts of a transaction. Furthermore the signing key would be rotated every few weeks. For each key, eCache tracks the total amount of value signed with it, subtracting from that amount with every signature verification. That way the Mint can make sure that it is not presented with DBCs generated from a stolen signing key.
eCache DBCs encode information about who can spend the DBC, that is: Who the owner is. This is simply a hash of a public signing key that is used to verify any transaction in which that DBC is used. Any transaction command from the user to the mint has to be signed by the private key that corresponds to the public key encoded in the DBC, otherwise the mint will not process the transaction. This allows the mint to record a proof that the DBC has been spent legitimately by its owner, and not destroyed by the mint without user consent. Furthermore the eCache DBC allows a second owner which becomes valid after a defined date which is also encoded in the DBC. This means that eCache DBCs record an owner that can spend them before a user defined date X, and another owner that can spend it afterwards. Owners are only identified by public key, for every DBC a new owner key pair is generated, and usually not reused. In a mint transaction, all input DBCs must be owned by the same owner public key. Combining multiple DBCs with different owners will require that input DBCs are first reissued to the same owner individually, and then combined in a later transaction.
Standard eCache DBCs are signed using ECDSA with a public key that is known to users. This allows the pre-verification of DBCs by users before even talking to the Mint.
Any response by the Mint to a user is signed so it can be verified by anybody that it actually came from the Mint.
Any time the same parameters for a transaction are sent from a user to the mint, the exact same response would be returned. This prevents newly created DBCs to be lost, but it also allows for the user to publish his transaction request and have it be verified by anybody. Combined with signatures done with ED25519 and DBC templates (see below) this can be implemented trivially by only caching the result branch of a transaction, indexed by the hash of the transaction input. The transaction cache expires after a week, giving ample time to question the honesty of the mint, or recover from untimely loss of connectivity.
Both input DBCs are unspent and valid.
The first input DBC is unspent and valid, the second is not.
The second input DBC is unspent and valid, the first is not.
Constructing transactions like this allows for lock-free writing to the spendbook (which also allows for the easy distribution of the spendbook) without the requirement of rollbacks or introducing complexities that can introduce race conditions.
Since transactions are publicly recorded for verification and auditing purposes (see below), trivial tracing has to be prevented. For this reason the nonces and ownership included in the DBC templates are encrypted to a secret that is itself encrypted to the mint and included in the signed transaction. Both user and mint can decrypt the secret in the future to reveal the exact nonce and ownership in the output DBC, if that need arrives.
eCache mints publish a record of all transactions in an unchangeable, append-only data structure. It is implemented as a hash-chain in which every entry includes the hash of the previous entry. This prevents re-ordering of the history. The current head of the chain can be requested from the mint any time, returning the head, current time, and a signature of both. The complete history can also be downloaded and verified.
Public key of the signing key pair that the mint uses. These entries include the time range in which the public key is valid.
Changes to the backing capital of the mint. If value is added or removed from the capital this is recorded.
Changes to the issued capital of the mint. If the total value of issued DBCs changes then this is recorded. The issue capital must always be less then the backing capital and the difference defines the maximum size of the spend pool (see below).
Spend transactions: The user-provided transaction, including all input DBCs, output DBC templates, encrypted shared secret and owner signature. Furthermore the mint adds the result branch selected (see above).
DBC spend: The spent DBC, including signature. Directly follows the Spend transaction.
DBC issue: The newly issued DBC but without signature.
The history log allows for the recording of proof of mint operations. Transactions now become publicly verifiable if the user so wishes. Should the mint be suspected of dishonesty, the user can publish his transaction. The result of the transaction, and if so requested even the output DBCs, can be validated publicly. Furthermore the current capital of the mint becomes verifiable, making it possible to audit its backing versus issued DBCs.
Not all transactions with the Mint are recorded immediately into the history log. Spend operations are instead kept secret in pool of unrecorded transactions. The total amount represented by DBCs spent in those transactions is lower than the difference between backing capital and issued capital. Whenever a spend transaction reaches the mint it will first be recorded in the spend pool. Furthermore a hash is derived from a mint-kown secret and the hash of the transaction and recorded in the history log. When the amount of capital in the spend pool reaches a defined threshold, or the total number of transactions in the pool reaches a defined threshold, a random transaction from the pool is selected, removed from the pool and recorded in the history log. The combination of history log, signed transactions, concealed unique values and spend pool allows public verification on demand, while making public tracing of transactions hard. Care must be taken by the users to use common DBC amounts to prevent tracing through unique amounts.
The combination of ownership and publicly verifiable mint signatures allows for transactions in which the recipient can do a check against double-spends without having to communicate with the mint. The recipient only has to keep record of the DBCs sent to it that have a specific owner. If a DBC is presented twice a double spend is detected, if the DBC is unique and carries a valid signature by the mint the recipient can be sure that the DBC will be accepted by the mint for reissue at a later point in time. Since DBCs can include two owners that are exclusive to each other and cover two defined time spans, it is also possible to pre-generate DBCs to be used in an offline manner at a later point in time. The user simply generates DBCs for the intended recipient that after a certain time fall back to be reissue-able by the user’s key. This allows transactions between two parties in which both can be offline for a defined, possibly very long, time span without needing to interact with the mint. This makes the system very usable for scenarios of mobile point of sales transactions and simple hardware implementations, such as in the case of payment cards, public transport tickets, etc. Furthermore it makes the system much less vulnerable against denial of service attacks. To clarify: There are only two cases which require one of the transaction parties to talk to the mint during the transaction: The recipient is unknown, or the payment amount is unknown. In all other cases the transaction can be structured so that no communication with the mint is required during the transaction.
The public history log allows the recovery of the mint using only public data. The only DBCs that are at risk for double spend at that point are those in the spend pool. If the pool entry secret is known even those DBCs can be prevented from being double spent.
One feature that can be implemented in DBC systems is true anonymity and untraceablity of transactions. eCache implemented a second class of DBCs that would carry blind signatures instead of standard ECDSA signatures. The limitation was that it was only possible to reissue ONE standard DBC into ONE blind DBC, and vice versa. To make this possible in a single transaction, only specific amounts were supported. Instead of allowing any amount being represented by a DBC, the mint had one key per denomination and amount. A published list of keys and their respective values could then be used by both the mint and recipients to determine what amount and denomination a blind DBC had, simply by testing the signature. This way a direct conversion between DBCs with standard or blind signature was possible without risk of the mint being defrauded. However, when challenged the mint could not possibly prove from the history log that a spent DBC was actually the result of a previously recorded issue operation, leaving the possibility that the mint could overissue DBCs undetected. The user could however still challenge the honesty of the mint by revealing the used blinding parameters.
The issue of auditability of blind signature DBCs lead to the creation of the JarMix protocol. The goal here was the preservation of untraceability and anonymity of the user’s payment while at the same time being able to audit the mint’s issuing behavior. To this end a new entity is introduced that is independent of the mint: The Mix. The Mix is an entity independent of the Mint that only serves the purpose of increasing the anonymity and untraceability of user payments. The mental model here is a jar of coins into which the user can put one coin in and get a random other coin out. For this end, the mix operates the “jar of coins”, a pool of valid DBCs with unique ownership keys per DBC. A user contacts the mix and requests the swap of DBCs. The mix returns a signed statement containing the public keys of ownership for both the DBC in the pool and the expected DBC from the user. The user then creates a matching transaction for the mint, producing a DBC to the mix as owner. That transaction is encrypted to the mint and given to the mix. The mix appends its ownership public key and forwards the packet to the mint. The mint then decrypts the transaction, verifies that the ownership of the output DBC matches the attached ownership key of the mix, and returns the new DBC to the mix. It is important to note here that all responses by the mint are signed by the mint. On receiving the reply from the mint, the mix returns the previously agreed on DBC and ownership private key to the user. At this point the mint does not know which DBC the user received, and the mix does not know which DBC the user spent. Nor does the history log allow the mix from learning anything about the input DBC because that transaction is still kept in the spend pool (with ownership of output DBC being a concealed value). The user needs to trust the Mix to not spend the DBC on his own until it has been reissued. To keep Mixes honest, auditors can do test transactions through the mix, increasing the risk for dishonest mixes to be discovered. For increased privacy, and decreased risk of fraud by mixes, the user would reissue mix-DBCs through other mixes, with a short delay in between. The result of a chain of mix operations would be that no mix nor the mint could easily connect the original input DBC with the newly generated output DBC. At the end of a chain of mix transactions the user then reissues the last mix-DBC at the mint directly. The anonymity set and level of untraceability at that point depend on the combined trust in the mixes, and the number of mix transactions done by other users - similar to the level of privacy provided by mixes for communication. Various extensions have been described to extend JarMix so that the mix cannot double spend the DBC it returns to the user. They are beyond the scope of this document.
eCache (and JarMixes) simply subtracted a unit from the input amount based on the number of DBCs issued as a result of the transaction, allowing for trivial prediction of fees.
While eCache itself is not in use anymore, lessons learned from designing and developing the system have influenced other developments. One of these examples is Mute, a secure messenger developed in 2016. DBCs are very useful for micro payments. The requirements for processing, storage and bandwidth are very low, while at the same time allowing the system to operate for extended periods of time without the users having to communicate with the mint. And DBCs are just a few hundred bytes in size. For these reasons Mute used blind (untraceable, anonymous) DBCs to allow users to pay for the service on a per-message basis - using DBCs as digital stamps. Users would purchase some amount of the internal stamp currency, turn it into blind DBCs owned by any one of the Mute servers, and then include those DBCs into messages. The Mute servers would verify the Mint’s signature and check for double spend. On successful verification, the message would be forwarded.
DBC systems are flexible and easily extended to support further use cases. While the ownership feature described above is powerful, it can be adapted for more complex protocols. An example for that is the experimental extension developed for eCache.
Instead of simply recording the public key for transaction signatures, the hash of a “contract” was recorded in the DBC. A contract is a boolean expression describing the conditions under which a DBC will be reissued.
Furthermore the contract can apply to more than a single DBC transaction. eCache supported “combined” transactions in which two or more DBC transactions could be presented to the mint at the same time, the conditions of each of the input DBCs referring to the output DBC templates of the other transaction. This allows creating schemes that allow swapping the ownership of two certificates presented by two different users.
For example, a DBC issued for the denomination “gold” for owner A and another for the denomination “EURO” for owner B can be simultaneously processed if and only if the respective output DBCs would be “gold” for owner B and EURO for owner A. This essentially implements a swap or sales.
To facilitate processes like these eCache in addition implemented an “Issue Book” which cached newly issued DBCs created in combined transactions. It allowed anybody knowing the output DBC template to retrieve the signature for it. That way a user could pre-sign a transaction, give it to another user for combining it with his transaction and sending it to the mint, and then ask the Mint for the signature to be able to recreate the result of the transaction.
A central question for digital money systems is that of the issuer risk, that is: Risks introduced by the issuer. These can include manipulation of issued capital outside the bounds of backing capital, the operation outside of protocol, and unavailability due to the mint ceasing operation or being forced to close down. It is the issuer risk that is the main problem that blockchain cryptocurrencies have strongly mitigated. For DBC systems, one possible approach would be to separate backing from issuing, and make backing access dependent on continuous successful verification of mint operations. eCache could be used in this context since it allows users to demonstrate mint dishonesty, and everybody to audit the issued capital.
Watching and participating in the digital money sphere over the last decades is only part of the story, the other is an interest and excitement on where things will go. For me there seems to be an evolutionary path that has the “issuer risk” as the attractor. Issuer risk is the risks faced by a user of a digital money system of not being in direct possession of an intrinsic value, but instead rely on some entity for keeping and transmitting value.
In the beginning, issuer risk was overcome by trusted issuers and a legal system. The issuer would be liable to the users of his system, and the legal system would both regulate his behavior and practice, and also promise redress in case the issuer would defraud the users. Added onto that was the idea of issuer insurance, basically guaranteeing the deposits of users up to a certain amount by other issuers taking over the liability in case of issuer failure.
Trustless blockchain cryptocurrencies. Here the system itself says good-bye to any notion of backing or intrinsic value. Instead, only virtual fiat money was issued, by the system itself, held exclusively in the system, regulated purely by protocol implemented in software. Instead of trusting a single entity, or a system of institutions, the trust in these “trustless” systems is distributed over those parties that cooperatively but independently operate the system. These parties being, realistically, the miners. It needs to be kept in mind that “the miners” is no pre-defined group, it just happens to be the set of entities currently engaged in mining cryptocurrency, and that set is highly fluid. One miner disappearing can be replaced by a dozen new miners starting the activity - without any coordination whatsoever. This construction is believed by many to solve the issuer risk forever. I tend to disagree. Yes, it is for sure a much more resilient setup, but for me it is less then certain if that makes the system immune to regulatory attack, blocking, subversion. Yes, you will always be able to prove that you still have cryptocurrency, but its exchange value might be close to zero, and it might not be transmittable at all. It should be noted that in verifiable DBC systems the fact of still having valid DBCs is true even if the mint is taken down. And these DBC systems are recoverable: Another entity is able to just continue operating from the known public state. The main essential difference being that in blockchain cryptocurrencies the backing still remains, while in pure DBC systems that abstract another currency this would not be the case. One of the areas of research hence could be thinking about distributed monetary control for DBC currencies.
That is where we are at. We went from trusted, to verifiable, to possibly trustless. The word I am missing in that enumeration is “trustworthy”. So far, we have failed to build systems that are worthy of our trust. When we have trustless however, do we really need trustworthy anymore? My view is that building trustless systems is very limiting from perspectives on complexity, economics, privacy and adaptability. Trustless systems are necessarily huge, needing many persons to cooperate according to the same protocol. This makes them vulnerable to error of specification and a changing environment. They are also inherently expensive to operate and likely will never be as fast and cheap a DBC systems. Let alone that they are likely never going to achieve the same strength of privacy - anonymity and untraceability - then blind DBC systems can reach.
I do however have an intuition that we might find ourselves evolving past trustless systems towards trustworthy systems relatively soon. Let me throw a few ideas and sketches at you.
A few decades ago, people started working on something called “Trusted Computing”. The idea there is simple (the technology isn’t): Create computer hardware that can prove to a remote user that it is exactly one specific kind of computer, with one specific kind of hardware and hardware settings, running exactly one specific program. This means that you could verify from afar that a computer is doing exactly what you would expect. This is called “attestation”. Then came the cloud. Now hardware manufacturers are incentivized to push trusted computing even further, and make it widely available in their server processors. The next step taken was encrypted RAM. Here the processor itself would encrypt all access to RAM, preventing even somebody with physical access to learn the contents of memory. The key to encrypt the RAM would be generated by the processor itself, and never be made available to any other hardware or software. Examples for this are SGX, SME and SVE. Combine attestation and encrypted RAM, and you find yourself with a remote box that can process secrets. Secrets that nobody could learn or manipulate other than through the software running on the box - software that itself would be attested. I call this “black box computing”. The moment these technologies are mature (they aren’t right now), we will be able to set up black box computers anywhere, remotely, and be sure that our software runs as expected, and our secrets are secure on them - even against physical attack. This leaves us with the question if we should trust the software running on those machines. And the answer is as always: Trust but verify. Amazing advances have been made over recent years in the field of formally verified software. Software for which we can make mathematical proves that it performs one specific activity, and no other, even when presented with evil input. Please sit for a second and think about this: A formally verified program, running on a remote trusted computer, with no access to RAM but by the verified program. Should we reach that stage, and I’m very confident we will, our environment for running digital money systems will change dramatically. We will again be able to rely only on verifiable and recoverable systems, and they will be able to easily move from machine to machine, control money supply, and adapt as needed. And these systems will be cheaper, faster, more private and more powerful than anything done with blockchains today. There will be DBC systems again.
Until then, there is more to do. Recently there have been developments to create distributed DBC mints that are resilient to byzantine failure of a minority of participating nodes. Distributed DBC mints that are able to do blind signatures or employ JarMix for untraceability. It will be exciting to see what comes out of this. I have the feeling that the time of DBCs is still to come. | 2019-04-24T14:12:01Z | https://opaque.link/post/digitalmoneydbc/ |
The Best Western Los Alamitos Inn & Suites is ideally located in the center of Los Alamitos. Come and experience our hotel near the major tourist attractions. Best price guaranteed and exclusive deals.
Our proximity to Seal Beach, Long Beach, Aquarium of the Pacific, Disneyland & Knott's Berry Farm are just a few of the great perks that set us apart from other hotels in the area.
Begin your stay in Los Alamitos at the Best Western Inn & Suites and enjoy an unforgettable visit.
When your travels take you to Los Alamitos, stay at the Best Western Inn & Suites. We love having you here!
Our gem of a hotel is located within minutes of Rossmoor & Seal Beach.
No matter what time of the year, we know you will love the Best Western Inn & Suites. Located in Orange County, California!
First impressions are the most important, and our chic newly renovated lobby is no exception to that rule.
Rise & shine with a complimentary full hot breakfast served in our lobby's breakfast area from 6:30 a.m. - 9:30 a.m.
Make yourself at home in our "Executive Suite." This suite offers a full size fridge, stove, sink, kitchen table, living room area with a pull out sofa bed & a separate bedroom with a King size bed. Great for long term stays, a small family & if you enjoy cooking inside rather than going out.
Executive Suite - Dining room area.
If you're looking for a little extra space to stretch out and relax, book our Executive Suite. This suite has everything an apartment would offer!
Executive Suite - King size bedroom.
Upgrade yourself to our Double Queen Suite for added comfort during your stay. This room type has two separate rooms, a living room area & the bedroom with 2 queen size beds. Great room for a family of 4+.
Use the separate living room in our Double Queen Suite for entertaining, and keep your sleeping area private with a door that divides the living room area from the bedroom area.
Double Queen Suite living room area includes a pull out sofa bed, coffee table & an additional t.v for those families who have both children & adults with different preferences when it comes to t.v channels.
Double Queen Suite - Bedroom area.
Settle in for the evening & and relax in our spacious King Suite living room area. This suite has a door that divides the living room area from the bedroom.
King Suite - Bedroom area which is divided by a door from the living room area. Great for families!
King Suite - Bedroom area.
King Suite - Open layout! This suite is for the guest who enjoy more of an open layout rather than a dividing door. Great for business travelers & if you're looking for a spacious upgrade from our Standard King.
King Standard Business Room - Very spacious standard room!
Splash around and have fun with the family in our outdoor pool for endless hours of FUN!
Relax and let the warm water calm you and leave you feeling rejuvenated. Our outdoor spa has a gorgeous view of the Orange County sunsets in the evening!
We installed the ADA mobility accessible pool lift system to help those with disabilities not miss out on any of the action. At our hotel all guest matter!
Whether you are checking your email, printing boarding passes/tickets for the local attractions or simply just browsing the web feel free to do so at our Business Center which is located in our lobby. Print or fax anything at the hotel's expense! The Business Center hours are from 6:30 a.m. - 11:00 p.m.
***Chairman's Award for quality standard excellence. Free hot breakfast 32-inch plasma TV in suites near Cypress / Long Beach and Anaheim*** The Best Western Los Alamitos Inn & Suites, is located in the heart of Orange County featuring deluxe business suites with plasma televisions. The Best Western Los Alamitos Inn & Suites is conveniently located in proximity to key area attractions including Los Alamitos Race Track, Disney Land, Knott's Berry Farm, Seal Beach, Long Beach Aquarium, and Los Alamitos Joint Forces Training Base. Guests will appreciate the easy access to area restaurants, stores as well as the Long Beach Airport or Los Angeles International Airport. The hotel features an outdoor pool, hot tub and complimentary full breakfast. Each well-appointed room features high-speed Internet access, cable television with HBO®, microwave and refrigerator. Business suites are also available upon request featuring a 32-inch plasma television and an over-sized working desk. The hotel's friendly, multi-lingual staff is ready to ensure a comfortable and memorable stay. Make an online reservation today at this Orange County hotel in Alamitos, California! Enjoy your stay.
Somewhat noisy due to the proximity to Los Alamitos Blvd. The parking isn't good, there's one parking space for each room. I was told that on weekends sometimes you get blocked by others parking behind you (I didn't see it during our weekday stay). Rooms are small but adequate. About right price wise. The Ayres hotel down the street is nicer but more pricey.
Two nights here to see a splendid Mary Blair exhibition and spend a day at Knott's Berry Farm. Located a few miles from each of our destinations. Pleasant hotel, professional staff (especially front-desk person Jose). Quiet, clean, spacious room (we even had a little balcony!) Full breakfast part of the room charge. We were very happy.
very friendly and helpful staff. the location is great. next to places to eat and also places to shop and i also love that the beach is a close drive from the hotel.the staff helped me get a refund for an over booking.
"Great Location & Great Property"
Pros: Spacious double queen rooms with ample room, including a table and two chairs and a desk with the extra room and it didn't seemed cluttered. The closet was bigger than the one I have at home and was nice to hang up my clothing and they have luggage racks to put your bags on inside the closet. The toiletries were of good quality and were ample in supply and diverse. Had enough towels of all sizes that you didn't have to call down for any more and there were four pillows per bed and that was more than enough for one person per bed. The beds were comfy and soft, even though I like a harder mattress I was able to get a good night sleep on this one. TV has basic cable and HBO available complimentary. Plugs galore, in the lamp on the center night stand was two plugs for adapters and one slot for a USB cord and on the nightstand it had two plugs for adapters for plugging in your electronics. Better too many than never enough. Came with a fridge and microwave, we were on the third floor and was quiet and wasn't bothered by outside noise. Shower had hot water anytime day or night so you were never stuck with an ice cold shower. At check-in we requested a later 1p checkout, it was confirmed right away and not having to call down in the morning like most places so we got to sleep in.
"Nice, clean hotel conviently located"
We stay at this location frequently. Staff is always friendly and willing solve issues that arise. Located close to amenties and activities. Disneyland and Knott's are within a 20 min drive. Beach is about 15 min.
My favorite Best Western, Great room and great staff make it a great place to stay. It's a smaller Best Western but nonetheless it is the best. Just don't go when I do because I want my favorite rooms and want to make my waffles 1st!
Good morning, Thank you for letting us know how your stay was with us. Thank you for choosing us, we hope to see you soon for your first waffle!
"Pretty good for the $$"
I can't tell you how impressed I was by getting TWO luggage racks! I never understood why a 2-bed room would only have one rack. There are obvious two people sleeping there. Good job, Best Western! Also something you don't see much of any more: A real blanket! I despise those comforter/sheet thinging: They are too warm for me and I end up taking them off and just sleeping under the two sheets. Give us back our blankets! :-) I was pleasantly surprised to see two bottle for your hair: shampoo AND conditioner. Please don't tell me you can add conditioner to shampoo. Nope, doesn't work. There was a coffee maker, a microwave and a fridge. Nice! (It might just have been only our room, but there was no place to plug in the coffee maker where it was actually situated. You had to move it to the desk to find a plug. ??? The other cons: No lotion in the bathroom, and only regular coffee--no decaf. The breakfast was exactly as you would expect but come on: those napkins? I could literally see through them. I understand wanting to save $$, but when a guest has to use 7 or 8 of them, you are not really saving much. The room as clean and presentable (Oh, the TV remote was on a paper holder--for sanitary reasons? Not sure, but it was not sealed so maybe they just reuse the same one over and over.) The hotel is very convenient to the 605 freeway and Knott's Berry Farm. (Go there for their chicken dinner!) Front desk staff were friendly and professional. I would definitely use it again when I'm in the area.
Good morning, thank you for leaving us feedback regarding your most recent stay with us. We are happy to hear you enjoyed your in room amenities.
Thank you so much for taking the time to review us. We appreciate it and hope to see you again soon.
We stayed at BW Los Alamitos Inn & Suites 7 days. Our room was always clean as well as the rest of this hotel. Breakfast was the same each morning, but had a lot of variety to choose. Staff was helpful, pleasant and courteous.
We're so happy to hear you enjoyed your stay and hope to see you again very soon.
We found our room to be very clean, and well maintained. Check in was fast and easy. There was plenty of parking while we were there. Pool and spa looked well maintained, BUT they don't keep any towels at the POOL/SPA?!?!? You have to bring your own from your room. Very annoying but not a show stopper or anything.
Thank you for sharing your experiences with us. We appreciate the feedback about the towels and will look into having a cabinet to hold the towels at the pool. We hope to see you again soon.
Seems to me there's a problem at this hotel. If you book from 3rd party they'll put you up in a smoking room. So if you want a non smoking cleaner room you better book directly with them and you'll pay the higher price. I feel they're taking advantage of my parents who are there now and told them they sold out on rooms but from what I see on booking.com and their own website there's non smoking rooms left. Buyer beware!!!
"Aside from the pillows it's good!"
Hotel is very clean. Rooms are a good size. Adrian at front desk is awesome. So friendly and helpful. Breakfast was excellent. Only downfall was the Pillows are hard and bulky. Did not sleep well and woke with a kinked neck. If they changed up the pillows it would be perfect!
We have stayed at Best Western Los Alamitos Inn in the past and have found it convenient for business in the Long Beach/Seal Beach area. It has had some remodeling since our last visit and has a pleasant fresh look.
Good morning, thank you so much for leaving us feedback regarding your stay. We are so happy to be able to provide a clean and safe environment for you. We hope that you have a great day and consider staying with us again. The remodeling, we are so glad you noticed, our entire team worked really hard to get it finished nicely. Thank you!
Room was good size and beds very comfortable. Check in made us stand outside in the cold. (47 degrees) Other employees very helpful. They were redoing checkin/breakfast area so room was closed. Breakfast was plentiful when it was provided; 2 of 3 mornings was a table outside with cold cereal, milk, some fruit, yogurt and granola bars.No coffee or tea. Not the “full breakfast”. Wish they had told us that before. Why redo a lobby between Christmas and New Years?
Good afternoon SFtripper81, thank you for leaving us feedback. We want to thank you for staying with us. We apologize for having you stand outside for check-in, but for your safety, the lobby was closed during construction. While not the ideal time, it was something we were really passionate about finishing before the new year. We hope you can understand. Again, thank you for staying with us.
BW, Los Alamitos is a comfortable, convenient, quality hotel for visitors to the Los Alamitos area. Easy access to area beaches, attractions, without being in a tourist trap. Very friendly helpful staff; nice breakfast. Not far from Long Beach airport.
Good morning Carol S B, thank you for leaving us feedback regarding your stay. We hope you enjoyed your stay and consider us again for your next stay. Have a great new year!
"Clean motel with great breakfast in convenient location"
Despite the doors open to the parking lot, the rooms were surprisingly quiet. The hotel is mostly renovated, so things look quite fresh. The breakfast was great; it had both hot and cold items and pretty much anything you would want. The beds were clean and comfortable, though my husband and I weren't crazy about the little pillows, which were a bit hard.
Good morning thank you very much for leaving us feedback regarding your stay. We take guest feedback into heavy consideration when discussing with out team at meetings. We hope you enjoyed your stay and have a wonderful rest of the holiday season.
I have a conference periodically in the area of long Beach very near I-805. I always choose this hotel because of the value - clean, comfortable, good breakfast and with the amenities I need. I would recommend it.
Good morning, We are glad to provide a clean, quiet, and affordable place for you and your colleagues. We hope you have a great day, and thank you for always staying with us!
"Good hotel with some problems"
I needed a place to stay while I attended several meetings in El Segundo and Orange County. This hotel appeared conveniently located near I-405 and I-605, and offered a good rate (discounted, in my case. The room and most other features were highly satisfactory: everything worked in the room, it was clean, and WiFi was good. I have low expectations for an included breakfast, and I found the breakfast here just adequate. The serving area was cramped. Somewhat surprisingly, the coffee was served from some sort of concentrate machine -- not what I'm looking for in the morning. Biggest problem was inadequate parking. I suspect the motel was sold out, but there wasn't a 'legal' space available when I returned after dinner. Someone arriving later would have needed to use on-street parking. Staff had not warned me about this when I checked in, and luckily it did not become a serious issue for me on my 3 nights. So ask carefully if you plan to arrive or return late. Also, there are several places to eat within walking distance.
Good morning, Thank you very much for leaving us feedback. Rest assured, we have communicated with the two businesses adjacent to the hotel to provide additional parking for our guests when our free parking fills up. Please keep in mind, parking on the street overnight is prohibited and in some cases can result in your vehicle being towed. As with anything else during your stay, we encourage our guests to swing by the lobby when they have an issue so that we can take matters into our own hands and resolve it; moreover, we are here for you. We hope this clears up any parking issue confusion, have a great day.
This staff went sooo far beyond expectations. Clarissa, specifically, went out of her way to provide extra amenities for my family on short notice. She left pizza in our room and waters as well for us to enjoy during this family emergency.
"Not enough parking for guests"
There is not enough parking for guests, you may have to park offsite and get up at 7: 30 am to move your car ! There is no security box either for your valuables in the room (you have to go to the front office to leave your stuff). And the TV in my room only had 1 channel.
Good morning Sofihuasteca, Absolutely, our parking can be the most troublesome part of our guests' stay and we would like to apologize if you had troubles parking. Unfortunately, because where we are located on Los Alamitos Blvd., each business on our side of the street is tackling limited parking, however, by working together we have made accommodations for our neighbors and vise versa. Despite parking issues being a disadvantage, our lovely city and its businesses have pooled together to provide parking during off hours for others to use, which is the only reason moving back to our parking lot is required. We hope by explaining, being upfront and as transparent as possible, this helps alleviate any tensions. We have made parking arrangements for each guest and only ask that we kindly relocate our vehicles back to our parking lot before our neighbors open so that we can do our part in being a team player. We hope the best for you and you family, have a wonderful day.
Very friendly and accommodating staff, inexpensive rooms with all that's need for a decent night's sleep and quick access to freeways while being away from the noise of them. Some great restaurants nearby: Fish Company, Sango, and for "Gourmet Fast Food go to Paul's Place- best french fries on the planet! Been staying here for business for 16 years and pleased to keep doing so.
Was pleased with Quality of Staff and hotel, free Breakfast and free parking was a big plus. Staff was friendly and helpful, rooms were big and clean. Pool and Spa were nice but would have enjoyed a health center to get exercise while at the hotel.
Good evening, J9957XSjohnm, thank you for leaving feedback for our team and our home. We hope you enjoyed your stay, have a great day.
"We stay here every time we're in town"
A no-frills, clean, comfortable, friendly place to stay with the MOST wonderful pillows EVER! The staff is awesome and tend to your needs right away, always with a smile. They are almost always able to accommodate an early check-in/late check-out and for the price, you can't beat this motel.
Good morning mariahZ7164FU, Thank you very much for leaving this review for us and our future guests. We pride ourselves in being a Best Western hotel that provides superior customer care. Have a great day.
"Will stay here again, really like this hotel"
My main concern is my ability to get an afternoon nap and this hotel works well as it is quiet and comfortable. I didn't get to use the pool and spa this time but have before and it was great. The price is slightly on the high side for Best Western but it is hard to find much of anything in the area for less than 150. I will stay here again.
Good morning Mr. Philip F., We are so happy to hear you enjoyed your stay and that you were able to take advantage of how quiet the hotel grounds are. We hope you have a wonderful rest of 2017.
Very accommodating and friendly service I would recommend this to anyone of these two to business around the Long Beach area. The only thing was is they need to extends the pool hours from 6 am to 10pm and the breakfast hours from 6 am to 10am.
Thank you very much for leaving us feedback. We hope you enjoyed your stay. Have a great day.
"A great place to stay And it was regarding my new place was not ready to be lived in so I knew of this hotel which is th"
Good morning, thank you for leaving us feedback, we hope you enjoyed your stay and consider using us again.
"Great hotel, but very tight parking and breakfast area"
We've stayed here many times and have seen nice improvements. Examples are the improved coffee in the room and at breakfast. The location is close to freeway access so that is always appreciated in the Los Angeles area. However, parking is very tight and the breakfast area is small.
Good morning Shirley L, Thank you very much for pointing out our strengths and also listing our cons, this helps our future guests reach a decision. We hope you have a great day.
"NEVER AGAIN AT THIS LOCATION"
Hmm - let's just say that this particular BW has some issues with staff and management practices. We booked online and when 5 minutes away from arrival check in clerk called and let us know that the only room available was a smoking room and asked if this was ok. told her no, had a 14 with us and did not want to subject him. asked for alternatives, told only thing she could do was cancel our reservation and not charge us !! asked for manager and was told there was none. Asked why this happened and she told me it was because i booked online and that i should have called them direct and she would have informed us (really?). Asked her to call manager to find solution, she refused to do so and then hung up on me. Having no options, we were forced to stay and i now have to write this review to let all others know that they should not consider this facility until they can show that staff has been trained and management can take responsibility for problems and provide solutions.
Good morning DRRVentura, After looking at your reservation confirmation, I do see a double queen smoking room was booked on the same day as your arrival. We have had problems in the past with online reservations coming in last minute (when we are sold out of non-smoking rooms) with a smoking room and when those guest(s) come to check in, we have to be the bearer of bad news and inform them they do not have a non-smoking room. In an attempt to combat this very inconvenient problem for guests, such as yourself, we do ask our team members to contact guest(s) as soon as they see reservations that meet these stipulations come through to verify the reservation with the guest(s) so that we can give our guest(s) as much time as we can to find other accommodations(if we no longer have non-smoking rooms available). We apologize for the inconvenience this has caused you, we know that finding out this information can be very frustrating and seriously make or break a vacation/business trip. We would have loved to accommodate you or any other guest(s) when this situation occurs, but unfortunately we are also bound by the number of rooms we have available on any given night. Additionally, the Front Office Manager, Jose Sevilla, and myself wish we could work seven days a week so that we can take care of each and every guest hands-on, but we have full confidence in each and every team member under our wing. We implore each member of our team to take matters into their own hands; moreover, we empower them to make their own decisions while weighing those decisions against their training. We are here Monday-Friday, 7:00am-5:00pm in office, to analyze our teams' decisions, guide them toward decisions that bring guest satisfaction, and assist guest(s) hands-on. Lastly, we sincerely want to apologize, and we want to reiterate that we completely understand how much this information can negatively impact your stay. Our team member contacted Mr. Sevilla immediately following your initial contact with our GSA, for additional guidance to reaffirm that the decision she made was the best possible decision (given the availability), and after confirming that we had no non-smoking suites or non-smoking standard rooms available- we were left with the decision that was reached. We hope that you can see what our intention was and can understand the circumstances we all had to maneuver with. Trying to sell the room for more revenue and thus lead you toward dissatisfaction is not what we are about at the Best Western Los Alamitos Inn & Suites. We hope that our complete transparency in this situation showcases that. We deeply apologize for the messy situation, and hope you have a great rest of the week.
Hotel decor is / was very out date. Staff was friendly and helpful. Location was not great, it was in between two different businesses. due to location there was not a room with a view... Smoking was allowed on stairwell and could smell the smoke. I was a quite in our room and could not hear the traffic from the main highway.
I will definitely be staying at this Best Western again in the future. The staff were especially polite and accomidating, and everything was updated and clean. The bed was very comfortable. I slept better than I have in a long time.
Good morning, thank you very much for leaving us a review. We are so very pleased to hear you enjoyed your stay with us; moreover, it warms our hearts. We hope you return soon, have a great day.
I booked a room in advance with the hotel itself for a double bed suite as I am traveling with my four kids and husband. We get to the hotel and they gave us a king bed only. Anita front desk tried to help and assured me the manager will take care Of us and comp Our rooms. As entering our room it was sooooo hot and had a bad odor. We also were greeted with the biggest spider web and spider at our door. Anita had a hard time but she got it down as my kids were screaming. Upon check out Anita was not there however they lady who booked my room initially was and she told me u will Not be charged and the manager can not talk w me and will not u til Wednesday. I knew something was off I called my credit card company and they charged me triple what the rate initially was. I went back to talk to her and she asked me to leave the property. I wasn't rude I simply asked as in to why you charged me? This was the worst experience I have ever had and really put a huge damper on our vacation.
Good morning hnadib, Thank you for completing a review for our property. We are so sorry to hear you had a negative experience during your visit with us. Unfortunately, our management team operates fully during business hours: Monday-Friday, 7:00am-5:30pm, however, we are there to guide our staff by answering their questions. We would love to be able to help everyone immediately, but sadly, we are actually in office during the days listed above. We hope you understand and that the conversations we have had over the phone have helped show you I completely understand your frustrations and that I am working on it to show our sincerest apology. We are so sorry you had such troubles, and I hope to do my job as a manager to show that I truly appreciate your loyalty to our brand.
I had business in town and decided to try this place since it was close to my meeting. I did not expect much and got the surprise of my life. It looks as if it was recently renovated or is just kept up in perfect condition. Spotless room, fresh paint, clean grounds, and overall immaculate. The room had an extremely comfortable bed, flat screen television, new furniture, great bathroom, etc. Breakfast was included which included eggs, sausage, fruit, coffee, etc. More than enough to get you by. I am familiar with the area and it is very safe with great restaurants all around. Highly recommended.
Good morning PatrickLongBeach, We appreciate your detailed feedback regarding your stay with us. It is really great to hear guests enjoyed their stay with us. We like to read reviews for motivation to grow and evolve to better suit our guests' needs. We hope you had a great stay, and we hope to see you again soon!
"Los Alamitos near Long Beach, CA"
The room and all facilities were improved even since we stayed in January. We received great help from the staff. I enjoyed the fountain and front garden. We used the food venues nearby, Mexican and pizza and donut shop. Family are nearby.
Good morning pattia456, Thank you so much for staying with us and telling us about what you liked about your stay. We are happy to be able to accommodate you during mini family reunions. We hope you are able to continue staying with us in the future, have a great day.
My husband attended a class and I spent the days visiting friends. We were very happy with the comfortable bed as we've experienced hard beds. There are quite a few restaurants nearby and an adjacent liquor store. The breakfast has quite a variety of items to choose from.Our room was very clean with a coffee pot, iron, ironing board, hair dryer, large screen tv. We felt quite safe. There is a set of craft shops and a nice restaurant a short block away. There is a swimming pool but unfortunately we didnt have time to sample it. Overall a good experience.
Good morning Rosa C, Thank you very much for staying with us and pointing out the highlights of your stay. This assists our future guests on deciding if we are a perfect fit for their needs and expectations.
"Big Bang For You Buck"
Very friendly staff. Great breakfast. Very comfortable beds. Good size room. Great location. Close to Long Beach, Cerritos and Norwalk. We were visiting some relatives on this trip. We were going to stay in Long Beach but the parking fees were too much $19-$28 per night, here it was free, Parking lot is a little tight but mostly because people don't know how to park straight. Plus you get free WiFi and breakfast too. There were lot of families with kids but didn't hear any noise at all.
Good morning Maria M, Thank you very much for staying with us. We are so happy to hear we were able to meet your expectations and accommodate you accordingly. We hope to see you again soon, have a wonderful day.
This hotel never disappoints. Always clean, well kept with professional staff. One of the rooms has been made wheelchair friendly with a large walk in shower. would also add that the breakfasts are quite tasty. Usually have a good selection of hot and cold dishes. Have stayed many times in the past and will continue to do so when I am in the area.
Good morning Timonthy M, Thank you very much for staying with us and letting us know what you like and dislike. We hope to see you again soon.
"Small Hotel with HUGE Heart!!!"
In all my years of travel, I have never been treated with such a high level of care and courteousness as I was during my stay at the Best Western in Los Alamitos. I was traveling with my wife and son for a trip to Knott's Berry Farm and Disneyland. My son happens to have special needs, as he's autistic, and due to his condition, we often scour the internet for hotel options that will suit his needs. After some investigating, we found a room at this location that we felt would work. Upon arriving and entering our room, we realized it wasn't the same room pictured during the time we reserved online (via Expedia). I mentioned this to the front desk clerk, Anita, as well as the hotel manager, Clarissa, and they immediately went above and beyond to accommodate my family's/son's needs. Needless to say, my wife and I were overwhelmed by their display of kindness and concern. The amount of extra work and effort they put in to accommodating us has left a lasting impression and has established a sense of brand loyalty that no comfy bed, free internet, or complimentary breakfast could ever create on its own. Beyond the AMAZING service, the rooms were spotless and extremely comfortable. I fully recommend this modestly sized hotel, if not for the quality of the rooms, then for the quality of the staff. They demonstrated their HUGE hearts and it's something I forever appreciate and never forget!
Hi alexmt2017, Thank you so much for leaving us feedback online. We appreciate you taking the time to do so. We hope to see you again soon. Best wishes to you and your family.
I have stayed there about 10 times this past year and the staff are completely awesome. Polite, engaging and helpful. It is located by great restaurants and entertainment locations. I highly recommend this location and you won't be disappointed.
Good morning michaeloO6913CG, Thank you very much for staying with us. We are so glad to hear your feedback. We hope to continue to have the opportunity to serve you, have a wonderful day.
"I would highly recomment this hotel to anyone!"
The only negatives would be that the channels on the TV are limited and parking spots are a little narrow. However, overall, the other positive points far outweigh those. Staff was super! Great breakfast. Grounds, rooms and pool area all very clean and inviting.
Good morning X5723VTthomast, thank you for staying with us and leaving us such detailed feedback for us to make improvements on. We hope you have a great day!
Just stay away from the coffee. The coffee in the room is awful and the one they use for "free" breakfast is even worse - it is INSTANT! So, as long as you bring your own, you will enjoy staying here. It is clean, comfortable and in a great area with lots of restaurants to choose from. But best of all Long Beachs' Shoreline Village is about 10 minutes away.
Good morning Silva M, We appreciate you leaving us a detailed review for us to improve on. We hope you have a wonderful day!
"Best Western Los Alamitos June 2017"
Good morning John, Thank you very much for completing a survey on our hotel. We hope you enjoyed your stay and have a great 4th of July!
Clean, quiet, great staff, and awesome location. Would definitely stay here again. Make sure you hit Surf Taco across the road, excellent food. Also a great Tai place down the road and pizza shop around the corner.
Good morning joesk1011cb, We appreciate you taking the time to fill out a survey for us and our future guests. We hope you have a wonderful rest of your summer. Thank you again for staying with us.
Stayed here with a group and the location was great for various activities. Good food at reasonable prices within walking distance. Rooms are spacious and clean. Staff are very polite, helpful and friendly. Breakfast included and has enough basic hot and cold options to cover most people's preferences.
Good morning, Thank you very very much for sharing your thoughts regarding our hotel's performance during your visit. We really appreciate the little things, so thank you! We hope you have a wonderful rest of the summer.
Thank you so much for leaving a review for us, we hope you have a wonderful day and visit again soon!
Clean, quiet and welcoming staff. Breakfast was good and worth the visit to the lobby. They had a variety of items so we didn't have any trouble finding something delicious. The rooms on the second and third floors are more quiet than the bottom ones but that could be expected anywhere. There is an elevator so you do not have to climb stairs.
Thank you so much for staying with us timothyj490, we appreciate your loyalty to the Best Western Resorts. We are glad to hear you enjoyed your stay. Please visit again, have a great day!
This hotel met all of my requirements. It's clean and quiet. The staff was very friendly. I checked in quickly workout any problems. The location great. It's about 15 minutes from the beaches and there's food everywhere.
"Trip for Grandson's School Promotion"
Easy check in. Clerk was friendly and made us feel welcome. Wi-Fi/internet connected easily and thoroughly. Comfortable bed and pillow. Slept well. Breakfast was tasty. Overall this was a pleasant experience.
Good afternoon thank you for your response. We truly appreciate you staying with us for your visit to Los Alamitos area. We hope to see you again, have a great day!
great value, not enough parking so get there early. I stayed in a suite and was well laid out with plenty of hook-ups for mobile devices, etc. TV was kind of small, not a big deal for me. Overall, if you are looking for good clean hotel and nice staff, this is the place.
Clean rooms, within walking distance to many restaurants. Rates are great, parking space reasonable. Staff was excellent, friendly and helpful. Outdoor hot tub and pool are clean. Nice place for a 4 day trip.
Good morning pacificmentor, thank you very much for leaving detailed feedback for us and our future guests, we really appreciate it. We hope to see you again soon, have a great week!
Cofortable and very friendly Staff, Breakfast is included and the Rates are great. They are close to resataurants, Bre Kitchen ale House and Shenandoah at the the Arbor. Excellent Lunch and Dinner. They are within walking distance and a few shopping area that are quaint. It's 2 blocks from the freeway. It has a microwave and fridge and coffee maker. A plus for me. I would stay here again.
This is an above average Best Western. I stay here often for business. Excellent restaurants nearby, close to the freeway and the free breakfast is good. Always receive quality service from the front desk.
Hello! Thank you for staying with us. We hope you have a wonderful day.
"good place to stay for those making their base in los alamitos"
As others have said the parking is somewhat tricky when there are quite a few cars you have to be aware when exiting parking spots. The hotel is near a busy intersection and if you have a room facing the street can hear the noise but it wasn't overwhelming i got a decent nights sleep. The continental breakfast was pretty decent not just fruits and juice but included cereal, eggs, pastries, muffins, sausages. Staff was very helpful especially trying to figure out how to use their microwave turns out the power button you have to hit dead center. Free wifi worked with no problem in my room Close access to many freeways here.
We initially reserved a King Room for 2 nights. The bed was comfortable and I loved the large closet for storing luggage. My only complaint was that sink and vanity were outside the bathroom. I prefer the sink in the bathroom. We decided to extend for a couple more nights, unfortunately only a double queen room was available. The closet in this room is smaller however sink vanity was in the bathroom. The Continental breakfast was adequate, fruit was available in the lobby throughout the day which was a nice touch. Front desk staff was cordial and accommodating. Room appeared to be very clean. All rooms had refrigerators, microwaves, and coffee makers.There is a pool and a hot tub which we did not use. If you are seeking a room with a view, this is not your place. Most rooms overlook the parking lot. Since we weren't in our room that much, that wasn't a problem. I would definitely stay here again.
"Give this staff an award!"
I have stayed in 5 star hotels many times. This was not a trip to holiday but to come and see a sick loved one. I was here for a week in a room beyond clean, comfortable bed, caring staff and good internet. I have stayed at more expensive hotels in the area and this is the BEST and 1/3 of the price!
Good morning, Thank you so much for letting our future guests know how hard we work to bring excellence to our hotel. We feel truly blessed to have such attentive team members on our team. We hope to see you again soon, have a wonderful day.
Nice staff and a decent room, but the location and exterior are not so good. The pool and Jacuzzi are very small and essentially in the parking lot. The parking lot and the property are small making parking difficult especially with several large pickup trucks present. We pulled forward and found that all spaces were full or unusable and then had to back all the way out of the parking lot because there was no way you could turn around.
Good morning, we are so sorry you experienced parking issues, please swing by the front office for our guest service agents will be able to redirect you to a different parking area. Have a great day.
The night staff was very helpful in getting us the exact room that we wanted on short notice. We are always satisfied when we stay here. Although we left earlier then breakfast was served that is one of the reasons we stay here.
Good morning, thank you for leaving a review for us, we are so sorry to hear you did not enjoy your stay. We hope to see you again, have a great day.
"Clean & Comfy - Small Intimate Hotel"
The rooms were comfy and spacious with comfortable beds, good amenities, and clean and fresh. Any rooms ending xx01-xx04 please know you will be on the noisy street (we were in room 302). Needed a room near the elevator, but know here you will be on the main street, and the windows do not keep out the sound, didn't get much sleep. But they tried to move us, even tho they were full, and within 10 minutes of going down to request the move, they already gave the room away, so was disappointed in that since they knew we were having trouble with our rooms. Probably won't visit again with no guarantee of a quiet room, but the hotel still met our standards.
Good morning jamaicabitty, We apologize that you had trouble with a room facing the main street. Unfortunately, over the last few weeks it has been quite busy, which can present issues when trying to accommodate a room move, but our staff will always do their best to make miracles happen. We apologize and can guarantee a room away from the street with a request made ahead of time. Have a wonderful day.
"Nice and clean place - friendly staff"
Nice hotel. Bed was too firm and pillows uncomfortable but overall a good place. Breakfast was awesome and staff was very nice. Shower mat slid out from under me in shower and I fell and hit my head. Got banged and bruised but am okay. Water pressure was a little low.
"Do not disturb, means come right on in, here."
The "Please Do NOT Disturb" placard placed on the door, means don't come in. It would be appreciated if hotel cleaning staff followed this request. The room was good and the location is great, all those things are great reasons to stay here. Hotel breakfast opens at 6. Don't expect to go get a cup of coffee anytime before that because the front door is locked.
Good morning N5573LDwilliama, We apologize you were dissatisfied with our services. Unfortunately, we do have a policy for long term guests that is stated on the registration card all our guests sign that states:"Stays exceeding two days are required to receive cleaning service every third day". We have that there to help clarify what guests can expect, we apologize for any miscommunication. Lastly, our rooms are all stocked with complimentary coffee and a coffee maker for your leisure during closed hours. We apologize for not meeting your expectations, we hope to see you again to show you our dedication to superior customer care.
I had a wonderful experience staying at Best Western Los Alamitos. Small property, quiet and clean. Would definitely recommend it to others. The only drawback is the breakfast; not very family friendly, limited choices, small eating area in lobby.
"On my way to Palm Springs"
This is the second time I stayed at the Los Alamitos Inn. The first stay, the Inn hosted a girls soccer team. This time it was a Wedding party. Several generations of family members in the breakfast room. Great to see. Front desk accommodated a business need even though the lobby/breakfast room was bustling with guests. Good Job to front desk and housekeeping.
Good morning Kathleen K, We are so happy to hear you enjoyed your stay with us. We appreciate you always choosing our hotel when staying in the Los Alamitos area. We hope to see you again soon, have a great day.
"A very good quality 2* hotel."
The hotel is in a very nice quiet area, about 25miles from the airport, easy to get to, enough parking, VERY helpful and pleasant staff! The rooms are big, clean and well equipt, the plumbing was maybe a tiny bit noisy at times, but otherwise nothing at all to complain about! Pool was nice, hot tub great! There were a number of very good restaurants with-in walking distance, 'especially the Shenandoah across the road!! And the marvellous collection of little gift store there! Everyone in the area was so pleasant! Highly recommended! If u need a place to crash for one night after arriving in the US, choose this, you won't regret it!
Good morning Puddingwife, we appreciate your feedback regarding your visit. Constructive criticism goes a very long way! We hope you have a great day and we hope to see you again in the near future!
The room was very clean and well presented. The bed was quite comfortable. The breakfast was good with eggs, potatoes, sausage and a selection of breads. All presented nicely. The staff were friendly and helpful. The surrounding area of the hotel gave you a feeling of security. I highly recommend this hotel.
Thank you very much for reviewing your stay with us, johnandgermainec, we appreciate the time it took to do so. We are so happy to hear you were able to enjoy our breakfast! Have a wonderful evening.
Stayed her before going to another town. Nice location, rooms are clean up to date and comfortable. If your in the area on a budget stay here, it's ranked number one for a reason! Close to restaurants and stores.
Hello, thank you so much for taking the time to review your most recent stay. Hearing guests love the experience makes it all worth it. We hope you have a great weekend!
The rooms are clean and the staff is great! I needed a place to stay while my condo was under construction and they made my stay really exceptional. For those of you who are from out of town, it is close to Disneyland, Knott's Berry Farm, the beach, Long Beach Aquarium, restaurants, shopping, the whole Los Angeles experience is close by.
Thank you aquajetart for reviewing our hotel's performance during your stay. We are ecstatic to hear you enjoyed your stay. We hope you have a great day, and wonderful holidays!
"Quick overnight trip to Long Beach area"
Staff was great! Room was clean and modern. Would return to stay if in area again for a night. Parking is pretty ridiculous, but the staff does everything in their power to address it, and get creative on where to park. The only down side was having to go and move the car again at 7am.
Thank you so much for your review AndyECV, we appreciate constructive criticism. We hope the creative solutions show how much thought we have put into alleviating guest stress over the unfixable issues. Have a great day!
"Good value in an above-average hotel"
We spent one night in this Best Western and it was a good experience. Pros: Clean, comfortable bed, free wifi, breakfast and parking. Cons: $100 was charged in advance to our debit card to hold in event of damage. In spite of this disconcerting experience, we'd stay there again.
Hello, thank you for giving us valuable feedback about your visit with us here in Los Alamitos. We are glad that you enjoyed all our amenities we have worked so hard to deliver to all our guests. Have a great day!
Woke up with headache and cough due to a broken air conditioner. The staff had us stay in the room even though the floor was saturated and moldy. Water pressure was terrible and the parking lot was noisy outside our window. The hotel staff was unaccomodating and rude. They never called us back to rectify the situation. We absolutely do not recommend this hotel!
"Nice Night in Los Alamitos"
Stayed here for one night prior to going to a concert at Spaghettini, Seal Beach. Great location for both the concert and the overnight stay. Room was on the top floor overlooking the pool. I was told they had a balcony room for us but it was on the second floor and I preferred not hearing footsteps over my head. If I had been staying longer, the only reason to get a balcony might be to smoke (which I don't and am not sure is allowed) outdoors without leaving the building - there is no view. Room was clean and large with the usual amenities. Bath is small but adequate. The desk staff were upbeat, smiling, and conversational. The breakfast is small but included hot items, making it easy to get on the road if time is a constraint. The breakfast area was part of the lobby making it small but it was clean and welcoming. The best part is I saw no questionable individuals hanging around the hotel. I will definitely stay here again should my travels bring me to this part of SoCal.
Good morning, thank you for your review of your most recent stay with us. We greatly appreciate all our guest's feedback. We hope to see you again soon, have a great day!
Good morning Van J, Thank you for taking the time to leave us feedback for your most recent visit with us. We will strive to uphold the cleanliness that met your expectations during your visit. We hope to see you in the near future, have a wonderful day!
Hello ANAMARIAANDRICHIE, I always feel so blessed to have such wonderful staff, I am so happy to hear our staff went above and beyond for you during your visit. We will continue to provide you with that level of customer service and even try to top it during your next visit. Have a great day, thank you for your time!
This is the nicest Best Western we have been to in a while. The carpet looked new and was very clean, the TV was probably the largest I've ever seen in a hotel room, and the bed was pretty comfy. I would before than happy to stay here again in the future.
Good Morning Dylan D., thank you for taking time out of your busy day to leave us some valued feedback. Thank you for noticing the renovated rooms, our team has done everything in their power to prepare the best available room for you and all our guests. Have a great day!
"Best Western Los Alamitos Inn & Suites, Los Alamitos, CALIFORNIA"
I stayed for five nights and it was an easy location, very close to my work assignment. I ate dinner at five different diners that are all on the same street. it is a quiet location and courteous employees. The internet and AC worked well for my late night data entry needs. I enjoyed the grab-n-go breakfast in the early morning because I was not able to stay around for a hot breakfast. I am grateful though because that was my only source of food for several hours into my work day. Thanks!!
This was by far the cleanest and nicest Best Western I've stayed in. The grounds and rooms were very well maintained and the staff was exceptional. Only complaint were that the pillows were very hard and the parking was limited and spaces were extremely tight. Other than that, I would definitely stay again, but with a much smaller car.
This was a good experience for my first stay at this motel. Given the recent price hikes in the area at other locations I was forced to stay here to meet my budget allocated by my client. I was concerned at first but overall this is a nice property with modern rooms. The bed was very comfortable and not to soft like other cheaper hotel brands and locations. TV was large and had good picture quality. AC was great and powerful.
"A Great start to our Holiday"
Great hotel and lovely staff. Clean, quiet, comfortable and only about 20 mins away from Disneyland. Walking distance to restaurants. Beds were comfy and provided a good nights sleep. Didn't get the opportunity to try the pool out but it looked very inviting. Would have no problem in staying here again.
"Good Clean place for a good price in Orange County"
Clean and very quiet rooms. Close to where we wanted to be. Good value. Parking was a little challenging when full, but we would definitely book again. The staff was very friendly. Easy to find and centrally located.
Good Morning, thank you for reviewing your visit with us! We apologize for the parking issues, if problems ever arise for you, please inform the front desk so that we may assist you, as we do have alternative options for parking. Thank you very much for choosing our hotel for your visit, have a wonderful day!
"Comfortable and friendly while within price range"
I found both the Best Western and the reception staff to be welcoming and knowledgeable. Thanks for a lovely stay. Loved the pool, wished the air-conditioning had been a little more realistic as to real temp but at no time uncomfortable.
The hotel and staff were great. The breakfast was very good. The only issue we had was the parking. We needed to park both of our cars, but we were only allowed to park one in the lot at a time. They did allow us to park in the business lot next door, however we had to move the car by 7 am.
We like staying here. It is close to all the places we are visiting. Staff is friendly and helpful. There are a lots of places to eat around this hotel. Shopping is really close too. I stayed here with my family for 4 days, and then brought my husband to this hotel. He liked it. It will be our come to hotel whenever we are in town. We used to live in Long Beach, so when we visit. It's perfect.
"Nice enough hotel for this location, clean, spacious but nothing fancy"
Room #212 2 Queens bed, spacious,clean, comfortable beds, biggest closet I've EVER seen. Microwave, fridge, balcony but no chairs. Breakfast was included and was good, but area is VERY small. It also serves as the business center (desk with computer and chair). No gym, small parking area with tight spaces, beware of entrance ditch, go very slow or you will scrape the bottom of your car. The WiFi was terrible! Service was very good, friendly people. We stayed for two nights as it was central to our plans.
We rented the suite and were very impressed with quality and cleanliness. Overall the hotel was very clean. Only problem was the cooling system in living room section and no available parking when we came back at 11:00 PM.
"Great location and wonderful service"
This hotel is small but is in a great location for both beach and the city experiences. All the employees are very friendly and efficient. The front desk manager is very helpful and makes himself available for all the needs you might have.
Thank you for taking the time to fill out a review for us! We are happy to hear, Jose Sevilla, was able to meet your expectations during your visit, we hope to see you again soon!
Loved the 2 room suite we stayed in for 4 nights! Clean and spacious. The kids loved the pool and hot tub. The house keeping crew went out of their way to keep our room stocked with towels and other essentials. Eveybody was very friendly and made us feel welcomed.
First and foremost, thank you very much for reviewing your stay for us, we greatly appreciate it. We agree, that two room suite is quite lovely and we are glad you think so too! we hope to see you some time soon for another visit!
Thank you for reviewing our hotel and noticing our hard work. Our staff strives to maintain a clean and friendly hotel for all of our loyal guests. Additionally, our rates do depend on availability, so we hope to see you again to hopefully set you up with a better rate than last time, thank you!
"Terriblr check in when informed our reservation was cancelled"
Hotel was fine when we stayed there. Our reservation was canceled and we were informed of this upon arrival late at night after traveling from NY to get there. We were told they could not reach us and that our credit card was declined. They accepted the same credit car for use during the 5 days we did stay there. We were extremely frustrated upon arrival needless to say.
Thank you for taking the time to fill in a review for us. We sincerely apologize for the mishap that occurred prior and during check in. We know you booked in advance and unfortunately there was an error with the card on file which caused the reservation to go from guaranteed to non-guaranteed. We regrettably had to make the decision to cancel since the reservation was considered as I said, non-guaranteed. We hope this will not deter you from staying with us again so that we may show you what we are truly all about here.
"Convenient to Los Alamitos High School"
We love to stay here when visiting family and attending the Los Alamitos High School choir events. Their location is convenient to Los Angeles and Orange County. The rooms have recently been totally renovated.
Thank you very much for your review! Thank you for noticing our newly renovated rooms, we love the new look as well. We are glad to hear you choose our hotel when visiting Los Alamitos, thank you for your loyalty!
"Great Room and even better service"
Very nice, clean room. Jose, the front desk person, was friendly and extremely informative. The parking lot is a bit small and hard to park a large vehicle but we made it in out family van. The hotel is close to various places as well as the 605 freeway which leads all over Southern California. The pool and jacuzzi were very relaxing and a definite plus! We're in the Los Alamitos area at least 3 times a year and will definitely stay there again.
Thank you for taking the time to fill out a review for us! We are glad to hear Jose provided you with excellent customer service, and that you were able to enjoy the swimming pool and jacuzzi during your stay. Hope to see you again soon!
"Clean, convenient, but can be a little noisy..."
I stayed 4 nights for a work trip and overall had a pleasant stay. The room was clean and the bed comfortable. Looks like they have been working on keeping the hotel up. If you're a light sleeper, the halls can be a bit noisy. I suggest the third floor. I stayed on the second and had a very heavy-footed upstairs neighbor. Front desk staff was very friendly and helpful. Breakfast was decent. I just wish it started at 6 a.m. instead of 6:30 a.m. to make it more convenient for work hours. Parking is a little tight, but manageable with a small car. I would stay here again.
We are glad to hear you enjoyed your most recent stay! We definitely strive for excellence so constant improvement is our goal, and we are glad you noticed. Thank you for taking the time to fill out a review for us, we hope to see you again soon!
"Good room; small parking lot"
Our stay was descent, however, the second night we had noisy neighbors. The room was nice, but the parking spaces were a little narrow and the two rows were closer together than most places. It was challenging to get out of the parking space and required a couple tries of backing up and pulling forward to get out without hitting other cars. If we didn't have the use of the bigger handicapped space, it would have been even harder.
Hello Lori H! Thank you for your review, we apologize that other guests were noisy during your stay, we definitely take noise complaints seriously. Hopefully we get to see you again soon to show you how we have improved based on your review!
Nice room with a very good breakfast. Parking lot is a bit cramped. Location is good and very close to various eating establishments and freeway. Will stay again when in the area. Very little noise helped making sleep easy. Television had many different channels.
The Los Alamitos is the "Best" Western place to stay. This facility is very close to Disneyland and Long Beach using the arterial roads or easy freeway access. Very clean, reasonably priced, and the management/staff are extremely friendly, courteous and friendly. Number one for us is how clean the rooms and exterior of the properly are. Very well maintained! We have stayed at this facility 10 times over the past 4 months.
"Soo wanted to give 5 stars but.."
Roomed smelled with cigarette smoke and front desk employees (daiy shift females) were more involved with their personal lives rather than the customer. The check out employee was very helpful and fast. House keeping was friendly and helpful.
When considering a hotel in Los Alamitos area this Best Western offeres you a very comfortable, exccellent experience. 4.5 stars all around. Rooms have been recently renovated, beds are very comfortable, breakfast is good..only negative is the breakfast room is a little small.
Easy access to local businesses visited. The premises were comfortable & clean. The breakfast satisfactory with easy access to diners close by if a full breakfast is required. Our third visit here & we would return.
The Alamitos Best Western is extremely clean, staff are exceptional and have very good interpersonal skills and are always responsive to any request or need. As a returning customer they remember you right away and always tell us "so good to see again and how have you been". This means a lot to customers. This past year we were coming often to assist my 100 year old mother in law in moving to assisted living, and an Alzheimer's facility. This staff always remembered us, and always asked how we were doing with kind thoughts and words. We truly appreciated that. This staff is the best ever.
Staff was nice, rooms were nice and clean. My husband and kids enjoyed the free breakfast every morning. We stayed there for our Disneyland vacation, the drive there and back wasn't bad at all. Maybe 20 min, if that. Would definitely stay there again.
"A Great Hotel, no need to look further"
I've only had positive experiences while staying at this hotel. Why stay at other high priced hotels in the area when this little gem is in the heart of the city, with super easy access to the 605 freeway which connects to the 405 San Diego. There is no need for room service when a pizzeria, sandwich shop, and a Mexican restaurant are less than ten minutes walking distance. The rooms are very clean, the beds are comfortable, wi-fi connection, HD tv with cable shows, and a free breakfast every morning with a very good selection of food choices. Their front desk agents are very friendly, and I did not experience any loud disturbances within the neighborhood. This is my new home away from home.
Room was clean, grossly. Bed was very comfortable. It was a good sensation to receive an upgrade and a gift bag. However, we found a dirty coffee maker in the room and had to spend about half an hour in cleaning it, since we did not want next guests to have the same experience. Not enough parking when hotel is completely booked.
"Clean Hotel, Friendly Staff, Great Breakfast"
They recently renovated the rooms and they are very nice. And the price for the room, free breakfast and amenities (pool & Hot tub) is super reasonable. However, the breakfast is very minimal and located in the lobby (just one of my pet peeves). However, there is everything from nails salons, massages, great restaurant and shopping within walking distance.
The Los Alamitos Best Western is extremely well maintained, very clean, and staff are very personable and friendly. This location is easily accessible to the freeway and many venues within the Long Beach area.
We chose this Inn based on the reviews. I think we obviously just had a one off experience because we did not enjoy your stay. My husband checked in and we started to drive toward the underpass where the person who previously reviewed this place stayed and made it clear it was noisy and dark. Yep, our room was in the cave. I walked back to the lobby to attempt to move rooms. She said they couldn't accommodate us. So we walked in the non-smoking cave...I mean, room. The smell of smoke was pretty strong. We decided to tough it out and at about 6am we started to hear the echo of the large diesel trucks starting up that were parked under the hotel, where our room was. Also, no wi-fi in the cave. The next day we attempted to move rooms again and they told us no. They put an ozone machine in our room but by then, everything we owned was saturated in the smell of smoke and the sheets were no different. They tried, the people that worked there were friendly but I can't recommend this place. I need some natural light, internet, and fresh air after our 3 days in the cave.
The room was updated and clean, however, it was very noisy. The room was located under covered parking and we heard every vehicle in the parking lot at all hours. The covered parking allowed very little natural light in the room. The room was also located at the stairs so we eveyone who walked up or down the stairs.
"Good Location with Tons of Amenities around the Area"
I stayed at this Best Western Inn during NYE weekend for an event in Long Beach and was pleasantly surprised. The appearance of the outside/parking didn't look like anything special, in fact it looked out dated, but as soon as I stepped in for check in the staff was friendly and the lobby was extremely clean. When I got into the room, it was even better; flat screen tv, comfortable bed, ac/heater, fridge/microwave and was it very spacious and clean. The location was near food, gas stations, and grocery stores and was in a safe neighborhood. Overall this is a good best western with very comfortable rooms and a friendly staff. Would stay at this location again if business or another event took place nearby.
Stayed at the Best Western Los Alamitos on a Sunday night for a short business trip. The hotel is about a 12 min drive from Long Beach Airport and was a convenient place to stay. The grounds are very well kept and there was ample parking for check-in and stay. The front desk staff was cheerful and friendly; they were very helpful in getting us into our room ahead of normal check-in time. Later in the afternoon, they were more than happy to print our boarding passes, even though I didn't see the lobby computer and printer hidden behind their Christmas tree. Our third floor room had an outside entrance; the elevator is accessed from the parking lot, instead of inside the lobby. The king-size bed was comfortable with an assortment of pillows. The wall mounted flatscreen TV was one of the largest I've seen in a hotel room and the HDMI port was accessible so I could hook my Amazon Firestick up to watch videos on demand. A central marble top unit beneath the flatscreen TV contained drawers on one side, and the refrigerator, microwave, and ice bucket on the other side. The good-sized desk was located near the front door and had a lamp with AC power and USB outlet in the base; convenient for charging devices without having to plug in a charger. Similar lamps were on each nightstand and there was a nice reading chair with footrest. Internet access was solid and fast. The sink area next to the closet was well stocked with towels and toiletries. The bathroom was on the small side, but was well stocked with towels and had a shower/tub. One odd thing we noticed was that the bathroom fan drew in cigarette smell from an adjacent smoking room. It was annoying, so we kept the bathroom fan off. The hotel offers a free breakfast in the morning and there are several restaurants, including a Sizzler across the street from the hotel, within a short walking distance. The Best Western Los Alamitos was good value for the price and we look forward to staying there again.
I needed accommodations near Long Beach Airport. This Best Western is close enough to the airport and allowed me the time needed to travel to appointments, as though I were closer to the airport. Great alternative to the higher priced accommodations in poorer areas close to the airport.
"Nice little tucked away place"
Rooms are pretty big, and the breakfast has a lot of variety for a little place. The hot tub is really hot. The pool is not really very big, but not a lot of people use it, so it's easy to have for one's self.
My room was very clean with new furniture and a flat screen t.v. which had cable and HBO. The refrigerator and microwave were a plus. I spent quite a bit of time at this hotel because it was very close to a hospital that my sister was in. A continental breakfast was available which consisted of bagels, pastries, muffins, eggs, sausage, and french toast. Juice and coffee was also available. There are many places to eat and shop nearby as well as grocery stores and pharmacies. The desk staff was very friendly and accommodating. I highly recommend this hotel for business or pleasure.
"Newly remodled - Nice hotel"
This was a nice place to stay, area seemed pretty good "not scary" if it's where you need to be. The rooms were clean, the beds were comfortable, good breakfast not the best but certainly not the worst, very satisfactory.
Everyone is very helpful, hotel is clean, the pool is excellent and everyone in the staff are very friendly, even the employees welcome you with a smile. I would recommend to my friend and yes I will be staying at this hotel every time I have a business trip to California.
Our stay at Best Western Los Alamitos Inn & Suites was clean and comfortable. They have a refreshed, modern look. The beds were comfortable and they had firm and soft pillows on each bed in our room, which helped us customize our sleep preferences. The staff we encountered were all very professional and helpful. This hotel is within walking distance to several food establishments, which is a nice bonus.
I was pleasantly surprised when I checked into my room at this location. The staff was very friendly and the room was VERY nice. I also liked that there was a store right next door to the motel and that it's also conveniently located to the freeway. A person by the name of Shannon helped me. I would stay here again.
"Stay for Long Beach Marathon"
We needed a place to stay and found this location, The person at the front desk was very accommodating and knowledgeable of the area. She provided easy directions to get us to the marathon for an early morning check-in, The location is also close to many restaurants providing many options for eating.
"Small gem in the city"
On;y stayed 2 days here. Convenient to drive to Disneyland, for a good price. Walked to Sizzler for dinner. Convenient to stay at when we visit relatives in the city. Stayed here before but I cannot remember if they had free breakfast. Fridge & microwave were convenient to have in the room. However, they should provide in room safe. Wifi was OK and free.
Thank you for your response. I am glad that you enjoyed your stay on that our location was convenient for you. If you are ever in the area we'd be more than happy to accommodate you again. Your business is appreciated.
"3 Star Hotel with 4 Star Service !!"
While attending an annual blues festival at Eldorado Park which is located nearby we stayed 4 nights at this hotel. The hotel was well located for our event and there are plenty of fine eating establishments within walking distance. There's a great taco restaurant across the street, a coffee shop called The Grind two blocks away and a wonderful seafood restaurant The Original Fish Market Grill a short drive away. Breakfast at the hotel is very good with a variety of menu items to choose. Only thing missing was the yogurt. In comparison to other hotels in the area the room rate was very affordable. This hotel's greatest feature is the service. Not once did maid service knock on the door and disturb us to see if the room needed cleaning. If we left the room, even if we just down the street for coffee, when we returned the room was cleaned. I definitely plan to stay there again when I next attend the New Blues Festival.
Thank you for such positive feedback Sir. We are pleased to hear that our location was convenient for you & that you enjoyed our property. Your business is greatly appreciated and we home that someday we can accommodate you again. Thank you!
This was a great find tucked away in a busy city area. It was close to everything we needed. It was clean and the staff was so professional and friendly. The person who checked us in was very helpful when we needed to find a place to eat. Their breakfast was very good. The breakfast room is small but I was able to eat there and later my husband brought his food back to the room. We'd stay here again on our next trip!
Thank you for your response. We are pleased to hear that you enjoyed your stay here with us. We'd be more than happy to accommodate you once again. Your feedback is greatly appreciated, as well as your business. Thank you!
Chose this hotel because of price and location and was really glad I did. The rooms were clean, the bed was comfy, the location was quiet, and every staff member was welcoming and friendly. I also like the room cold, and the a/c was terrific. The room had a microwave and mini-fridge which is always a plus for me when I travel. The only drawback to note is its location on a street that can be quite busy and can make it hard to turn into the entrance across the traffic - when the traffic is heavy, just plan to turn early and go around the block. Would definitely stay there again.
Thank you for such positive feedback. We are glad that you had an enjoyable stay. Your business is appreciated & we hope to see you again soon! Thank you.
I had to stay here for 2 nights for a work function. The bed was super comfortable, I felt safe,and it was nice and quiet. The whole property has been recently renovated and everything felt clean and new. There is a great taco restaurant right across the street that was perfect for dinner. It was a great experience.
Thank you for your feedback. We are pleased to hear that you enjoyed your stay and took notice of our newly remodeled rooms. Your business and feedback is greatly appreciated. | 2019-04-24T09:53:06Z | https://www.bestwestern.fr/en/hotel-Los-Alamitos-Best-Western-Los-Alamitos-Inn---Suites-5600 |
Here all of our resources are collected together. Find a resource based on a geography, issue, cultural practice, or impact by using the map and menus below.
Our working definition, principles, and framework for cultural organizing.
Arts & Democracy offers cultural organizing workshops and learning exchanges ranging from a one-hour conversation in the midst of a conference, to a weekend long workshop. Workshops are designed with local cosponsors to support ongoing local organizing.
Some of the most powerful change happens in the intersections of generations, cultures, sectors, and geographies. Collected here are stories about these intersections and the people who make them. They are strategic artists and creative organizers, activist anthropologists, poetic politicians, and loving family members. All are engaged in the deeply creative act of believing that something else is possible.
Arts & Democracy's ongoing collaboration with Service Employees International Union (SEIU) including artists residencies resulting in presentations at SEIU's 2012 convention in Denver, Colorado and culural organizing that supported the minimum wage campaign in Minnesota with SEIU Local 26 and young member leadership development in Detroit, Michigan with Healthcare Michigan.
Arts & Democracy was the co-organizer of the roundtable which stimulated the creation of NOCD-NY, a citywide alliance. NOCD-NY came together in response to the vision, sustained needs, and creative resilience of our communities. It recognizes the power of neighborhood-based arts and culture as an integral part of an equitable and culturally vital city. NOCD-NY is a frequent partner when Arts & Democracy works in NYC.
New York City is experiencing a new kind of democracy. Through Participatory Budgeting, residents are directly deciding how to spend public money. Community members are exchanging ideas, working together to turn ideas into project proposals, and voting to decide what proposals get funded. Arts & Democracy is involved throughout the process as a cultural resource.
It's an important step to state our beliefs in racial and cultural equity in these fraught times. It's a bigger one to change what we do to make those beliefs a reality. The webinar, cosponsored with NOCD-NY and PolicyLink illustrates community-based and public sector approaches to putting equity values into practice. It features Libertad O. Guerra, Loisaida Center; Kathy Hsieh, Seattle Office of Arts and Culture; and Keryl McCord, Equity Quotient.
This annual Brooklyn-based learning exchange, cosponsored with Naturally Occurring Cultural Districts NY (NOCD-NY), brought together organizers, artists, media makers, and policy makers to learn effective ways to deepen our work and engage our creativity in organizing for community change. The day included a cultural organizing framework, hands on skill building workshops, case studies, networking, and resources. It began at Littlefield, and afternoon breakouts took place at nearby Gowanus community organizations including Fifth Avenue Committee, Gowanus Neighborhood Convervancy, Interference Archive, and Theater Mitu.
Creative Placemaking from the Community Up brought together a national cohort of groups–Arts Foundation for Tucson and Southern Arizona, Naturally Occurring Cultural Districts NY, Arts & Democracy, LA Commons, Kentucky Cultural Organizing Alliance, and the Oakland Cultural Affairs Office– whose creative placemaking is grounded in communities. Project activities over the 22-month project included experiential learning through cross sector collaborations, peer exchanges and skill building workshops, participatory planning and cultural mapping, thematic convenings, and presentations at local and national conferences. The project also developed and disseminated toolkits, webinars, reflective essays, case studies, cultural plans, and other resources.
Adding arts throughout the participatory budgeting process can make it more fun, meaningful, and powerful. This brochure shares examples for incorporating arts as you brainstorm ideas, develop proposals, get out the vote, and fund winning projects.
On this free walk, we learned more about PB, visited projects that our community chose to invest in, & spoke with City Councilmember Brad Lander, who helped bring PB to NY.
This annual Brooklyn-based workshop, cosponsored with Naturally Occurring Cultural Districts NY (NOCD-NY), brought together organizers, artists, media makers, and policy makers to learn effective ways to deepen our work and engage our creativity in organizing for community change. The day included a cultural organizing framework, hands on skill building workshops, case studies, networking, and resources. The workshop took place at 540 President Street in Gowanus, Brooklyn, at Groundswell, Reel Works, and Spaceworks.
Cultural Organizing for Community Change took place in Gowanus, Brooklyn on Saturday, November 12, 2016 from 9:30am - 6:00pm. The day-long learning exchange included a cultural organizing framework, skill building workshops, a neighborhood tour, a visual arts installation, discussion of the NYC cultural plan, networking, and resource sharing.
Creative Housing Activism and Engagement focused on how artists and other creative activists are addressing the need for truly affordable housing and the impacts of displacement in our communities through creative alliances, cross sector partnerships, artmaking, and oral history. The call was coponsored with Naturally Occurrng Cultural Districts NY.
AddaArt project (Adda + Art) engaged Bangladeshi women and girls in oral history and artmaking in Kensington, Brooklyn. Led by Monica Jahan Bose, AddaArt included the sharing of stories, painting on saris, the creation and exhibition of kathas (quilts), a public performance, and a video.
The Social Media Workshop took place March 6. The first half, led by Carlos Pareja, was about shooting a video with your camera phone. In the second half, led by Daniel LaTorre, participants developed a social media strategy.
Following up on the powerful Building Connections gathering in West CLT with a story circle about the right to belong as part of the Peoples State of the Union. Hosted by Arts & Democracy, QC Family Tree, The Tribe, and Power Up NC with US Department of Arts and Culture.
Internet + Social Change, Building Culturally, Polically, and Technologically Connected Communities interactive workshop. National sponsors were Arts & Democracy and Media Democracy Fund. Local partners included Behailu Academy, PowerUp NC, QC Family Tree, and The Tribe. Special guests included Center for Media Justice, Color of Change, Coworker.org, and Media Mobilizing Project.
Cultural Organizing for Community Change took place Sunday, November 22 from 9:30-6pm in Gowanus Brooklyn. Organizers, artists, media makers, and policy makers came together to learn effective ways to deepen their work and engage their creativity in organizing.
• Build and strengthened relationships amongst participants.
With a focus on racial inclusion the KY Cultural Organizing Learning Exchange brought together artists, activists, advocates, & educators from across Kentucky at the Unitarian Universalist Church in Bowling Green on June 19, 2015. The Learning Exchange was presented by Arts & Democracy, Kentucky Foundation for Women and Alternate ROOTS.
This call featured: Envisioning Development by the Center for Urban Pedagogy (CUP); Making Waves by The Culture Group; and the People's Creative Toolkit/Herramientas Populares, Arts & Democracy's soon-to-launch collaboration with SEIU Local 26, Rogue Citizen, and Line Break Media.
Organizers, artists, media makers, educators, and policymakers came together to learn effective ways to deepen our work and engage our creativity in organizing for community change. The day included a cultural organizing framework, hands-on skill building workshops, case studies, resources, and networking opportunities.
Over thirty artists, activists, neighborhood leaders & youth from Charlotte gathered for a Cultural Organizing workshop, produced by Arts & Democracy in collaboration with the UNCC’s College of Art + Architecture and the Charlotte Action Research Project (CHARP).
The Animating PB with Arts & Culture workshop took place at the 2014 Participatory Budgeting Conference in Oakland, CA. It included a mini workshop with artist/planner James Rojas, presentations by Caron Atlas and Valter Ferreira, and group brainstorming about how arts, culture, and grassroots media can animate PB and other participatory proccesses.
This call featured presentations on creative projects leading up to the People's Climate March and beyond. It was cosponsored by the People's Climate March Arts Team.
In the face of growing economic inequity, people around the country are coming together to reimagine and rebuild their economies and communities based on the values of equity, democracy, cooperation, self-determination and sustainability. This New York City focused call featured the POINT, Solidarity NYC, Trade School, Our Goods, and The Rockefeller Foundation's support of the area of work. The call was cosponored by NOCD-NY.
Two dozen artists and activists from the New Orleans area gathered for the 4th annual Cultural Organizing workshop, produced by Arts & Democracy in collaboration with Junebug Productions.
In the face of growing economic inequity, people around the country are coming together to reimagine and rebuild their economies and communities based on the values of equity, democracy, cooperation, self-determination and sustainability. This nationally focused call highlighted examples from Jackson Mississippi, Eastern Kentucky, and from Native communities across the country.
Municipalities, arts councils, and community-based organizations around the country engage in cultural planning in order to better engage their communities, identify and build on resources, and integrate the arts and culture into larger community development strategies. This call featured presentations from two veterans of cultural planning: Barbara Schaffer Bacon, Co-Director, Animating Democracy, and Tom Borrup, Principal, Creative Community Builders.
Over 40 artists, organizers, activists and policy advocates from across Kentucky and beyond came together to participate in this day long workshop focused on Cultural Organizing for Social Change in Kentucky. While the group was quite diverse, they shared a belief in the power of art & culture to advance social justice for all Kentuckians. The purpose of the workshop was to connect individuals, organizations and resources to create and sustain cultural organizing as a statewide strategy.
This experiential mini-course investigated arts and culture, broadly defined, as a critical part of envisioning and building an equitable and sustainable Atlanta. Through site visits, tours, cultural events, and conversations with practitioners and policymakers representing multiple perspectives, we explored the intersection between arts and culture and participatory planning.
This call featured of panel of people with deep experience in rural engagement: Ben Strand, University of Wisconsin Foundation, former development director for Young Auditorium in Whitewater, WI; Maria De Leon; Executive Director of National Association of Latino Arts and Culture, and NEA Council member; Bob Gates, folklorist, formerly of KY and LA Arts Councils, and winner of a lifetime achievement prize from the American Folklife Society; and Frumie Selchen, Executive Director, Arts Alliance of Northern New Hampshire, and 2013 Governor's Award honoree for Arts Leadership. NOTE: the beginning of this call was dropped due to technical difficulties. The first speaker is Maria De Leon.
This call brought together Khmer Girls in Action (KGA), Save Ethnic Studies / Xican@ Institute for Teaching & Organizing, and Project HIP-HOP (Highways Into the Past, History, Organizing, and Power), all supporting liberatory educational practices through engagement with culture and the arts. They explored the possibilities and challenges of practicing — and fighting for — culturally relevant, creative, liberating education.
Judi Jennings, Kentucky Foundation for Women and Savannah Barrett, Art of the Rural discuss Feminist Art: Advancing Social Change in Rural Kentucky, an innovative digital mapping project documenting the powerful and transformative work taking place across rural Kentucky.
Congratulations! We, leaders from across sectors, write to share how arts and culture can and should play a vital role in achieving the inspirational One City Rising platform.
This policy brief by Arts & Democracy, Groundswell, and Naturally Occurring Cultural Districts New York (NOCD-NY) recommends maximizing the role of arts and culture to advance a transition agenda for a just and equitable New York City. Art and culture can provide the inspiration, tools, and capacity needed to unify New York City into one city for all.
Cultural Organizing for Community Change provided a space where artists, media makers, organizers and policy makers could learn effective ways to deepen their work and strengthen their capacity to connect creativity, culture, and organizing for community change.
On September 19 and 20, 2013 Arts & Democracy Project offered a two-part Cultural Organizing for Social Justice workshop for member / leaders at the SEIU Healthcare PA Leadership Assembly in Lancaster, PA. The first part of the workshop introduced participants to "cultural organizing" and various examples of how people use art and culture for social change. The second part of the workshop was a hands-on art making workshop led Eli Weaver, a Lancaster-based visual artist, musician, farmer and organizer. During the workshop participants designed and made posters, puppets and a large banner to use in future actions for healthcare justice.
"Valuing the intersection between arts, culture, and community: An exchange of research and practice" brought together Naturally Occurring Cultural Districts NY (NOCD-NY) members and allies with leading researchers to demonstrate the value of arts and culture in communities and for the city. Arts & Democracy joined with NOCD-NY to organize this convening.
Arts & Democracy Project was proud to partner with the AFL-CIO to integrate arts and culture into their 2013 International Convention. We hosted a two hour "Action Session" workshop for delegates to learn the basics of cultural organizing then apply them to creating art for a march later in the day. Nationally recognized Los Angeles artist Ramiro Gomez led the workshop. Gomez creates representative cut-outs primarily of domestic workers and places them in the affluent environments that employee such workers in real life. He led participants through a process of creating their own cut-outs, which were later placed throughout downtown Los Angeles in a convention-wide action.
What Would it Look Like if NYC invested $50 Million in its Communities?
New York City’s recent capital investment of $50 million dollars in the Culture Shed mega project begs the question – how would a $50 million dollar capital investment in the culture and wellbeing of New York City’s diverse neighborhoods look?
This article by Jon Spayde in Public Art Review 48 (Spring/Summer 2013) "The Art of Healing" describes how artists have been helping communities heal after recent disasters. It features features the Park Slope Armory Evacuation Center Wellness Center, Sandy Storyline, and other examples that were part of Arts & Democracy Projects "Relief and Recovery, the Transformative Power of Arts and Culture" briefing call post Hurricane Sandy.
What's a progressive agenda for arts and culture in New York City? Caron Atlas offers her answer to this question in her contribution to Toward A 21st Century City for All, which offers an inclusive vision for city policy to help achieve a more just, equal and prosperous New York City.
As Working Films says, "we know that stories lead to action." From Media to Action: Creative Engagement and Organizing Strategies featured: Fruitvale Station, Herman's House, Land of Opportunity, and 13 in the Hole. The newsletter includes additional strategies for creative community engagement and campaigns for social change that move people to action.
Creative Recovery and Cultural Resiliency is an article by Caron Atlas in the Summer 2013 Grantmakers in the Arts Reader about the ways arts and culture played an integral role in relief and recovery after Hurricane Sandy in New York City. The article features the Wellness Center at the Park Slope Armory Evacuation Shelter, the work of Dance Theatre Etcetera in Red Hook, Brooklyn, the Sandy Storyline, and a summary of a conversation between New York and New Orleans cultural leaders about cultural work following disaster.
Emotions conveyed and evoked by art and culture can open hearts and minds, heal and transform, build community across difference, and promote peace, equality and justice, advancing positive social change. In Forced to Flee, we heard from refugee artists, artists forced into exile, cultural organizers and their allies, as they spoke about how they are using the power of art and culture to amplify the voices and visions of those forced to flee their countries of origin.
Naturally Occurring Cultural Districts New York's From the Nieghborhood Up Citywide Forum on Culture and Community convened people from across New York City on May 30, 2013 to create a vision for the City grounded in the cultural vitality and social networks that make its communities strong.
Cultural Organizing for Community Change (Frankfort, KY) provided a space where artists, activists, cultural workers, organizers and educators from across Kentucky came together to strengthen their relationships, and deepen their capacity to use the tools of creativity, imagination, and culture for social justice organizing. This participatory workshop featured case studies, tools, strategies, networking and relationship building.
This experiential mini-course for Pratt Institute's Programs for Sustainable Planning and Development investigated arts and culture, broadly defined, as a critical part of envisioning and building an equitable and sustainable Chicago. Through site visits, tours, and conversations with practitioners and policymakers we explored the intersection between arts, culture, media and participatory planning.
This blog is the introduction to a longer essay inspired by the Network of Ensemble Theater's Appalachian MicroFest. I learned in Appalachia what it looks like when culture, place, identity, and community come together in the struggle for social justice. I witnessed how mountaintop removal causes great pain, and experienced music as an integral part of organizing. I became aware of the long record of misrepresentation of Appalachian people and their history by the media and how this misrepresentation has been used to justify the exploitation of the region’s resources.
Cultural practice and artistic expression breathe life into communities.They create opportunities for individuals and institutions to transform their sense of self and relationships with one another, and share their local traditions and ways of being.
This conference call looks at the power of place-based culture to create community narratives, advance racial and economic equity, promote participatory democracy, and foster self-determination and inclusion in rural communities. We will hear from five presenters about culturally-based work in a diverse range of contexts addressing themes that include traditional practice, opportunities for young people as emerging leaders, cultural economies, ecological and cultural stewardship and cross-sector partnerships.
This workshop provided a space where artists, activists and organizers learned effective ways to deepen their work and increase their impact by activating the tools of creativity and imagination. By using a combination of local and national resources, the workshops also promoted networking and collaboration.
We hear a lot about creative placemaking these days. Some like the term and others don't. On this conference call, presenters discussed what sorts of creative placemaking practices strengthen self-determination and belonging within a community. The call illustrated the power of place-based arts and culture as an integral part of equitable, democratic, and culturally vital communities and explored placemaking in the digital sphere.
Asian Americans United Executive Director, Ellen Somekawa, writes about cultural organizing in Philadelphia’s Chinatown. She effectively communicates the life of a Chinatown resident, stressing the importance of valuing local cultures with a unified message and a sense of humor via the arts.
We know the power of arts and culture to heal and transform, connect people and build community. In the wake of Hurricane Sandy, artists and cultural organizers stepped up to use their creativity to rebuild the city and rebuild community. They are helping people tell their stories and sing together, offering cultural and wellness activities in evacuation shelters, organizing benefits, and providing leadership to recovery efforts. They've helped to restore dignity, build community, make connections, and heal.
Arts & Democray Project director Caron Atlas describes how people came together to create a Wellness Center at the Park Slope Armory evacuation center following Hurricane Sandy and experienced the power of arts and culture to restore respect and dignity in a disaster.
This call highlighted the great work that is happening in civic participation, arts and culture. It addressed elections as well as the ongoing work to strengthen our democracy. The call featured presenters from across the country who are working to protect voting rights and make sure that those who have been historically disconnected from decisionmaking have opportunities to participate.
Caron Atlas reflects on democracy in the thick of the election season and the anniversaries of 9/11 and Occupy Wall Street.
This essay by Roberto Bedoya raises thoughtful questions about the increasingly popular practice of Creative Placmaking and we have reposted it here with the hopes of stimulating dialogue. Writes Bedoya, "I embrace Creative Placemaking and its aspiration as is manifests in a variety of methods —from city planning to art practices with a goal of advancing humanity. But I am bothered by what I consider a significant blind spot – a blind love of sorts – in the Creative Placemaking discourse and practices. I am referring to a lack of awareness about the politics of belonging and dis-belonging that operate in civil society.The essay was originally posted on Arts in a Changing America.
Cultural Organizing for Community Change provided a space where artists, media makers, organizers and policy makers could learn effective ways to deepen their work and strengthen their capacity to use the tools of creativity, imagination and organizing for community change. The workshop included cultural organizing framework, skill building workshops, networking opportunities, and an intergenerational conversation with cultural organizers.
Arts, culture, and media were integrated into Participatory Budgeting in New York City (PBNYC) in its 2011-2012 inaugural year. This list of creative resources, compiled by Arts & Democracy Project with the Arts and Culture Committee of the PBNYC Citywide Steering Committee, is intended as an inspiration for year 2.
On August 15 Arts & Democracy Project joined Naturally Occurring Cultural Districts NY (NOCD-NY) and Urban Bush Women to cosponsor Spacing Out: Innovative Cultural Uses of Urban Space. The forum took place at the South Oxford Space, 138 S. Oxford, in Fort Greene, Brooklyn.
Cultural organizing is a core practice of the Arts & Democracy Project that exists at the intersection of arts, culture and activism. Cultural organizing integrates arts and culture into organizing strategies. It is also about organizing from a particular tradition, cultural identity, and community of place or worldview to advance social and economic justice. This call will focus on four different approaches to to this practice.
Center for Media Justice Executive Director Malkia Cyril recently wrote a piece for Organizing Upgrade on communications strategies for building a national narrative for progressive social change. She argues for a comprehensive strategy for progressive social change that impacts both heart and mind. We've reposted the Blog here.
Arts & Democracy co-hosted a book party to celebrate the publication of "Helen Matthews Lewis, Living Social Justice in Appalachia." The Brooklyn event featured Helen in a rare New York City appearence along with book co-editor Judi Jennings and special guest Marie Cirillo. The presentation shared Helen's lifelong commitment to activism and included her writings on environmental justice, moral economy, global solidarity, and powerful women taking a stand.
The convention felt like a family reunion, with members addressing one another as “Sister” or “Brother,” and receiving warm greetings and rousing affirmations from SEIU president Mary Kay Henry. The Colorado Convention Center had become the largest organizing hub I have ever seen; think of a kitchen or a black church and then magnify times 10,000!
Arts & Democracy Project and SEIU (Service Employees International Union) are partnering on artist residencies in six SEIU locals in Miami, Florida; Central CA; Las Vegas, NV; Minneapolis, MN; Toronto, ON; San Juan, Puerto Rico. Each of the residencies will create an artwork to be presented at the SEIU convention in Denver in May 2012.
We are at the Service Employees International Union convention in Denver and are thrilled to see the results of the artists residencies that we cosponsored with the union. Here's a preview of the artwork and performances from locals in Florida; California; Minnesota; Ontario, Canada; and Puerto Rico.
Arts & Democracy is a proud member of the NOCD-NY coalition whose members testified at a joint hearing of the NYC City Council's Arts and Small Business committees. As a result of NOCD-NY's organizing and presence at the May 11 hearing much of it focused on naturally occurring cultural districts. We presented a series of recommendations for how the city could support NOCDs and neighborhood based cultural economies and illustrated the recommendations though our member's testimony.
Arts & Democracy Project and ArtHome (Brooklyn, NY) recently hosted a FREE: Artist Homeownership Workshop, which created a working dialogue for participants who were looking to purchase a home. The event took place at Groundswell Community Mural Project, where there were student paintings still drying on the walls and was further made possible by the co-sponsorship of City Council Members Brad Lander and Steve Levin and the Brooklyn Arts Council.
This experiential course, created for Pratt Institute's Programs for Sustainable Planning and Development investigated arts and culture, broadly defined, as a critical part of envisioning and building an equitable and sustainable Los Angeles. Through site visits, tours, cultural events, and conversations with practitioners and policymakers representing multiple perspectives, we explored the intersection between arts and culture and participatory planning.
Animating Democracy Has a New Web Site!
Animating Democracy's new web site is inspirational, informative, and promotes and connects arts and culture as potent contributors to community, civic, and social change. Animating Democracy co-director Pam Korza takes us on a tour of this great new resource.
What does your neighborhood need? An improved park? Safer streets? A community cultural space? After six months of participatory budgeting in New York the polls are opening and its time to vote!
The conference call focused on creative engagement through civic dialogue, cultural asset mapping, and participatory budgeting.
We’re so happy to have this attractive new online home. We think this site is better able to explain our work, share resources, and highlight some of the exciting work our partners and allies are doing in the field.
Arts & Democracy has jumped into the new year with a workshop in New Orleans, a new collaboration with Service Workers Union International, collaborations in New York City, and a national briefing call about environmental justice.
On March 6, Super Tuesday at 8:14 am an unemployment line with thousands of people holding pink slips over their heads will stretch through Manhattan from the Wall Street bull to Union Square. Join this powerful collaboration between artists and labor.
This weekend-long workshop in New Orleans provided a space where artists and organizers learned effective ways to deepen their work and strengthened their capacity to use creativity, imagination and organizing in community building.
Artismyoccupation.org (AMO) offers direct support to artists and cultural workers dedicated to advancing the stories, struggles and ideas of the 99%. Got an idea for a project? Apply for a grant! The artists’ support program is now online and ready to receive your applications.
This conference call focused on how people and organizations across the country are bringing the power of arts and culture to bear on the environmental devastation that is disproportionately affecting poor communities and communities of color.
This paper explores the power of cultural organizing with examples of groups and individuals placing art and culture at the center of organizing strategies: organizing from a particular cultural identity, community of place, or worldview. It highlights the work of Third World Majority, Raices, M.U.G.A.B.E.E. and Ricardo Levins Morales.
When the Arts & Democracy Project began in 2005, we spoke with artists and activists from across the country who are exemplars at connecting arts, culture, media, and civic participation. We wanted to know more about the work they did. What made it succeed? What challenges did they face? What did they need to increase the impact of their work? We commissioned a series of profiles to document these conversations; some were updated in 2011-2012. "Insights from Arts and Civic Engagement: 13 Profiles" an essay by Lena Richardson, identifies key themes and insights.
Jeremy Liu and Gayle Isa talk about the spaces ‘in between’.
This conference call focused on how arts, culture and creative actions are being used as part of the 99% movement across the country.
Dee Davis and Michelle Miller discuss the art of strategic communications.
Alaka Wali and R. Lena Richardson on drumming circles, sustainable conservation, and valuing difference.
A conversation about the powerfully transformative and at times, painfully fragmented practice of philanthropy.
Arts & Democracy Project held a day-long cultural organizing workshop for women activist artists at the Kentucky Foundation for Women's Hopscotch House retreat just outside of Louisville.
At the recent Policy Link Conference in Detroit, at a session called “Holding Ground,” presenters spoke about maintaining equity in a time of cutbacks. At the end of the session, one of the younger audience members asked where in all this talk of holding ground were the progressive ideas, the vision for the future. His question significantly shifted the room.
Isao Fujimoto and Tim Marema on the power of ‘edgewalking’.
We stand on the shoulders of those who came before us. We have a responsibility to those who will come after us.
These simple yet powerful concepts have been echoing in my head the past few days in New Mexico where I participated in a roundtable discussion held at the Institute of American Indian Arts sponsored by the Open Society Foundations, First People’s Fund, and Arts & Democracy Project. The people I met and the stories I heard reinforced the power of the arts – and more importantly culture – in transforming our communities.
Report from a day-long meeting in New York involving musicians, artists, filmmakers, photographers, theater groups, festival producers, chefs and others working to raise public awareness about the threat of climate change and the promise of clean energy. Sponsored by the Chorus Foundation, the gathering was organized and facilitated by Farhad Ebrahimi, Betsy Taylor, Cuong Hoang, and Lauren Nutter. Arts & Democracy presented on arts and social justice organizing.
Maribel Alvarez and Jason Bulluck on paying attention to the ‘little stuff', engaging in critical discourse, and understanding how power can be shaken up.
Building Collaborative Capacity is a series of workshops, gatherings, and partnerships that help build the connective tissue necessary to deepen collaborative work so it can be truly effective.
Harriet Barlow and Kathy Engel talk about the Commons and crossing borders.
This report by Holly Sidford for the National Committee for Responsive Philanthropy (NCRP) describes how the distribution of arts grantmaking does not reflect the country's evolving cultural landscape and changing demographics, and considers how to address this inbalance.
The summary findings for a series of roundtable discussions convened in several cities across the United States between 2009 and 2011 to better understand the growth of “naturally occurring cultural districts”—grassroots, culturally based efforts that are bringing about significant changes within a variety of communities—and to learn from their successes and challenges.
On August 18, 2010 NOCD-NY, the Naturally Occurring Cultural District Working Group joined with cultural and community leaders and elected officials to launch a citywide alliance to revitalize New York City from the neighborhood up. Arts & Democracy is proud to be part of this coalition.
Arts & Democracy Project hosted a People's Potluck in Brooklyn. The potluck was part of a series of artist-led conversations and meals focused on interdependence taking place in the summer of 2011 created by MAPP International Productions in collaboration with Samita Sinha and Create Collective.
In June and July I was fortunate to attend ROOTS Fest National Learning Exchange in West Baltimore, the Rural Cultural Roundtable in St Paul, and the freeDimensional retreat on Wasan Island in Canada. While diverse in focus, the three events were all grounded in the power of place, culture and creative agency. Collectively they made me reflect on how we can take active roles in creating communities that reflect our values.
This conference call focused on the 10 Year Anniversary of 9/11 and the programs, cultural convenings and artwork that have helped to heal, facilitate dialogue, build community and move us forward.
This conference call focused on the power of radio in fostering art, culture and community. It provided informattion about an exciting upcoming opportunity for community groups to start their own radio stations.
This session at the 2011 National Rural Assembly in St Paul, MN was a conversation about cultural organizing and collaborating across sectors and the role these approaches play in rural development and social change. Participants shared their own experiences and best practices, and reflected on the recommendations from the Rural Cultural Roundtable that proceeded the Rural Assembly.
This nation-wide conference call was focused on the role of the arts, culture and media in economic justice organizing and movement building in communities across the U.S.
Two separate, yet related–events made me think about music and memory, and the healing properties they offer together.
February 2011 was the busiest month of my life. I participated in a revolution that toppled a corrupt regime after 30 years of dictatorship.
Focusing on events in Egypt and the extraordinary pro-democracy movements sweeping across North Africa and the Middle East, this conference call highlights how artists, art spaces and cultural organizers in the region and in the U.S. are participating and responding, and how more cultural workers can engage in positive ways.
A report and reflection on the Community Organizing for Cultural Recovery workshop held in New Orleans February 18-20, at the McKenna Museum for African American Art. Its goal was to strengthen capacity to use the tools of creativity, imagination, and organizing in community building.
Looking back on 2010, I am inspired by the grace and power of the imagination in the midst of challenging times.
This conference call focuses on the arts and equitable development work that is being conducted in Brooklyn, NY; Harlan County, KY; Skid Row, Los Angeles; and beyond.
When I first met Grace Lee Boggs in 2003 she transformed me, along with everyone else. Boggs embodies the US Social Forum concept of "another world is possible, another U.S. is necessary," and she celebrated her 95 birthday at the Detroit Social Forum in 2010, looking to the future.
This newsletter offers nonpartisan resources, opportunities, and events that join creativity and civic participation - during the election cycle - and beyond.
From July 10-15 the Creative Resistance retreat brought together leaders from human rights sector, arts networks, and organizations focused on the mobility of culture workers. Sponsored by freeDimensional and hosted at the Breuninger Foundation's Wasan Island center near Toronto, Canada, the retreat provided space for a critical dialogue on the role of arts networks in strengthening the social justice movement globally.
This rural panel, cosponsored with the Center for Rural Strategies, took place as part of Double Edge Theater's Art and Place Gathering held in Ashfield, MA, August 8, 2010.
Cross-posted from his e-newsletter, reflections from artist Ricardo Levins Morales on his time at the U.S. Social Forum.
On June 22-26, 2010 the 2nd US Social Forum took place in Detroit, MI, and brought together thousands of people from around the country (and beyond) to participate in a movement-building process that distinguishes itself by focusing on creating space "to come up with peoples' solutions to the economic and ecological crisis" we face in the world today.
As ongoing immigration battles are waged in our own backyards, this resource newsletter shares information and cultural organizing resources that are related to migrant and immigrant justice.
Modeled after the World Social Forum process that began in Porto Alegre Brazil in 2005, the US Social Forum is grounded in a belief that social, political and economic transformation are not only possible but necessary, and that they must be embodied by a "multi-racial, multi-sectoral, inter-generational, diverse, internationalist movement." Arts & Democracy Project sponsored two workshops at the Social Forum in Detroit in July, 2010, and with several colleagues organized a Creatvity Lab.
A free and open Internet has become a necessity, not a luxury, for all aspects of art and democracy. As laws tighten and access is further limited, this newsletter offers resources that assist in understanding issues and offer opportunities to take action.
This experiential mini-course, offered to Pratt Institute urban planning graduate students, investigated arts and culture, broadly defined, as a critical part of envisioning and rebuilding an equitable and sustainable New Orleans. Through site visits, tours, cultural events, and conversations with practitioners and policymakers representing multiple perspectives, the class explored the intersection between arts and culture and participatory planning.
Bringing together a wide range of networks and groups--including Alternate ROOTS, Animating Democracy, Art is Change, Arts & Democracy Project, Arts & Social Justice Working Group, California Alliance of Traditional Arts and Cultures, First Peoples Fund, Grantmakers in Film and Electronic Media, Grantmakers in the Arts, League of Young Voters, MAG-Net, National Association of Latino Arts and Culture, National Performance Network, Opportunity Agenda, and many more--in Brooklyn, NY, October 2009.
On May 12th, 2009, more than 60 artists and creative organizers engaged in civic participation, community development, education, social justice activism, and philanthropy came together for a White House briefing. It was cosponsored by Arts & Democracy Project, Nathan Cummings Foundation, Pratt Center for Community Development, and Arlene Goldbard. This is the report from that briefing.
In April of 2009, 27 participants from the arts, community development, education and other diverse sectors around the country met at California State Monterey Bay as part of the Community Arts Convening and Research Project to discuss “Cross-Sector Partnership and the Role of the Arts in Policy and Systems Change.” This is the report from that session.
The Arts & Democracy Project joined with the Nathan Cummings Foundation to organize a convening of the Foundation's grassroots arts activist grantees and their allies November 19-21, 2008. The convening connected people from across the country to discuss the opportunities, challenges, and exemplary practices of linking arts and activism. This is the summary report from the convening.
In this strategic conversation, cosponsored with the League of Young Voters, Hip Hop artists, presenters, and activists shared their plans for 2008 and how they might collaborate in their work.
This gathering took place as part of the Highlander Center’s 75th Anniversary and followed a one-day institute on cultural organizing that was also part of the celebration. The goal of Highlander was and is to provide education and support to poor and working people fighting economic injustice, poverty, prejudice, and environmental destruction. Presenters at the gathering included: co-facilitators Anasa Trautman, Highlander Center; Caron Atlas and Javiera Benavente, Arts & Democracy Project; Amelia Kirby, Appalshop; Carlton Turner, Alternate Roots; Michelle Miller, SEIU; Mathew Jones, SNCC Freedom Singers; and Baldemar Velazquez, Farm Labor Organizer Committee.
This was a small 1.5 day-long strategic national gathering of cultural organizers cosponsored by the Main Street Project /Raices, Center for Rural Strategies, and the Humboldt Area Foundation in Klamath, CA, April 2007. Also participating were Alternate Roots, Appalshop, Central Valley Partnership for Citizenship, Llano Grande Center, Feral Arts, United Indian Health Services, and Northland Poster Collective.
At the 2005 Grantmakers in the Arts conference a group of activist artists, community organizers and funders began a conversation about the purposeful intersection of art and activism. That session stimulated follow-up e-mail exchanges and writing among the conference participants and a few others. The resulting discussion is reflected in this article, published in the Summer 2006 GIA Reader. Our intention was to make cultural organizing visible by sharing its principles, demonstrating its rigor and creativity, and illustrating its diverse methodologies.
Report on Latino Culture and Traditional Arts in Tennessee by Norma E. Cantú, Ph.D.
Tennessee Arts Commission hired Norma E. Cantú, Ph.D., to carry out a fact finding mission in West, Middle and East Tennessee to meet with representative members of Latino communities and learn about Latino culture and traditional arts in the state. This is the report that resulted from this inquiry.
Since 1972, the Arab Community Center for Economic and Social Services (ACCESS) has supported community building and empowerment for the Arab-American community in Dearborn, Michigan. In May 2005, ACCESS opened the first-ever Arab American National Museum devoted solely to Arab-American history and art, in order to exemplify that art nourishes the spirit and helps to build relationships.
All-Ages Movement Project (AMP) is a member-driven network of community based organizations that connect young people through independent music and art. Founder of AMP, Shannon Stewart speaks of the importance and benefit of fostering democratic culture and leadership through youth-run music and cultural spaces.
Appalshop is a multi-disciplinary arts/education center in the heart of Appalachia that produces original films, video, theater, music and spoken-word recordings, radio, photography, multimedia, and books and provides the tools for documenting local stories. It encourages the questioning of media as an information source while building media literacy.
The Future of Music Coalition (FMC) gathers knowledge, translates and educates in the fields of music, technology, public policy, and law to promote public understanding and discussion about freedom of speech, control of music production and distribution, and public ownership of the airwaves and bandwidth.
The Hip Hop Congress (HHC) is a 501(c)(3) nonprofit organization that uses powerful potential of hip-hop culture to foster social action, civic service, and cultural creativity among young people. HHC works to develop organizing skills and civic engagement among community members, with a human rights and social justice movement building focus.
The Los Angeles Poverty Department, founded in 1985 and rooted in Los Angeles' Skid Row neighborhood, intends to "create performance work that connects lived experience to the social forces that shape the lives and communities of people living in poverty." These performances raise consciousness about social and political issues, while also creating opportunities for people to intervene in policy decisions that affect their lives.
The League of Young Voters is a national organization that supports young people in developing the power to solve problems facing their communities. They work with those "who have been shut out of the political process to make politics fun, engaging, relevant, and meaningful."
Marty Pottenger is a critically acclaimed writer, director, and performer with more than 20 years of experience in creating and directing community-based arts initiatives. She uses art to "reveal the underlying connection between people, and activate people's inherent desire and momentum for justice and equity."
Based in Portland, Oregon, Sojourn Theatre creates community-engaged theatrical productions that have explored a broad array of social issues, ranging from the Oregon school system (Witness Our Schools), the future of Portland as a city (One Day), and the meaning and impact of going to war (The War Project).
Throughout its 23-year history, the Urban Bush Women performance ensemble has spoken of the power of the spiritual tradtions of African American and the African Diaspora community through dance, music and storytelling.
Founded in 2003, We Got Issues! (WGI!) is a women-led movement and performance project which focuses on young women's leadership through the the power of creative expression. WGI! is committed to creating a safe and supportive space for all women across race, class, gender, and socio-political lines.
In my work as a curator, I was excited that 200 people could sit in a dark room, see a film, be moved, and ask, "what can we do?"...So then, Judith Helfand and I began to think about an organization that could deliberately connect the non-fiction stories of struggles with ground-level activists and organizers. -- Robert West.
Paul Chin and Vanessa Whang talk about animating a Latin American idea in the U.S..
Littleglobe and SouthWest Organizing Project talk about finding a relationship between community-engaged arts and organizing.
The second Bridge Conversation between Littleglobe and SouthWest Organizing Project about their ongoing collaboration.
Carol Fennelly and Ayo Ngozi on artmaking with fathers and children in federal and state prisons.
Adam Huttler and Ruby Lerner on entrepreneurial arts service organizations.
Ken Wilson and Caron Atlas talk about cultural context and creative philanthropy.
Paula Allen and R. Lena Richardson talk about traditional arts and culture as resources for Native community health.
Ron Shiffman and Anusha Venkataraman consider the intersections of organizing, creative practice, and community-based development.
A discussion about whether art can be as powerful a vehicle for change as it can be a bastion for maintaining the status quo.
Francisco Guajardo and Edyael Casaperalta on intentionality, consciousness, and creating new opportunities.
Tufara Waller Muhammad and Javiera Benavente talk about arts and culture in Southern organizing and the danger of spotlighting individuals.
Mark Ritchie and Caron Atlas talk about balancing work and life.
Ismael Ahmed and Anan Ameri discuss the extraordinary model of the Arab Community Center for Economic and Social Services (ACCESS).
Tia Oros Peters and Vanessa Whang talk about maintaining your vision and integrity in rooms of power.
Brad Lander and Esther Robinson discuss organizing and art, anthropological listening, and whether being holistic is important.
freeDimensional talks with the Belarus Free Theatre.
Who Will Carry the Work Forward?
An intergenerational conversation at the State of the Nation festival and a tribute to Nayo Watkins.
The Art of Regional Change (ARC) brings together scholars, students, artists, and community groups to collaborate on media arts projects that strengthen communities, generate engaged scholarship, and inform regional decision making. Founded by media artist jesikah maria ross, ARC is a joint project of the University of California at Davis Humanities Institute and the UC Davis Center for Regional Change.
A Youth Voices Curriculum Resource and Guidebook developed to help other communities engage in similar projects is planned for spring 2012.
The Center for Urban Pedagogy (CUP) Making Policy Public series of foldout posters uses graphic design to explore and explain public policy. Each poster is the result of collaboration between a designer, an advocate, and CUP. To date, CUP has produced eight posters/instructional pamphlets on issues ranging from affordable housing to the rights of domestic workers.
Operation Paydirt/Fundred Dollar Bill Project (Paydirt/Fundred) is a multidisciplinary, artist-driven project addressing the national crisis of lead-contaminated soil. With the self-expression of the young people most affected by lead contamination, these projects propose a solution that incorporates demonstrated scientific procedure. The approach extends across disciplines of art, science, and education and is sensitive to aspects of community development and urban infrastructure.
Not in Our Town (NIOT) is a national organization that creates films and video, and facilitates convenings to help communities working together to stop hate through creative anti-bias programs and responses. Anchored by a social networking website, NIOT documents and shares initiatives, helps link individuals and groups, and provides guidance for positive intergroup responses to hateful actions. Aired on PBS stations on September 21, 2011 (http://www.niot.org/lightinthedarkness), and screened at venues around the country, Light in the Darkness is the latest in a series of films produced by the Working Group of NIOT. In addition to their documentary work, NIOT has produced over 45 videos (http://www.niot.org/videos).
The Llano Grande Center for Research and Development’s vision is to inspire a youth culture that aspires to attend college and engage in community change. Beginning informally in the early 1990s with activities intended to show Edcouch-Elsa High School students in Texas that college was both possible and necessary for them, the Llano Grande Center was formalized in 1997 as a program of the Edcouch-Elsa Independent School District (EEISD). The center has trained students, educators, and community development agents locally, nationally, and internationally on how to distinguish, tell, and use their story to achieve community change.
Sojourn Theatre is an ensemble of ten core artists creating new performances in Portland, Oregon, and around the country. Their innovative work shares a goal of bringing together strangers to collectively experience and strategize in arts-based civic dialogue projects. Sojourn’s members are nationally recognized for their innovation as artists and engagement practitioners, and the company’s work is featured regularly at conferences and universities nationwide as a "best practice model" for arts-based civic dialogue projects.
Scribe Video Center came into being in December 1982. It was founded by Louis Massiah as a place where individuals and communities could learn media making and explore the use of video as both an artistic medium and a tool for progressive social change. The center has grown in size from a small rented workshop space to an internationally recognized media arts education center in a 4,000-square-foot loft that has helped thousands of people and over 150 community groups document their passions and concerns in some 200 videos produced with the center’s support.
Our upcoming cultural organizing workshop in Brooklyn will take place Nov 22. We will post the developing agenda for the workshop soon. | 2019-04-26T11:06:44Z | http://www.artsanddemocracy.org/resources/?catID=11 |
Held, increase in seating capacity of petitioner's theatre consummated in 1942 was a change in capacity within the meaning of section 722 (b) (4), I. R. C., as a result of a course of action to which petitioner was committed prior to January 1, 1940. Constructive average base period net income determined.
Stanley Suydam, Esq., and Jack B. Darragh, Esq., for the petitioner.
Arthur N. Mindling, Esq., for the respondent.
Petitioner filed applications, under section 722, Internal Revenue Code, for excess profits tax relief for the calendar years 1943, 1944, and 1945. Respondent completely denied those applications. The question is whether petitioner is entitled to such relief by reason of an alleged change in the capacity for production or operation of its business consummated during a taxable year ending after December 31, 1939, with the meaning of section 722 (b) (4).
The stipulation of facts filed by the parties, and the exhibits annexed thereto, are hereby incorporated into these findings, and the facts therein are found as stipulated.
Petitioner is a corporation organized under the laws of the State of Arizona in 1932, and has its principal place of business at Phoenix, Arizona. For the years in issue, 1943, 1944, and 1945, petitioner executed its Federal tax returns for calendar year periods and on an accrual basis, and filed those returns with the collector of internal revenue for the district of Arizona. Petitioner's excess profits tax liability for those years, without benefit of section 722 of the Internal Revenue Code, was $26,370.58, $28,582.42, and $23,181.88, respectively.
On or about October 7, 1946, applications for relief from excess profits taxes, with supporting data, were filed by petitioner under section 722 of the Internal Revenue Code for the calendar years 1943, 1944, and 1945. Claim was made therein of a constructive average base period net income of $21,902.71, applicable to each of the years in issue. On or about December 27, 1949, respondent denied these applications in full for each of the years involved.
The taxpayer was incorporated under the laws of the State of Arizona on December 31, 1932. The taxpayer is engaged in the theatre business and operates the Studio Theatre in Phoenix, Arizona.
During 1942 the taxpayer increased the size and capacity of its theatre as a result of a course of action entered into prior to December 31, 1939. The capacity of such theatre was increased from 337 to 525 seats.
During 1938, the taxpayer started to sell candy and/or popcorn in its theatre.
The foregoing printed forms, on which petitioner's claims for excess profits tax relief were filed, required certain questions to be answered. To the question "Was change in capacity for production or operation of business consummated during a taxable year ending after December 31, 1939, as a result of a course of action to which taxpayer was committed prior to January 1, 1940?", petitioner answered "Yes." The question, "Did the business reach, by the end of the base period, the earning level it would have reached if the business had been commenced, or if the change in the character of the business had occurred, 2 years prior to the time the commencement or change occurred?", was left unanswered by petitioner, and in its claims for excess profits tax relief it provided no particulars as to that question.
After applying the growth formula in section 713 (f) of the Internal Revenue Code, petitioner's average base period net income, without benefit of section 722 of the Internal Revenue Code, was $4,422.17 with respect to each of the years in issue, and the resulting excess profits credit was $4,201.06 for each of these years.
Petitioner's principal business, since its incorporation and at all times material hereto, consisted of the operation of a single moving picture theatre, known as Studio Theatre (hereinafter also referred to as the "theatre"), located in downtown Phoenix, Arizona.
In 1932, Harold Stetson and his brother Albert Stetson (hereinafter also referred to as the "Stetsons") felt there was an opportunity in Phoenix, Arizona, for a small motion picture theatre. They began negotiations with Ackel Investment Company (hereinafter also referred to as "Ackel") for a lease on the property at 18-20 East Washington Street in Phoenix (hereinafter also referred to as the "Ackel property"). But being unable to conclude a transaction with Ackel at that time, in October 1932 the Stetsons leased for a term of 5 years, from Mrs. Anna B. Thalheimer, the adjoining property at 14-16 East Washington Street (hereinafter also referred to as the "Thalheimer property"). A one-story, store-front building on the Thalheimer property was to be converted into the contemplated theatre; this conversion, involving considerable alteration in the existing structure, thereafter was completed, and the theatre was opened for business on December 22, 1932.
During the period that negotiations were being carried on for a location for the theatre, Harold Stetson went to Los Angeles, California, to arrange for films to be shown at the theatre. While there he met Milton Arthur who, with his brother Harry Arthur (hereinafter also referred to as the "Arthurs"), agreed to finance the theatre for a half interest therein.
Petitioner was then organized, and the lease of the Thalheimer property (hereinafter referred to as the "Thalheimer lease") was assigned to it. Each of the Stetsons and the Arthurs received 25 per cent of petitioner's capital stock. Shortly after petitioner was organized, the Arthurs transferred their 50 per cent interest to Cabart Theatres Corporation (hereinafter referred to as "Cabart"), a theatre-operating corporation which they controlled. In October 1937 Cabart transferred this 50 per cent interest to Publix-Rickards-Nace, Inc., a subsidiary of Paramount Pictures, Incorporated (hereinafter referred to as "Paramount"), and this 50 per cent interest continued to be so held at least through the years in issue.
The theatre, when it was opened, had a total seating capacity of 337 seats. Shortly after petitioner began operating the theatre, its officers were of the opinion that its seating capacity was inadequate for its operation at a sufficiently profitable level.
4. Said Lessee further covenants and agrees not to make or cause to be made any material alterations or changes of any kind in or to said leased premises subsequent to the first contemplated alterations or changes intended to be made by the said Lessee without the written consent of the Lessor first obtained therefor; however, Lessee has the right to make any changes or alterations without Lessor's consent at any time during the term of this lease provided such changes or alterations do not weaken or cause the value of the said building or premises to be lessened or diminished.
11. And the said Lessee further agrees not to let or underlet the whole of the said leased premises, or to assign this lease or any interest herein, without the written consent of the Lessor first had and obtained therefor, and any attempt by the said Lessee to assign this lease, or any interest therein, in whole or in part, or to let or to underlet said premises, in whole, shall, at the option of the Lessor, immediately terminate this lease, and the Lessor shall be entitled to the immediate possession of said leased premises thereupon, and all rents paid by said Lessee in advance on account of said premises shall be forfeited to said Lessor for damages due to it for such attempt to violate the conditions of this lease; however, the said Lessee is hereby given the right to mortgage its leasehold without the consent of the Lessor, and it is further provided that the Lessee shall have the right, without obtaining the consent of the Lessor, to sublet the second floor of the said building and space on the first floor not to exceed (50%) per cent of the total floor space thereof.
It is further agreed between said Lessor and said Lessee that no consent by said Lessor to any assignment of this lease or any interest therein, or the subletting the whole of said premises hereby leased, shall be held to waive the covenant not to assign this lease or any interest therein or to sublet the said premises without the written consent of the Lessor as to any further assignment or subletting.
22. Lessee agrees to use the said premises for the purpose of conducting therein the following business; Motion picture theatre, general theatre, and other similar amusement purposes.
28. It is understood and agreed by the parties hereto that for the first time, the Lessee has the right, without obtaining the consent of the Lessor as herein-before provided, to change, alter or remodel the building on the premises herein leased, and make the same fit for its use and purposes; however, nothing herein contained shall be construed as giving Lessee the right to change, alter or remodel the same building subsequent to the first change, alteration or remodeling save and except as in Paragraph 4 herein contained.
On or about February 1, 1936, an agreement was entered into by petitioner which extended the Thalheimer lease to February 1, 1951.
23. It is understood by the parties hereto that the premises herein described are at the present time occupied by a tenant under lease. Lessor hereby covenants and agrees to assign to the Lessee simultaneously with the execution of this lease agreement all its rights, title and interest in and to the lease herein mentioned.
In leasing the Ackel property, petitioner intended to use part of the ground floor of the Ackel building for enlargement of the theatre. The existing frontage of the theatre was considered sufficient by petitioner for its purposes, and the frontage of the Ackel building was considered too valuable to be used as a theatre entrance. Petitioner therefore contemplated subleasing the front portion of the ground floor of the Ackel building, to an extent not in excess of 50 per cent of the available footage on that floor, and utilizing the remainder of that floor for enlargement of the theatre.
Petitioner's intended use of the Ackel property contemplated that Ratner's would vacate its space in the Ackel building. Before executing the Ackel lease, petitioner had received an oral promise from Ratner's that it would vacate the premises in return for payment by petitioner of $100 per month for the remainder of the term of Ratner's lease, which then had 24 months to run. However, upon approaching Ratner's for performance of this agreement immediately after execution of the Ackel lease, petitioner was told that Ratner's had just transferred its remaining 2-year interest, in the space at the Ackel property, to Darling Shops, Inc. (hereinafter also referred to as "Darling"). Thereafter, Darling entered into possession and paid rent to petitioner for that space.
Enlargement of the theatre was dependent upon procurement of the means with which to finance it. Neither petitioner itself nor the Stetsons were able during the base period to finance such an enlargement, and petitioner's financial condition during the base period years was such that bank credit was unavailable for this purpose.
DEAR HAROLD: I have had Stanbery and Leo Hungerford working on the plans for the enlargement of the Studio Theatre and expect to come over to Phoenix shortly. In the meantime, I should like to have Al and you give some thought to the possibility of interesting West Coast in a half interest in the Studio Theatre, Inc., your retaining 25% and we 25%.
There are many advantages in a deal of this kind from a protective point of view as well as a financial point of view. I am finding it extremely difficult to finance a building which I think would meet our needs for the next 14 or 15 years, and I have wondered many, many times, if a 25% interest in a large proposition would not be much better than a 50% interest in a small one.
In September 1937, Publix-Rickards-Nace, Inc., the Paramount subsidiary referred to above, while it was negotiating to acquire Cabart's 50 per cent interest in petitioner, offered to finance the enlargement, if the Stetsons would surrender enough of their stock in petitioner so that they would no longer have a 50 per cent interest. The Stetsons were unwilling to do so, and petitioner declined this offer in October 1937.
Upon Cabart's elimination as a source for financing the enlargement, petitioner was left without the financial means for carrying out the desired expansion, and it was lacking the necessary financial resources when the sublease to Darling expired at the end of January 1938. It therefore was unable at that time to proceed with its intention to use the Ackel property for enlargement purposes, and, still having that property on its hands, it was interested in easing its position through continued subletting of space in the Ackel building.
Darling, on the other hand, was interested in remaining in possession at the Ackel building. Petitioner was agreeable to this, provided Darling obtained the consent of Ackel to it. Darling negotiated with Ackel, and obtained such consent from Ackel, paying Ackel a bonus of about $4,500. As part of Darling's negotiations with Ackel, the latter also agreed to extend the Ackel lease 3 years; petitioner wanted such an extension in order to restore, to the period for which it would have the use of the Ackel property, time lost through an extension of occupancy by Darling.
Pursuant to this consent of Ackel, petitioner, on or about January 20, 1938, subleased the entire Ackel property to Darling for a period of 5 years, from February 1, 1938, to and including January 31, 1943. However, petitioner reserved the right to terminate this sublease, upon 60 days' written notice, at any time after 3 years from February 1, 1938; provided that, if the termination occurred between January 31, 1941, and February 1, 1942 (the fourth year of this sublease), then petitioner was required to pay $1,000 to Darling. The total rental agreed to be paid by Darling for the entire term of this sublease was identical with the total rental payable by petitioner to Ackel (entirely exclusive of the bonus payable by petitioner to Ackel) during the same 5-year period. Prior to this sublease, Darling was sublessee only of the space on the ground floor which Ratner's had occupied; now it became sublessee of the entire Ackel building, and it, rather than petitioner, collected rent from the occupant of the second floor.
On or about the same day, January 20, 1938, Ackel and petitioner entered into a written agreement which (1) extended the Ackel lease for 3 years, to February 1, 1954, for a total rent of $28,800 for this additional term, payable $800 per month; and (2) provided for consent by Ackel to sublease of the entire premises by petitioner to Darling. Thereafter, on or about July 29, 1940, petitioner likewise obtained a 3-year extension of the Thalheimer lease, to February 1, 1954.
Still confronted with the problem of financing the desired enlargement of the theatre, the Stetsons thereafter considered renting out in advance the ground-floor space at the Ackel building that would be available for a tenant after the contemplated enlargement had been made, and requiring such a tenant to pay a substantial advance rental, which could then be used to finance the necessary enlargement alterations.
On or about June 1, 1940, petitioner entered into a written agreement with Herb Bland Clothing Company, Inc. (hereinafter also referred to as "Bland"), which occupied premises neighboring the theatre, to sublease "that portion of the Ackel property which is contemplated to be remodeled into a storeroom as per plans and specifications prepared by architects Alexander Burton, dated April 27, 1940 * * *." It was further provided that the "lease shall begin on such date as the parties hereto may mutually agree upon, which said date shall be not earlier than September 1, 1940, and not later than May 15, 1941; and said lease shall terminate on January 31, 1951; provided, however, that the first party [petitioner] obtains an extension of its existing lease on the Thalheimer property to January 31, 1954, then said lease shall terminate January 31, 1954." Provision was made for a monthly rental, and it was provided that "$7,500.00, in cash, shall be paid to the first party [petitioner] by second party [Bland] upon the execution of a formal lease embodying this agreement." The agreement further provided that if petitioner "shall be unable, by reason of * * * lack of finances for construction purposes, to proceed with the work provided to be done in accordance with the plans and specifications hereinabove mentioned, or substantially in accordance therewith, then this agreement shall be void and both parties will stand released and discharged therefrom."
Bland thereafter wrote petitioner, on or about February 27, 1941, that it was willing to substitute, in its place under this agreement, a specified sublessee on specified conditions and to cancel Bland's "rights in that certain agreement entered into with you calling for the financing up to $7,500 for the alterations of the Studio Theatre and the Darling Shop properties." This substitution of parties was not made.
This arrangement with Bland to obtain financing for the enlargement of the theatre "fell through" and the aforesaid amount of $7,500 was never paid to petitioner by Bland. On or about April 29, 1941, Bland wrote to petitioner to advise that it was ready to proceed under the foregoing agreement and to start negotiations leading to execution of the sublease involved. Petitioner replied, on or about May 2, 1941, that it too was willing to negotiate and proceed pursuant to that agreement, but that "the undersigned [petitioner], making due allowance for the $7500 cash installment to be paid by you under said agreement, is still unable by reason of lack of finances for construction purposes to proceed with the work provided to be done in substantial accordance with the plans and specifications mentioned in said written agreement, and there is no present prospect that Studio Theatre, Inc. will be able to provide such finances. Unless such finances are available, it would serve no purpose to negotiate relative to the formulation and execution of the formal written lease."
Bland's initial desire to lease space in the Ackel property resulted from its uncertainty as to whether it would be able to get a renewal of its lease at the premises it occupied. Thereafter it obtained such renewal, and its interest in the Ackel property waned. Subsequently it consented to surrender its rights to space in the Ackel property provided that such space was not leased to a tenant which might compete with Bland.
immediately upon the execution and delivery of the final form of sublease and of all written instruments required hereunder, signed by both parties, to pay and deposit the sum of Twenty Thousand Dollars ($20,000) in escrow with the First National Bank of Arizona, Phoenix, as payment of the initial installment of rental, with written instructions to said Bank to pay and deliver said sum, and all thereof, until Studio upon the delivery unto said Bank of a certificate of completion of said Alexander and Burton, architects, certifying to the completion of all alterations of the premises * * *.
It is further understood and agreed that if said Twenty Thousand Dollars ($20,000) so placed in escrow shall not be so paid unto Studio by March 1, 1942 the amount of said escrow shall be returned by said Bank unto Karl's.
In this agreement, written approval by Paramount was made a condition to execution of a sublease to Karl's, and it was required that the provisions of such a sublease should contain a "guarantee by Paramount of full and faithful performance by Studio of all of its covenants, promises and agreements thereunder, including delivery and continued peaceable possession of the demised premises. Such guarantee shall be in written form satisfactory to Karl's."
On or about August 20, 1941, petitioner gave Darling formal notice of termination, effective November 1, 1941, of the latter's sublease of the Ackel property and advised Darling that petitioner would pay it $1,000 upon delivery of possession.
An architect's blueprint, of structural changes to be made in enlarging the theatre, was drafted by Alexander and Burton, and is referred to above in the agreement between petitioner and Bland made on or about June 1, 1940, and also in the later agreement between petitioner and Karl's. This blueprint was dated April 27, 1940, and its first use was in connection with the aforesaid agreement between petitioner and Bland. Rough sketches preceded this blueprint, and ideas contained in the blueprint existed prior to its drafting; the blueprint was not prepared prior to 1940.
Thereafter, in December 1941, renovation of the Ackel property was commenced in order to enlarge the theatre. Enlargement was achieved by widening the theatre, adding seats to each row, and adding a section of about 60 seats along the side of the theatre. Construction work required the theatre to close for most of January 1942. The alterations were completed at the end of January 1942, after which the seating capacity of the theatre was 518 seats. There had been no change in the seating capacity of the theatre between 1932 and 1942. This enlargement of 1942 was completed substantially in accordance with the blueprint of Alexander and Burton, referred to above.
The stipulation of the parties states that the seating capacity of the theatre became 525 seats. They now agree, however, that the correct figure is the smaller one stated above.
Throughout the base period and up to the time the enlargement of the theatre was thus made, petitioner had an unequivocal intent to expand the seating capacity of the theatre. That intent was never abandoned or suspended during that entire time, and the enlargement of the theatre in 1942 was made in accordance with that intent. Throughout all those years petitioner sought finances to put that intent into effect, and as soon as it found such finances it proceeded with the enlargement of the theatre.
The increase in the seating capacity of the theatre in 1942 was a change in petitioner's capacity for production or operation, and a change in the character of its business, within section 722 (b) (4), Internal Revenue Code. That change was consummated as a result of a course of action to which petitioner was committed prior to January 1, 1940.
1933 1934 1935 1936 AS SUBMITTED BY PETITIONER: Admissions .............. $61,046.99 $64,623.44 $63,833.80 $62,619.23 Advertising ............. Subrents (tenants) ...... 6,280.00 Miscellaneous ........... Interest ................ Candy vending profit .... ---------- ---------- ---------- ---------- Total income .......... $61,046.99 $64,623.44 $63,833.80 $68,899.23 ========== ========== ========== ========== Film rental ............. $12,291.66 $15,137.54 $18,404.14 $20,616.06 Transportation of film .. 1,694.93 1,528.95 1,448.96 968.17 Production .............. 33.72 33.72 59.72 59.72 Prizes, etc. ............ Publicity ............... 3,435.51 3,637.29 3,828.60 3,918.13 Salaries — officers....... 5,200.00 5,200.00 5,120.00 3,653.55 House salaries .......... 12,476.73 13,899.85 9,279.74 12,081.85 Legal and auditing ...... 60.00 306.55 Traveling (exc. overhead) 1,007.18 345.95 292.29 167.35 Telephone and telegraph 461.11 750.08 452.06 308.17 Elect., fuel, water and cooling ............... 3,962.61 3,820.88 3,438.20 3,804.01 Repairs ................. 1,554.55 1,317.19 1,439.96 1,446.72 Supplies, other ......... 2,153.70 1,136.12 1,129.67 1,222.15 Uniforms ................ Miscellaneous ........... 747.02 356.59 187.90 Management .............. 1,835.00 1,954.00 1,934.00 2,381.00 Rent .................... 4,869.22 5,092.59 5,145.59 11,604.20 Insurance ............... 321.67 331.20 431.66 594.81 Taxes (excluding Fed. Income) ............... 735.18 539.70 533.50 2,387.78 Interest ................ 955.33 594.29 342.20 Bad debts ............... 392.31 Arizona income tax ...... 80.53 Pre-opening ............. 1,768.00 Theatre Project — abandoned ............. 5,916.87 Depreciation ............ 3,699.80 5,338.84 8,148.65 2,519.18 -------- -------- --------- -------- Total expense ....... $59,242.92 $60,772.55 $67,440.73 $68,961.81 ========== ========== ========== ========== Net earnings ....... $1,804.07 $3,850.89 (3,606.93) (62.58) AS ADJUSTED: Net earnings ........ $3,059.63 $3,942.88 $3,606.93 $335.28 1937 1938 1939 AS SUBMITTED BY PETITIONER: Admissions .............. $65,757.86 $59,816.58 $58,565.41 Advertising ............. Subrents (tenants) ...... 6,730.00 7,685.00 8,900.00 Miscellaneous ........... 20.21 165.98 40.79 Interest ................ 28.37 112.18 Candy vending profit .... 149.11 169.35 --------- --------- --------- Total income .......... $72,508.07 $67,845.04 $67,787.73 ========== ========== ========== Film rental ............. $22,254.92 $15,810.87 $15,62.75 Transportation of film .. 890.16 747.23 662.93 Production .............. 33.07 62.52 42.57 Prizes, etc. ............ 120.00 860.00 1,733.52 Publicity ............... 3,922.11 3,969.03 3,768.38 Salaries — officers. 3,719.98 3,119.92 3,144.99 House salaries .......... 13,256.45 12,630.76 12,757.27 Legal and auditing ...... 153.16 400.00 205.00 Traveling (exc. overhead) 57.00 Telephone and telegraph . 239.21 192.12 235.27 Elect., fuel, water and cooling ............... 3,362.73 2,780.73 2,839.54 Repairs ................. 1,179.44 987.34 854.07 Supplies, other ......... 1,173.11 678.00 595.48 Uniforms ................ Miscellaneous ........... 263.90 215.09 169.74 Management .............. 2,567.65 1,804.65 1,763.50 Rent .................... 12,272.24 12,146.63 13,455.00 Insurance ............... 304.33 357.16 163.03 Taxes (excluding Fed. Income) ............... 4,221.81 3,899.71 4,227.33 Interest ................ 74.08 5.82 4.04 Bad debts ............... Arizona income tax ...... 103.17 43.25 Pre-opening ............. Theatre Project — abandoned ............. Depreciation ............ 2,551.79 2,548.52 2,216.38 -------- -------- -------- Total expense ....... $72,617.14 $63,319.87 $64,514.04 ========== ========== ========== Net earnings ....... (109.07) $4,525.17 $3,273.69 AS ADJUSTED: Net earnings ........ $288.69 $4,422.17 $3,670.45 During the base period, seven theatres besides Studio Theatre were in operation in Phoenix. Of the seven theatres, Paramount, by itself or through subsidiaries, operated four; Fox West Coast Theatres operated a fifth; a sixth was operated by the owner of a group of theatres in southern Arizona; and the seventh was an independent theatre which showed only Mexican pictures. All of these theatres had larger seating capacities than the original capacity of Studio Theatre.
Petitioner rented or "purchased" the films shown at the Studio Theatre. Harold Stetson purchased films on behalf of petitioner during the first year of its existence. Cabart handled the purchase of films for petitioner thereafter and until it sold its stock in petitioner in October 1937 to the Paramount subsidiary referred to above. Paramount handled the purchase of films for petitioner for the remainder of the base period as well as thereafter.
"First-run" referred to the first showing of a motion picture film in a trade area. "Second-run" referred to the second showing of a film in a trade area, and in Phoenix during the period since 1932, this usually occurred about sixty days after the first run. "Third-run" referred to the third showing of a film in a trade area, and in the case of Studio Theatre this usually occurred thirty days after the second run. "Revival" referred to any film which had finished the ordinary showings and was no longer for sale on a competitive basis. The age of a revival might vary from a year to fifteen or twenty years after its original showing. The "drawing power" of a film diminished with each showing; thus a second-run drew fewer persons than a first-run, and a third-run drew fewer persons than a second-run.
Prior to the acquisition of the stock interest in petitioner by the Paramount subsidiary referred to above, Studio Theatre operated almost exclusively with second-run and third-run feature pictures. Starting with the acquisition of that interest in petitioner and until February 1940, petitioner operated almost exclusively with third-run feature pictures. From February 1940 until the end of April 1941, petitioner operated almost exclusively with revival and third-run feature pictures. From the end of April 1941 until January 1943, petitioner operated primarily with revival feature pictures, although on occasion it used some second-run pictures. Petitioner initially changed to revivals in order to reduce its expense of renting films.
Films were rated by the producer according to quality, those considered best being rated as "A," and those considered progressively poorer in quality being rated "B," "C," and "D." During the period 1932 through 1939, petitioner was able to obtain films only by purchasing an entire block or group of pictures at one time from a given producer. These blocks would include A, B, C, and D pictures. Many of the D pictures were so poor in quality and drawing power that, although paid for, they would not be shown; these pictures were referred to as PNU's (pay and not use).
The cost to a theatre of a film diminished rapidly in relation to the order of showing, first-run being most expensive, second-run less expensive, and revivals ordinarily costing substantially less than third-run films. The cost further varied with the rating of the film, an A picture being the most expensive. The A pictures sometimes rented for a flat amount and sometimes on the basis of a percentage of the theatre's gross receipts on the showing; the rental charged for B, C, and D films would ordinarily be a flat amount, and varied with the rating. The cost also tended to vary to some extent with the theatre's capacity, so that the cost of a film might be higher to a theatre of greater seating capacity.
During the base period, Studio Theatre's box office usually opened at 10 a. m. and closed at 10 p. m., although on Saturday it might be open until 11 p. m. The change from matinee to evening shows during the base period took place either at 5 p. m. or at 6 p. m.
Studio Theatre showed single-feature bills from the time it opened in 1932 until about the end of 1935; then, to meet competition, it began to show double-feature bills as well during a transition period which lasted until about April 1936; and thereafter it adopted the policy of showing only double-features.
Usually at least six complete shows were run per day with a single feature, and four complete shows per day with a double feature. The number of shows varied both for single and double features, however, and often there were more than four showings per day of double features. On Saturdays the number of showings usually increased.
During the base period, the theatre's periods of greatest business, or "peak demand," were during evening showings throughout the week and during matinees on Saturday and Sunday. The "peak period" during weekday evening performances was about one hour from about 6:30 p. m. to about 7:30 p. m.
Weekday matinees which did not come on holidays were usually times of poor business for the theatre, and, if at those times during the base period the seating capacity of the theatre had been greater than 337 seats, there would have resulted very little increase in petitioner's gross receipts from admissions. Increased earnings from increased capacity could come only during the times of "peak demand" described above.
Petitioner was not permitted to have standees within the theatre during the base period. Waiting customers were lined up outside the theatre. It was petitioner's experience that, when there were such lines of waiting customers, persons coming to the theatre often tended to go elsewhere rather than wait in line. There were times in the course of the base period, during the foregoing periods of peak demand, when petitioner lost customers and its paid admissions were reduced because the theatre was then filled to capacity and petitioner was unable to provide these customers with seats promptly. There were times during "peak periods" when petitioner lost customers because it could not accommodate them promptly or only after a brief wait. At such times, if petitioner had more seats in the theatre, it could have sold more tickets, and it would have increased its average base period net income.
Because of the expansion of the seating capacity of Studio Theatre from 337 seats to 518 seats, petitioner's average base period net income, as determined under the growth formula of section 713 (f) of the Internal Revenue Code, does not reflect the normal operation of the business for the base period, and petitioner's average base period net income as thus determined is an inadequate standard of normal earnings for Studio Theatre as expanded to 518 seats.
Operation of Studio Theatre as enlarged to a seating capacity of 518 seats entailed greater expenses than operation of Studio Theatre with its original seating capacity of 337 seats. Because of the foregoing expansion in seating capacity, and taking into account this increase in expenses as well as all the other facts and circumstances found herein to have been established, a fair and just amount representing normal earnings to be used by petitioner as a constructive average base period net income is $1,500 more than petitioner's average base period net income of $4,422.17 determined under the foregoing growth formula.
Petitioner commenced the sale of candy and similar items in the lobby of its theatre in 1937 or 1938, at which time confectionary vending machines were installed in the theatre lobby. These machines were not owned or operated by petitioner; it received a commission of 35 per cent of the net proceeds of the machines.
In July 1941, after the end of the base period but before the theatre was enlarged, a confectionary "counter" was installed in the lobby of the theatre for the sale of items such as candy and popcorn. This "counter" replaced the candy vending machines, which were used in the lobby up to that time. Installation of this "counter" was completely unrelated to the enlargement thereafter made in the theatre in 1942. Installation of this "counter" was not made as a result of a course of action to which petitioner was committed prior to January 1, 1940.
Because of the location of the front lobby doors of the theatre prior to the time the alterations were made in 1942 enlarging the theatre, this confectionary "counter" was not too readily accessible to persons already admitted into the theatre. Among the alterations made to the theatre in 1942, the front lobby doors were moved forward about fifty or sixty inches toward the box-office so that they were located immediately behind the box-office, and the area within the lobby was thus increased. After this expansion in lobby space, the "counter" in the lobby became more readily accessible to persons already admitted into the theatre. No change was made in the "counter" itself at that time. At the same time that the theatre was enlarged in 1942, there was installed a second "counter" at the entrance to the theatre outside the front lobby doors, for sale of confectionary items such as candy and popcorn to persons outside the theatre. Nothing concerning either of these "counters" appeared in the architectural blueprint of Alexander and Burton, referred to above.
Addition of the "counter" outside the lobby in 1942 and the increased accessibility of the "counter" inside the lobby at about the same time did not result in a material difference in petitioner's capacity for production or operation, and did not constitute a change in the character of petitioner's business.
An intent to take action with respect to either of those "counters" was not part of the course of action to which petitioner was committed prior to January 1, 1940, and which resulted in enlargement of the theatre in 1942.
The population of Phoenix, Arizona, was 48,118 in 1930 and 65,414 in 1940, according to the census for those years. The population of Maricopa County, Arizona, in which Phoenix was located, was 186,193 according to the census taken as of April 1, 1940, and the civilian population of Maricopa County as of November 1, 1943, was estimated by the U.S. Bureau of Census at 206,095. The 1940 census of Maricopa County showed a population increase of 23.3 per cent over the 1930 census for that county.
In 1932 petitioner was organized and commenced its business of operating a motion picture theatre, named Studio Theatre, at Phoenix, Arizona. Converted shortly theretofore from a one-story, store-type building on premises leased several months earlier by persons responsible for petitioner's formation, Studio Theatre had been opened with a capacity of 337 seats. Petitioner's business experience convinced its management within the next two years that this seating capacity was too small for operation at a satisfactory level of profit, and it was decided to increase the seating capacity of the theatre. It actually took a lease on adjacent property on December 31, 1935, in order to provide such additional seating capacity. The unexpected failure to obtain immediate possession from a sublessee at that property together with subsequent difficulties in securing the necessary financing prevented petitioner from carrying out its plan for some time. Finally, the theatre's capacity was expanded in January 1942 to 518 seats. Petitioner claims that the enlargement of its theatre entitles it to excess profits tax relief under section 722 of the Internal Revenue Code, by reason of a change in "the character of the business" within subparagraph (b) (4).
SEC. 722. GENERAL RELIEF — CONSTRUCTIVE AVERAGE BASE PERIOD NET INCOME.
(a) GENERAL RULE. — In any case in which the taxpayer establishes that the tax computed under this subchapter (without the benefit of this section) results in an excessive and discriminatory tax and establishes what would be a fair and just amount representing normal earnings to be used as a constructive average base period net income for the purposes of an excess profits tax based upon a comparison of normal earnings and earnings during an excess profits tax period, the tax shall be determined by using such constructive average base period net income in lieu of the average base period net income otherwise determined under this subchapter. In determining such constructive average base period net income, no regard shall be had to events or conditions affecting the taxpayer, the industry of which it is a member, or taxpayers generally occurring or existing after December 31, 1939, except that in the cases described in the last sentence of section 722 (b) (4) and in section 722 (c), regard shall be had to the change in the character of the business under section 722 (b) (4) or the nature of the taxpayer and the character of its business under section 722 (c) to the extent necessary to establish the normal earnings to be used as the constructive average base period net income.
(4) the taxpayer, either during or immediately prior to the base period, commenced business or changed the character of the business and the average base period net income does not reflect the normal operation for the entire base period of the business. If the business of the taxpayer did not reach, by the end of the base period, the earning level which it would have reached if the taxpayer had commenced business or made the change in the character of the business two years before it did so, it shall be deemed to have commenced the business or made the change at such earlier time. For the purposes of this subparagraph, the term "change in the character of the business" includes a change in the operation or management of the business, a difference in the products or services furnished, a difference in the capacity for production or operation, * * *. Any change in the capacity for production or operation of the business consummated during any taxable year ending after December 31, 1939, as a result of a course of action to which the taxpayer was committed prior to January 1, 1940, * * * shall be deemed to be a change on December 31, 1939, in the character of the business.
There appears to be no dispute that the substantial increase in seating capacity resulted in the requisite "difference in the capacity for production or operation" of the theatre, and therefore constituted a change in the character of petitioner's business within the terms of (b) (4). It is quite clear that petitioner's expansion in seating capacity qualified as such a change, and we have so found.
Relief is generally available under (b) (4), however, only if the change occurred "either during or immediately prior to the base period." But exception to this time limitation is made by the statute with respect to "Any change in the capacity for production or operation of the business consummated during any taxable year ending after December 31, 1939, as a result of a course of action to which the taxpayer was committed prior to January 1, 1940 * * *." The change here involved having been consummated in 1942, respondent urges that it is a change which fails to come within (b) (4) because it did not result from a course of action to which petitioner was committed prior to the specified date. We are unable to agree with this contention, and think that the expansion in seating capacity which took place in 1942 was the result of a "commitment" within the meaning of the statute.
At the end of 1935, petitioner leased premises adjacent to the theatre with the purpose of acting on the desire of its management for an increase in seating capacity. Enlargement was to be achieved through expansion into a portion of a building located at these adjacent premises. This lease was for a term of 15 years, and obligated petitioner to pay a total rental of $135,000, and in addition petitioner agreed to pay the lessor-owner, Ackel Investment Company, a bonus of $7,500. The record shows, first, that, prior to the execution of this lease from Ackel, petitioner had assurance of a source for financing the expansion; and, secondly, that prior to execution of that lease, it had the promise of a tenant at the adjacent premises that the latter promptly thereafter would transfer its lease, which still had 2 years to run and which covered a portion of the premises needed for the contemplated enlargement, to petitioner for an agreed consideration.
Petitioner therefore thought, and with reason, that it would be ready to proceed with the expansion in due course after the Ackel lease was executed. It was prevented from doing so, however, by a chain of developments which started with the unanticipated failure of the tenant to abide by its promise to transfer its lease to petitioner; instead, that tenant transferred its rights to another party, which then moved into the premises for the remaining 2 years of the transferor's lease. The effect of this continued occupancy was that petitioner was unable to proceed with the enlargement and to take advantage of the offer it then had of financial assistance; and before the 2-year period of that occupancy had expired, that offer was withdrawn, and petitioner found itself at the end of that 2-year period without some other substitute which was immediately available on acceptable terms. Therefore, when petitioner found at the expiration of this 2-year period that the new occupant was interested in remaining for a further term, petitioner sublet the entire Ackel property for an additional 5 years beginning on February 1, 1938, but sooner terminable at petitioner's option after 3 years from that date. Thereafter petitioner continued to try to find means with which to finance the expansion; and when it succeeded in doing so in 1941, it terminated this sublease, and proceeded to have the structural alterations made which were involved in achieving the contemplated expansion.
Although the record is not without some suggestion that before the end of the base period petitioner, possibly because of the discouraging turn of events, at least suspended if not substantially abandoned its interest and intent in carrying through the expansion and put off the expansion for further examination at some indefinite time in the future, we think the facts and circumstances on the whole show rather a continuing, active interest in expansion and a continuing, persistent search for a way of financing it. True, there are facts which make suspect a claim that petitioner continued to be seriously "committed" to enlargement of the theatre, such as the long period of some six years between petitioner's lease of the adjoining Ackel premises and the consummation of the enlargement, and petitioner's sublease of the Ackel property for a minimum period of three years, beginning in the base period and extending beyond the end of the base period, during which petitioner disabled itself from making the enlargement. We find, however, that these facts are largely explained by the remainder of the record in a manner which does not negate the continued existence of a substantially unabated intent and effort to enlarge the theatre. The circumstances mentioned, rather than indicating an abandonment or suspension of prior intent, seem to us in the context of this record to reflect a subsisting attempt on petitioner's part to cope with and resolve its difficulties in a way which would minimize potential losses and yet permit it to realize its objective of expansion.
While petitioner's failure to contract during the base period for the necessary alterations incident to expansion may be taken into account, it is not necessarily conclusive of the question of commitment. That is made clear by the history of the statute, as is shown in the statement of the Senate Committee on Finance that "the commitments made need not take the form of legally binding contracts only." S. Rept. No. 1631, 77th Cong., 2d Sess., pp. 201-202. See also E. P. C. 15, 1947-1 C. B. 89, amending Bulletin on section 722, p. 58: "Progress to the point where the taxpayer could not withdraw without substantial detriment may be given substantial weight in determining whether or not taxpayer has committed itself * * *. On the other hand, commitment claims are not to be rejected solely on the ground that taxpayers which have otherwise complied with all of the essentials in commitment cases may, neverthless, be in a position where they might have withdrawn without substantial detriment prior to January 1, 1940." We think it incorrect to say on this record that petitioner could have withdrawn from enlargement of the theatre without incurring "substantial detriment"; the evidence does not show, for example, that it was able to recoup the bonus of $7,500 it paid on originally leasing the Ackel property, and it was a matter of speculation whether it would be able to recover the amount of rent for which it became liable for the remainder of the term of that lease. Even if we were to assume, however, that petitioner did not proceed during the base period to a point from which it could not withdraw without substantial detriment, we would still be satisfied, on all the facts and circumstances, that it had adopted a course of action within the statute which resulted in the enlargement of the theatre. If petitioner failed to proceed beyond such a point, it was due to the difficulties which it encountered without fault or design on its part, and failure to progress further under those circumstances was not evidence of a change in its plans. The record as a whole shows in our opinion that petitioner made "changes in position unequivocally establishing the intent to make the changes [in capacity for production or operation]," and that is enough to establish the "commitment" required by the statute. S. Rept. No. 1631, 77th Cong., 2d Sess., p. 202; see also Treasury Regulations 112, sec. 35.722-3 (d).
The "commitment" provision of (b) (4) was added to section 722 by the Revenue Act of 1942, section 222 (a). As that provision was introduced by the Committee on Ways and Means of the House, it required the post-1939 change in capacity for production or operation to be a result of "commitments made prior to January 1, 1940, binding the taxpayer to make the change * * *." (Emphasis added.) H. R. 7378, 77th Cong., 2d Sess.; see also H. Rept. No. 2333, 77th Cong., 2d Sess., p. 146. The quoted language was deleted in the Senate and in its place there was put the wording ultimately adopted as law, namely, "a course of action to which the taxpayer was committed prior to January 1, 1940." In explaining the purpose motivating this amendment, the Senate Committee on Finance stated that "Your committee has made a clarifying amendment to this provision to make it manifest that the commitments made need not take the form of legally binding contracts only. * * * A course of action to which the taxpayer was committed may be evidenced by a contract, the expenditure of money in the commencement of the desired changes, or other changes in position unequivocally establishing the intent to make the changes." (Emphasis added.) S. Rept. No. 1631, 77th Cong., 2d Sess., pp. 201-202.
The mere existence of a change in the character of the business within (b) (4) is not enough, however, to entitle petitioner to relief under section 722. Petitioner must also prove that, because of such change, its actual average base period net income does not reflect the normal operation during the base period of the business as changed, and it must also establish a fair and just amount representing normal base period earnings for the changed business.
Respondent contends that petitioner has failed to prove compliance with these additional requirements, and that in any event it therefore must be denied relief. Respondent points out that the average base period net income of $4,422.17 used by petitioner (computed by use of the section 713 (f) growth formula) was about twice as great as the average of its excess profits net income for the base period years, which amounted only to $2,179.17; and respondent contends that in such circumstances petitioner must prove, if it is to get any relief, that it is entitled to a constructive average base period net income large enough to produce a credit in excess of the credit computed under the growth formula. Irwin B. Schwabe Co., 12 T.C. 606, 613-614. While petitioner's proof is not as complete as might be desired, we are convinced on the record that its average base period net income even under the growth formula does not reflect the normal base period earnings of Studio Theatre enlarged to a capacity of 518 seats, and we are satisfied on all the evidence that, because of the expansion in seating capacity, petitioner is entitled to a constructive average base period net income which is $1500 more than its average base period net income of $4,422.17 under the growth formula.
Expansion in the theatre's seating capacity could have no effect in increasing petitioner's base period income unless it would have had customers for those additional seats. If seating capacity was not a factor which limited petitioner's base period earnings, then obviously it cannot be said that it would have enjoyed greater earnings with greater capacity. Indeed, to the extent that additional capacity would have imposed higher expenses without bringing a comparable increase in customers and revenues, petitioner's net base period earnings would have declined rather than increased. It was therefore incumbent on petitioner to show that it lost customers because of insufficient seating capacity during base period years, and to prove the extent to which its net income would have increased, after allowance for increased expenses which would have been incurred, if its theatre during the base period had 518 rather than 337 seats. Cf. Green Spring Dairy, Inc., 18 T.C. 217, 237-240.
The record shows that during the base years Studio Theatre had periods of "peak attendance," which recurred on certain days of the week and at certain times of the day, and that during such periods there was a convergence of customers seeking admission to the theatre. It further appears in the record that at such times queues of waiting customers outside the theatre were not uncommon, due to the limited seating capacity of the theatre, and that not infrequently it happened, in such circumstances, that some persons would not wait long enough to be seated and others, seeing a line for admission to the theatre, would not wait at all. Such persons were lost as customers because the seating capacity was not larger during base period years. It may well have been, as respondent emphasizes, that on many such days the theatre had not reached its "saturation point," in the sense that the aggregate number of persons admitted for all the performances during the day was less than the maximum number of persons who could have been accommodated throughout the entire day even by a theatre with 337 seats. Petitioner nevertheless could lose customers on such days because of the irregular and inconstant flow of customers; on the same day there might be times of surplus seating capacity and times of insufficient seating capacity. We are satisfied that there were concentrations of customers during these times of "peak demand" which the 337-seat capacity could not absorb, resulting in a loss of revenue which could have been avoided had a larger seating capacity been available.
The proof leaves us somewhat in doubt as to the numbers of customers and the amounts of revenue thus lost. We think petitioner has failed to establish that it could have filled substantially all 518 seats with any appreciable regularity if they had existed during the base period years. The proof is also somewhat unsatisfactory as to the extent to which petitioner's expenses would have risen as a result of these additional seats. While we believe from the record that they would have been somewhat less than the resulting increase in revenues, we are not satisfied that they would have been as insignificant as petitioner contends. Such expenses as salaries and compensation and the cost of utilities would have remained substantially the same or would have risen only a little. On the other hand, there can be little doubt that there would have been a substantial increase in depreciation deductions, resulting from the alterations and equipment necessary to make the enlargement. Taking into account all of the facts and circumstances relating to the effect of the expanded seating capacity on petitioner's revenues from admissions and on its expenses of operation, and considering the record as a whole, we find the evidence to establish that petitioner's average base period net income of $4,422.17, as determined under the growth formula, does not reflect the normal earnings of Studio Theatre with a capacity of 518 seats; and that, because of the increase in seating capacity, petitioner is entitled to a constructive average base period net income which is $1,500 more than the foregoing actual average base period net income of $4,422.17.
Petitioner claims that the "changes" made in the theatre in 1942 entitled it to relief because of the impact on its earnings, not only of a rise in income from admissions to the theatre, but also of an alleged increase in its sales of certain confectionary items such as candy and popcorn. Petitioner began to sell such items during the base period, through vending machines placed in the theatre lobby by an operator which paid petitioner a commission. In 1941, this arrangement was discontinued, and petitioner installed its own candy "counter" in the lobby in place of those vending machines. In 1942, when the seating capacity of the theatre was increased, the space in the lobby was enlarged by moving forward the doors behind the box-office at the entrance to the theatre, and a second candy "counter" was also installed outside those doors astride the theatre entrance. While the testimony in this connection is somewhat confusing, that is our understanding from the record of the sequence and nature of events relating to petitioner's sale of candy and popcorn.
The claim petitioner urges in these circumstances is rather uncertain. While petitioner stated in the claim it filed with respondent that it started to sell such items during 1938, petitioner does not seem to rely for relief on the fact of commencement of such sales during the base period. If it means to press a claim based on that fact, it must be unsuccessful if only for failure of proof that its normal earnings from those items, under the arrangement which existed during the base period for their sale, were not adequately reflected in the higher average base period net income which resulted from use of the growth formula of section 713 (f). Cf. Irwin B. Schwabe Co., 12 T.C. 606. If petitioner's claim for relief depends on the installation of its own candy counter in 1941, we are unable to find the necessary "commitment" by petitioner to that development prior to January 1, 1940. The only "commitment" we have been able to find on petitioner's part relates to expansion in the seating capacity of the theatre; that took place in 1942 and, on the evidence, has not been shown to have had any connection with the installation of the candy "counter" more than a year earlier.
The claim petitioner makes with respect to its sales of candy and popcorn seems to be based rather on the alterations petitioner made in enlarging the theatre in 1942, and, while not articulated too well, seems to rest on the dual assertion that the new "outside-counter" would contribute substantially to such sales by reaching persons outside the theatre, and that the old "inside-counter" would add to sales for the reason that enlargement of the lobby made the latter "counter" more readily accessible to patrons already admitted to the theatre. We are unable to find on the record, however, that these "changes" in 1942 relating to sales of candy and popcorn were the result of a course of action to which petitioner was committed prior to January 1, 1940.
Moreover, we are unable to find that the "changes" made in 1942 with respect to sales of candy and popcorn worked a change in the character of petitioner's business within (b) (4). Those "changes" were not of sufficient scope or importance, so far as petitioner's operations were concerned, to qualify as a change in the character of its business. While commencement of the sale of candy and popcorn in a chain of more than fifteen theatres owned by a taxpayer may be of sufficient business importance to it to qualify as a change in the character of its business (cf. Jefferson Amusement Co., 18 T.C. 44), it does not follow that petitioner's addition of a second "counter" in a single theatre, in which such items were already being sold, is of comparable consequence to warrant similar treatment. Even less significant for petitioner, on the evidence before us, was the action taken in 1942 with respect to the "indoor-counter." The record in this case leaves us with no doubt whatever that under the statute there was no substantial difference made in petitioner's capacity for production or operation and no change in the character of its business in 1942 in connection with its sales of candy and popcorn. Cf. Treasury Regulations 112, sec. 35.722-3 (d); Farmers Creamery Co. of Fredericksburg, Va., 18 T.C. 241, 250-254; Clermont Groves, Inc., 17 T.C. 1616, 1621-1622; Wisconsin Farmer Co., 14, T. C. 1021, 1028.
Respondent asserts that petitioner derived abnormal income during the base period as a result of its connection with Paramount Pictures, Incorporated, which controlled a 50 per cent stock interest in petitioner, and that a reconstruction under section 722 must be adjusted to exclude such income. The record is insufficient to establish, however, that "abnormal income" was in fact realized by petitioner because of that relationship or, if it was, the amount thereof, and there is consequently no occasion to pass on the matter.
Reviewed by the Special Division. | 2019-04-19T12:53:41Z | https://casetext.com/case/studio-theatre-inc-v-commr-of-internal-revenue |
All men are like grass, and all their glory is like the flowers of the field . . . the grass withers and the flowers fall, but the word of our God stands forever (Isaiah 40:6-8).
Why, you do not even know what will happen tomorrow. What is your life? You are a mist that appears for a little while and then vanishes (James 4:14).
Show me, O LORD, my life’s end and the number of my days; let me know how fleeting is my life. You have made my days a mere handbreadth; the span of my years is as nothing before you. Each man’s life is but a breath. Man is a mere phantom as he goes to and fro; He bustles about, but only in vain: he heaps up wealth, not knowing who will get it. But now, Lord, what do I look for? My hope is in you (Psalm 39:4-7).
Death is the destiny of every man; the living should take this to heart (Ecclesiastes 7:2).
No man has power over the wind to contain it; so no one has power over the day of his death (Eccles. 8:8).
From everlasting to everlasting you are God. You turn men back to dust . . . For a thousand years in your sight are like a day that has just gone by, or like a watch in the night. You sweep men away in the sleep of death; they are like the new grass of the morning—though in the morning it springs up new, by evening it is dry and withered. . . . The length of our days is seventy years-or eighty, if we have the strength; yet their span is but trouble and sorrow, for they quickly pass, and we fly away. . . . Teach us to number our days aright, that we may gain a heart of wisdom. . . . May the favor of the Lord our God rest on us; establish the work of our hands for us—yes, establish the work of our hands (Psalm 90).
I have plenty of good things laid up for many years. I’ll take life easy; eat, drink and be merry.’ But God said to him, “You fool! This very night your life will be demanded from you. Then who will get what you have prepared for yourself?” This is how it will be with anyone who stores up things for himself but is not rich toward God (Luke 12:19-21).
Man is destined to die once, and after that to face judgment (Hebrews 9:27).
Built into every person, society and religion is a sense of accountability, a fundamental belief that good will be rewarded and evil will be punished. God has written his moral law on human hearts. There is an inborn sense that everyone will be judged in light of that law.
When Gentiles, who do not have the law, do by nature things required by the law, they are a law for themselves, since they show that the requirements of the law are written on their hearts, their consciences also bearing witness, and their thoughts now accusing, now even defending them. This will take place on the day when God will judge men’s secrets through Jesus Christ, as my gospel declares (Romans 2:14-16).
For he has set a day when he will judge the world with justice by the Man he has appointed (Acts 17:31).
I the LORD search the heart and examine the mind, to reward a man according to his conduct, according to what his deeds deserve (Jeremiah 17:10).
They will be paid back for the harm they have done (2 Peter 2:13).
But they will have to give an account to him who is ready to judge the living and the dead (1 Peter 4:5).
1. God is fully aware of every aspect of our lives and will overlook nothing in our judgment. “Nothing in all creation is hidden from God’s sight. Everything is uncovered and laid bare before him to whom we must give account” (Hebrews 4:13); “For God will bring every deed into judgment, including every hidden thing, whether it is good or bad” (Ecclesiastes 12:14).
2. Our accounting to God will be detailed and extensive: “Men will have to give account on the day of judgment for every careless word they have spoken” (Matthew 12:36).
3. God knows the motives of our hearts, and will judge us in light of those motives: “Therefore judge nothing before the appointed time; wait till the Lord comes. He will bring to light what is hidden in darkness and will expose the motives of men’s hearts. At that time each will receive his praise from God” (1 Corinthians 4:5).
1. Jesus spoke of Hell as a literal place, using graphic terms (Matthew 10:28; 13:40-42; Mark 9:43, 44).
4. Hell will also be inhabited by people who do not accept God’s gift of the Savior (Revelation 20:12-15). Because of man’s sinfulness, he deserves to spend eternity away from the presence of God, in Hell. The opportunity to spend eternity in heaven because of God’s grace is undeserved by men but offered freely by God. 5. Hell is a horrible place of suffering and everlasting destruction (Matthew 13:41, 42; 2 Thessalonians 1:9).
6. In Hell people are fully conscious and retain all their capacities and desires with no hope for any fulfillment for all eternity (Luke 16:22-31).
7. Because God is fair, Hell will not be the same for everyone. The severity of punishment will vary with the amount of truth known and the nature and number of the sins committed (Matthew 11:20-24; Luke 20:45-47, Romans 2:3-5).
1. Heaven is an actual place, to and from which Christ (John 1:32; 6:33; Acts 1:2), angels (Matt. 28:2; Rev. 10:1) and in rare circumstances people, even prior to their deaths, have traveled (2 Kings 2:11; 2 Cor. 12:2; Rev. 11:12). Heaven has light, water, trees and fruit (Rev. 21:1-2), as well as animals (Rev. 6:2-8; 19:11).
2. Heaven is described as a city (Heb. 11:16; 12:22; 13:14; Rev. 21:12). A city is a place of many residences in near proximity, the inhabitants of which are subject to a common government. City normally connotes varied and bustling activity, education and arts. Heaven will be a place of great pleasure, characterized by magnificent beauty, including streets of gold and buildings of pearls and emeralds and precious stones (Rev. 21:19-21). Heaven will have all the advantages we associated with cities on earth, with none of the disadvantages.
3. In heaven, the city’s gates are always open, and people will travel in and out, some bringing treasures into the city (Rev. 21:24-25; 22:14). Travel outside the city shows that the city is not the whole of heaven, but merely its center.
4. In heaven we will worship God (Revelation 5:11-13), serve God (Revelation 7:15) and rule with God (Revelation 22:5). Service and ruling involve responsibilities, duties, effort, and creativity to do work well. This will be work with lasting accomplishment, unhindered by decay and fatigue, and enhanced by unlimited resources. Heaven will be a place of meaningful activity, not boredom.
5. In heaven, we will experience rest from our labors on earth (Rev. 14:13). Heaven’s labor will be refreshing, productive and unthwarted, without futility and frustration. Perhaps it will be like the Adam and Eve did in the Garden of Eden (Gen. 2:15), before sin brought the curse on the ground, with its thorns (Gen. 3:17-19).
6. In heaven, we will celebrate, fellowship, eat and drink (Revelation 19:9; Luke 22:29, 30). Communication, dialogue, corporate worship and other relationship-building interactions all take place heaven (Rev. 1-22). Saints and angels and God Himself will interact together, building and deepening their relationships.
7. Between our entrance to heaven and our resurrection, we may have temporary pre-resurrection bodies (e.g. Luke 16:19ff.; Rev. 6:11). Unlike God and the angels, who are in essence spirits though capable of inhabiting bodies (John 4:24; Heb. 1:14), man is in essence both spiritual and physical (Gen. 2:7). Hence, between our earthly life and our resurrection, a temporary body would allow us to retain the qualities of full humanity.
8. Jesus described heaven as having many rooms or dwellings, and promised that he himself would go there and prepare a place there for us (John 14:2-3). Heaven contains for believers a permanent inheritance, an unperishable estate specifically reserved for us (1 Pet. 1:4).
9. When we are in heaven, it may be possible for us to welcome others into our dwelling places. After speaking of the shrewd servant’s desire to use earthly resources so that “people will welcome me into their houses,” Jesus tells his followers to use “worldly wealth” (earthly resources) to “gain friends” (by making a difference in their lives on earth), “so that when it is gone [when life on earth is over] you will be welcomed into eternal dwellings” (Luke 16:9). Our “friends” in heaven appear to be to those whose lives we’ve touched in a significant way on earth. They will apparently have their own “eternal dwellings.” Luke 16:9 appears to mean literally these eternal dwelling places of friends could be places to fellowship and/or reside in as we move about the heavenly kingdom.
10. Some believers will receive a “rich welcome” when they enter heaven (2 Peter 1:11). It seems likely those who on earth have impacted and/or been impacted by the arriving believer (perhaps including family members), and who have gone to heaven before him, may participate in the welcoming committee at his “rich welcome” into heaven.
11. Heaven is the place and time when all righteous acts—many of which will have been disregarded and some punished on earth—will be finally rewarded. There is a “proper time” for the harvest, a time that normally follows our life on earth—“Let us not become weary in doing good, for at the proper time we will reap a harvest if we do not give up” (Galatians 6:9). The Christian’s works done for God’s glory will have eternal significance—of those who die in Christ, God says “their deeds will follow them” (Rev. 14:13). Our rewards in heaven will link us eternally to our service for Christ while on earth. There is a radical change in our location, but no essential discontinuity between our lives here and there.
Heaven marks the beginning of eternal adventure, but the end of earth’s window of opportunity. As Scripture gives no opportunity for the unbeliever to go back to earth and live his life again and this time to put faith in Christ, so there is no opportunity for the believer to go back and relieve his life, this time for Christ.
Do not be amazed at this, for a time is coming when all who are in their graves will hear his voice and come out—those who have done good will rise to live, and those who have done evil will rise to be condemned (John 5:28-29.
1. Scripture teaches first a judgment of faith, then a judgment of works, both for believers and unbelievers.
2. All true believers will pass the judgment of faith in Christ-their names are written in the Book of Life.
3. All unbelievers will fail the judgment of faith at the Great White Throne, since their names are not written in the Book of Life (Revelation 20:11-15).
4. The judgment of works follows the judgment of faith. Scripture states all men, not just unbelievers, will be judged for their works (Prov. 24:12; Eccles. 12:14).
5. The unbeliever’s judgment of works comes at the Great White Throne (Revelation 20:12).
1. Jesus watches and evaluates the churches, keeping score, giving grades (Revelation 2-3).
2. To Christians Jesus says, “I am he who searches hearts and minds, and I will repay each of you according to your deeds” (Revelation 2:23).
3. At the end of our lives all believers will give an account of their lives to their Lord. “We will all stand before God’s judgment seat. It is written: ‘As surely as I live,’ says the Lord, ‘every knee will bow before me; every tongue will confess to God.’ So then, each of us will give an account of himself to God” (Romans 14:10-12).
4. We will be judged by Christ according to our works, both good and bad (2 Corinthians 5:10).
5. The result of this judgment will be the gain or loss of eternal rewards (1 Corinthians 3:12-15; 2 Corinthians 5:9, 10; Romans 14:10-12).
The Bible treats this judgment with great sobriety. It is not a meaningless formality, but a monumental event in which things of eternal significance are brought to light and things of eternal consequence are put into effect.
1. Some Christians will and others will not hear Christ say, “Well done my good and faithful servant” (Matthew 25:21).
2. Some Christians will be ashamed when they meet Christ—”Dear children, continue in him, so that when he appears we may be confident and unashamed before him at his coming” (1 John 2:28).
If any man builds on this foundation [the foundation of Christ] using gold, silver, costly stones, wood hay or straw, his work will be shown for what it is, because the Day will bring it to light. It will be revealed with fire, and the fire will test the quality of each man’s work. If what he has built survives, he will receive his reward. If it is burned up, he will suffer loss; he himself will be saved, but only as one escaping through the flames (1 Corinthians 3:12-15).
Anyone who does wrong will be repaid for his wrong, and there is no favoritism (Colossians 3:25).
DOES GOD CARE ABOUT OUR WORKS?
Then I heard a voice from heaven say, “Write: Blessed are the dead who die in the Lord from now on.” “Yes,” says the Spirit, “they will rest from their labor, for their deeds will follow them” (Revelation 14:13).
God is not unjust; he will not forget your work and the love you have shown him as you have helped his people and continue to help them (Hebrews 6:10).
In the same way, faith by itself, if it is not accompanied by action, is dead. But someone will say, “You have faith; I have deeds.” Show me your faith without deeds, and I will show you my faith by what I do.… You see that a person is justified by what he does and not by faith alone. In the same way, was not even Rahab the prostitute considered righteous for what she did when she gave lodging to the spies and sent them off in a different direction? As the body without the spirit is dead, so faith without deeds is dead (James 2:17-26).
Who is wise and understanding among you? Let him show it by his good life, by deeds done in the humility that comes from wisdom (James 3:13).
If you do these things [then] you will never fall, and you will receive a rich welcome into the eternal kingdom of our Lord and Savior Jesus Christ (2 Peter 1:10-11).
Consider, to provoke you to good works, that you shall have from God, when you come to glory, a reward for everything you do for him on earth.
1. God promises great reward for those who have served him faithfully.
The time has come for judging the dead, and for rewarding your servants the prophets and your saints and those who reverence your name, both small and great-and for destroying those who destroy the earth (Revelation 11:18).
2. God will reward every servant for this life’s labor.
At that time each will receive his praise from God (1 Corinthians 4:5).
3. God will reward generously.
This is a promise of infinite return—a return far out of proportion to the amount invested.
4. God rewards what we do, not what we believe.
For the Son of Man is going to come in his Father’s glory with his angels, and then he will reward each person according to what he has done (Matt. 16:27).
God will give to each person according to what he has done (Romans 2:6).
Because you know that the Lord will reward everyone for whatever good he does, whether he is slave or free (Ephesians 6:8).
5. God rewards us for kindness to the undeserving.
6. God rewards us for caring for our brothers in need.
7. God rewards us when we care for those too poor or incapacitated to pay us back.
8. God rewards us for wise and productive use of the resources and opportunities he has given us.
9. God rewards us for being persecuted for Christ.
Blessed are you when men hate you, when they exclude and insult you and reject your name as evil, because of the Son of Man. Rejoice in that day and leap for joy, because great is your reward in heaven. For that is how their fathers treated the prophets (Luke 6:22-24).
10. God rewards us for identifying with those suffering for Christ, and for taking material loss.
You sympathized with those in prison and joyfully accepted the confiscation of your property, because you knew that you yourselves had better and lasting possessions. So do not throw away your confidence; it will be richly rewarded. You need to persevere so that when you have done the will of God, you will receive what he has promised (Hebrews 10:34-36).
1. God will reward greater service on earth with greater responsibility in heaven.
His master replied, “Well done, good and faithful servant! You have been faithful with a few things; I will put you in charge of many things” (Matthew 25:21).
2. God will reward faithfulness in the “small things” of this life with leadership over big things in heaven.
“Well done, my good servant!” his master replied. “Because you have been trustworthy in a very small matter, take charge of ten cities” (Luke 19:17).
3. God will make Christians rulers over the earth.
They will be priests of God and of Christ and will reign with him for a thousand years (Revelation 20:6).
4. God will make Christians rulers over angels.
5. God requires certain conditions be fulfilled in order for us to serve as rulers.
If we endure, we shall also reign with him (2 Timothy 2:12).
To him who overcomes, I will give the right to sit with me on my throne (Revelation 3:21).
To him who overcomes and does my will to the end, I will give authority over the nations . . . just as I have received authority from my Father. I will also give him the morning star (Revelation 2:26-28).
1. The Crown of Life—given for faithfulness to Christ in persecution or martyrdom.
Do not be afraid of what you are about to suffer . . . Be faithful, even to the point of death, and I will give you the crown of life (Revelation 2:10).
2. The Incorruptible Crown—given for determination, discipline and victory in the Christian life.
Do you not know that in a race all the runners run, but only one gets the prize? Run in such a way as to get the prize. Everyone who competes in the games goes into strict training. They do it to get a crown that will not last; but we do it to get a crown that will last forever (1 Corinthians 9:24-25).
3. The Crown of Glory—given for faithfully representing Christ in a position of spiritual leadership (1 Pet. 5:1-4).
To the elders among you, be shepherds of God’s flock that is under your care, serving as overseers-not because you must, but because you are willing, as God wants you to be; not greedy for money, but eager to serve; not lording it over those entrusted to you, but being examples to the flock. And when the Chief Shepherd appears, you will receive the crown of glory that will never fade away (1 Peter 5:1-4).
4. The Crown of Righteousness—given for purifying and readying yourself to meet Christ at his return.
The time has come for my departure. I have fought the good fight, I have finished the race, I have kept the faith. Now there is in store for me the crown of righteousness, which the Lord, the righteous Judge, will award to me on that day—and not only to me, but also to all who have longed for his appearing (2 Tim. 4:6-8).
5. The Crown of Rejoicing—given for pouring oneself into others in evangelism and discipleship.
. . . my brothers, you whom I love and long for, my joy and crown . . . (Philippians 4:1).
The twenty-four elders fall down before him who sits on the throne, and worship him who lives for ever and ever. They lay their crowns before the throne and say: “You are worthy, our Lord and God, to receive glory and honor and power, for you created all things, and by your will they were created and have their being” (Revelation 4:10-11).
Though God’s glory is the highest and ultimate reason for any course of action, Scripture sees no contradiction between God’s eternal glory and our eternal good. On the contrary, glorifying God will always result in our greatest eternal good. Likewise, pursuing our eternal good, as he commands us to, will always glorify God.
And when you pray, do not be like the hypocrites, for they love to pray standing in the synagogues and on the street corners to be seen by men. I tell you the truth, they have received their reward in full. But when you pray, go into your room, close the door and pray to your Father, who is unseen. Then your Father, who sees what is done in secret, will reward you (Matthew 6:5-6).
Take the talent from him and give it to the one who has the ten talents. For everyone who has will be given more, and he will have an abundance. Whoever does not have, even what he has will be taken from him (Matthew 25:28-29).
No, I beat my body and make it my slave so that after I have preached to others, I myself will not be disqualified for the prize (1 Corinthians 9:27).
If it is burned up, he will suffer loss; he himself will be saved, but only as one escaping through the flames (1 Corinthians 3:15).
Watch out that you do not lose what you have worked for, but that you may be rewarded fully (2 John 8).
I am coming soon. Hold on to what you have, so that no one will take your crown (Revelation 3:11).
So we make it our goal to please him, whether we are at home in the body or away from it. For we must all appear before the judgment seat of Christ, that each one may receive what is due him for the things done while in the body, whether good or bad. Since, then, we know what it is to fear the Lord, we try to persuade men (2 Corinthians 5:9-11).
Command those who are rich in this present world not to be arrogant nor to put their hope in wealth, which is so uncertain, but to put their hope in God, who richly provides us with everything for our enjoyment. Command them to do good, to be rich in good deeds, and to be generous and willing to share. In this way they will lay up treasure for themselves as a firm foundation for the coming age, so that they may take hold of the life that is truly life (1 Tim. 6:17-19).
I have fought the good fight, I have finished the race, I have kept the faith. Now there is in store for me the crown of righteousness, which the Lord, the righteous Judge, will award to me on that day-and not only to me, but also to all who have longed for his appearing (2 Timothy 4:7-8).
Moses regarded disgrace for the sake of Christ as of greater value than the treasures of Egypt, because he was looking ahead to his reward (Hebrews 11:26).
Do not store up for yourselves treasures on earth, where moth and rust destroy, and where thieves break in and steal. But store up for yourselves treasures in heaven, where moth and rust do not destroy, and where thieves do not break in and steal. For where your treasure is, there your heart will be also (Mt. 6:19-21).
But when you give a banquet, invite the poor, the crippled, the lame, the blind, and you will be blessed. Although they cannot repay you, you will be repaid at the resurrection of the righteous (Luke 14:13-14).
Slaves, obey your earthly masters . . . not only to win their favor when their eye is on you, but like slaves of Christ, doing the will of God from your heart. Serve wholeheartedly, as if you were serving the Lord, not men, because you know that the Lord will reward everyone for whatever good he does, whether he is slave or free. And masters, treat your slaves in the same way. Do not threaten them, since you know that he who is both their Master and yours is in heaven, and there is no favoritism with Him (Ephesians 6:5-9).
Slaves, obey your earthly masters in everything; and do it, not only when their eye is on you and to win their favor, but with sincerity of heart and reverence for the Lord. Whatever you do, work at it with all your heart, as working for the Lord, not for men, since you know that you will receive an inheritance from the Lord as a reward. It is the Lord Christ you are serving. Anyone who does wrong will be repaid for his wrong, and there is no favoritism (Colossians 3:22-25).
Similarly, if anyone competes as an athlete, he does not receive the victor’s crown unless he competes according to the rules. . . if we endure, we will also reign with him. If we disown him, he will also disown us (2 Timothy 2:5, 12).
WHAT MOTIVATES US TO FOLLOW GOD?
But you must not eat from the tree of the knowledge of good and evil, for when you eat of it you will surely die (Genesis 2:17).
Honor the LORD with your wealth, with the firstfruits of all your crops; then your barns will be filled to overflowing, and your vats will brim over with new wine (Proverbs 3:9-10).
But store up for yourselves treasures in heaven, where moth and rust do not destroy, and where thieves do not break in and steal (Matthew 6:20).
Know therefore that the LORD your God is God; he is the faithful God, keeping his covenant of love to a thousand generations of those who love him and keep his commands. But those who hate him he will repay to their face by destruction; he will not be slow to repay to their face those who hate him (Deut. 7:9-10).
“I tell you the truth,” Jesus replied, “no one who has left home or brothers or sisters or mother or father or children or fields for me and the gospel will fail to receive a hundred times as much in this present age (homes, brothers, sisters, mothers, children and fields—and with them, persecutions) and in the age to come, eternal life” (Mark 10:29-30).
Do not be afraid, little flock, for your Father has been pleased to give you the kingdom. Sell your possessions and give to the poor. Provide purses for yourselves that will not wear out, a treasure in heaven that will not be exhausted, where no thief comes near and no moth destroys (Luke 12:32-33).
So we make it our goal to please him, whether we are at home in the body or away from it (2 Cor. 5:9).
Therefore, since we are receiving a kingdom that cannot be shaken, let us be thankful, and so worship God acceptably with reverence and awe (Hebrews 12:28).
MOTIVATION: WHY SHOULD WE OBEY GOD?
1. Out of our love for him as Father and Redeemer (Deuteronomy 7:9; 11:1; 30:20).
2. Out of our fear of him as Creator and Judge (Genesis 2:17; Deuteronomy 28:58-67; Hebrews 10:30-31).
3. Out of our hope in him as Rewarder of those who serve him (Deuteronomy 28:2-9; Hebrews 11:6).
Example of Motivations: WHY SHOULD WE EVANGELIZE?
Out of love for God, gratefulness to God, desire to please God, love for men, fear of their destination without Christ, hope for their fulfillment, hope for their service to God’s glory, fear of our disobedience, hope for our eternal reward.
Each of these motivations is legitimate, and each compliments the other. In God’s universe, what is right is always smart. Sometimes we need the combined persuasiveness of all these incentives to do what is pleasing to the Lord.
The Lord answered, “Who then is the faithful and wise manager? . . . he will put him in charge of all his possessions” (Luke 12:42-44).
Store up for yourselves treasures in heaven, where moth and rust do not destroy (Matthew 6:19-21).
Peter answered, “We have left everything to follow you! What then will there be for us?” Jesus said, “. . . everyone who has left houses or brothers . . . or mother . . . or fields for my sake will receive a hundred times as much and will inherit eternal life” (Matthew 19:27-30).
You have made known to me the path of life; you will fill me with joy in your presence, with eternal pleasures at your right hand (Psalms 16:11).
Rejoice in that day and leap for joy, because great is your reward in heaven (Luke 6:23).
The friend who attends the bridegroom waits and listens for him, and is full of joy when he hears the bridegroom’s voice (John 3:29).
A woman giving birth to a child has pain, but when her baby is born she forgets the anguish because of her joy. So with you: Now is your time of grief, but I will see you again and you will rejoice, and no one will take away your joy (John 16:21-22).
But you have come to Mount Zion, to the heavenly Jerusalem, the city of the living God. You have come to thousands upon thousands of angels in joyful assembly” (Hebrews 12:22).
God appeals to our natures as people, not as sinners. Power, possessions and pleasures are legitimate desires he has instilled in us, and by which he motivates us.
The temptation is to try to grasp onto power, pleasure and possessions here and now, in the present world. The way of the Lord is to gain them in the future not by clinging to them in the present, but by forgoing them in the present!
The three-fold disciplines of fasting, giving and prayer are developed by Christ in Matthew 6:1-18, and each is said to offer a reward, either from man in the short term or God in the long term.
1. Fasting is denying the momentary pleasure of eating to gain eternal pleasure in God.
2. Giving is denying the momentary possession of riches to gain eternal possessions from God.
3. Prayer is denying the momentary exercise of one’s own power to gain the eternal power of God.
Eating, accumulating and ruling are not bad—but in these three spiritual disciplines they are temporarily abstained from to accomplish a higher kingdom purpose.
3. Vow of obedience (forgoing power of self-determination).
One need not forgo power, pleasures or possessions because he hates them. He may forgo them because he wants them in their purest forms, in another time, another world. Jesus told his disciples they could become great in the next world by being a servant in this one (Mark 10:42-44), and they could become rich in the next world by giving up riches in this one (Matthew 6:19-21).
Given the limitations of sin, we are ill-equipped to handle large doses of power, pleasures and possessions in this life. In heaven we will be sinless, and will not abuse the power, pleasure and possessions entrusted to us.
CAN APPEALS TO OUR DESIRES REALLY BE SPIRITUAL?
It has been cited as a flaw in Christianity that it is more concerned with the world to come than with the world that now is, and some have been fluttering about trying to defend the faith of Christ against this accusation. Both the attack and the defense are wasted. No one who knows what the New Testament is about will worry over the charge that Christianity is other-worldly. Of course it is, and that is precisely where its power lies.
Let no one apologize for the powerful emphasis Christianity lays upon the doctrine of the world to come. Right there lies its immense superiority to everything else within the whole sphere of human thought or experience. When Christ arose from death and ascended into heaven He established forever three important facts, namely, that this world has been condemned to ultimate dissolution, that the human spirit persists beyond the grave and that there is indeed a world to come.
He has made everything beautiful in its time. He has also set eternity in the hearts of men; yet they cannot fathom what God has done from beginning to end (Ecclesiastes 3:11).
But our citizenship is in heaven. And we eagerly await a Savior from there, the Lord Jesus Christ (Phil. 3:20).
We are therefore Christ’s ambassadors (2 Cor. 5:20).
Since you call on a Father who judges each man’s work impartially, live your lives as strangers here in reverent fear (1 Peter 1:17).
Dear friends, I urge you, as aliens and strangers in the world, to abstain from sinful desires, which war against your soul (1 Peter 2:11).
For while we are in this tent, we groan and are burdened, because we do not wish to be unclothed but to be clothed with our heavenly dwelling, so that what is mortal may be swallowed up by life (2 Corinthians 5:4).
By faith Abraham, when called to go to a place he would later receive as his inheritance, obeyed and went, even though he did not know where he was going. . . For he was looking forward to the city with foundations, whose architect and builder is God (Hebrews 11:8-10).
All these people were still living by faith when they died. They did not receive the things promised; they only saw them and welcomed them from a distance. And they admitted that they were aliens and strangers on earth. People who say such things show that they are looking for a country of their own. If they had been thinking of the country they had left, they would have had opportunity to return. Instead, they were longing for a better country—a heavenly one. Therefore God is not ashamed to be called their God, for he has prepared a city for them (Hebrews 11:13-16).
By faith Moses, when he had grown up, refused to be known as the son of Pharaoh’s daughter. He chose to be mistreated along with the people of God rather than to enjoy the pleasures of sin for a short time. He regarded disgrace for the sake of Christ as of greater value than the treasures of Egypt, because he was looking ahead to his reward. By faith he left Egypt, not fearing the king’s anger; he persevered because he saw him who is invisible (Hebrews 11:24-27).
But the day of the Lord will come like a thief. The heavens will disappear with a roar; the elements will be destroyed by fire, and the earth and everything in it will be laid bare. Since everything will be destroyed in this way, what kind of people ought you to be?
You ought to live holy and godly lives as you look forward to the day of God and speed its coming. That day will bring about the destruction of the heavens by fire, and the elements will melt in the heat. But in keeping with his promise we are looking forward to a new heaven and a new earth, the home of righteousness. So then, since you are looking forward to this, make every effort to be found spotless, blameless and at peace with him (2 Peter 3:10-14). | 2019-04-23T10:14:27Z | https://www.epm.org/resources/2010/Jan/14/eternal-rewards/ |
Reading Time: ~< 1 min.
As digital natives become more immersed in and dependent upon technology, they are likely to experience “cyber fatigue,” which can be thought of cybersecurity complacency. Paired with the invincible feeling that often accompanies being young, this can be a dangerous combination. It’s easy to mistakenly believe that hacked devices and identity theft are things that only happen to adults. Kids and teenagers, however, are just as high-risk and the impacts of cybersecurity breaches could potentially affect them for years into their future. So how can we protect our kids’ digital lives in the same way we protect their offline lives?
The internet may seem like a playground of endless entertainment, but we need to educate our children about the dangers that exist there as well. Have you had a friend or family member who’s been hacked or somehow had important information compromised? Talk to your kids about it, how it happened, why it happened, and the work needed to fix it. These real-life examples may be one of your most powerful education tools, as they help children more concretely understand the concept of cybersecurity threats. Demonstrating that these things can happen to anyone, including them, is the quickest way to get their cybersecurity guard up. Looking for fresh ideas on how to talk to your kids about cybersecurity? Check out the Webroot Community for advice and tips.
Teach your children about the most common cybersecurity threats, especially ones that are particularly pervasive on social media, including phishing, identity theft, and malicious websites. They should never accept private messages from people they don’t know, or click on links from friends or family that seem out of character or suspect. If they aren’t sure a message from a friend is actually from that individual, they should not hesitate to verify their identity by calling them, or by asking specific questions only that individual would know. The comments sections of websites like YouTube are also potential flashpoints. Clever comments can entice users into clicking on a risky link that navigates them to a malicious site.
The temptation to download an illegal copy of a favorite movie, game, or album can be strong, but ethical and legal implications aside, it remains one of the most risky online behaviors. In fact, a recent study found that there was a 20% increase in malware infection rates associated with visits to infringing sites. Make sure your kids know the impact illegal downloads have on their security, and inform them of alternative streaming and download options. If you’re able, give your child an allowance for services like Steam for video games, or Amazon Video for films and shows. Providing them with alternative options is the best way to keep your child from giving into the temptation of illegally torrenting content.
A recent study found that people aged 15 to 24 spend about four hours a day on their phones. This works out to roughly 1,456 hours of mobile engagement a year, making mobile devices one of the most vulnerable entry points for cybersecurity breaches. Make sure your child’s phone is protected with a pin number, password, or biometrics on the lock screen, and that they know to leave Bluetooth turned off when not in use. Connecting to public WiFi networks could also leave your child vulnerable, but you can protect their devices from open networks by securing them with a VPN.
Many young people today use anonymous or “private” messaging services, like Whisper, Sarahah, or Snapchat, believing that they are protected by the apparent anonymity. However, cybersecurity experts have long been critical of these services, as nothing online is 100% anonymous.
Free applications have to make a profit somewhere, which often means that they are storing, tracking and selling user data. This is particularly dangerous as users are lulled into a false sense of security, which can quickly be shattered when these services are affected by a cybersecurity breach. Make sure your kids know nothing they say online is truly private, and that a negative digital footprint can drastically alter the course of their lives.
We believe cybersecurity is a shared responsibility, and that it is not just up to parents to educate digital natives. This is why we’ve developed a cybersecurity awareness initiative with the Aurora Public School System in Colorado. In addition to providing students with online safety tips, we’ve given them insights on potential career paths, and connected them with our engineers to solve problems using skills like math and coding that could benefit them later in their careers.
We encourage parents to explore and advocate for cybersecurity and STEM education opportunities for children in their local communities. For more educational content to help keep your family safe from cyber threats, visit the Home + Mobile section of our blog.
Earlier this week, a security researcher found payment card-stealing scripts running on the Infowars online site. The scripts managed to stay active for nearly 24 hours. At least 1,600 users of the site may have been affected during this period, though many were returning customers who wouldn’t have had to re-enter their payment information into the compromised forms. As of writing, the malicious scripts being used by Magecart are active on nearly 100 other online stores, with almost 20% getting re-infected within a two-week period.
A lawsuit recently revealed that savvy scammers successfully took nearly €19 million through a series of unauthorized transfers from a spoofed personal email address of the company’s CEO. After requesting additional information from the scammers, who continued to provide highly-detailed documents suggesting their legitimacy, several payments were transferred from the company’s main cash pool with promises of a quick payback from the scammers.
The headmaster of a Chinese school was fired after staff discovered an excessively high power bill previously written off as a faulty HVAC system was actually caused by several cryptomining rigs running off the school’s electricity. The headmaster brought the mining machines into the school in mid-2017 and evaded blame for the excess power consumption until the physical proof was discovered. While it appears no other harm was done, cryptomining software can be dangerous, as you can never be sure nothing else is bundled with it.
Researchers have been monitoring a relatively new botnet that is currently controlling over 100,000 devices, including 116 device types from multiple manufacturers. By taking advantage of well-known bugs within Universal Plug n Play, hackers can quickly take control of the device and begin monitoring traffic from outside of the network.
After originally claiming a data breach had taken place last month, affecting 9.4 million customers, new findings have shown the attacks have been happening regularly since March. Even though local laws didn’t require the company to notify authorities regarding a data breach, it is still surprising that it has taken almost nine months to determine what data had been exposed and what hadn’t.
It’s no secret that Black Friday and Cyber Monday are marked by an uptick in online shopping. Cyber Monday 2017 marked the single largest day of online sales to date, with reported sales figures upwards of $6.5 billion. Data from Webroot charted a 58 percent increase in traffic to shopping sites on that day. And while Black Friday originated as a day to tussle with your neighbors for deals in person, online retailers like Amazon and eBay wouldn’t be left out and have begun offering their own deals.
What’s less often discussed is the corresponding rise in cybercrime that accompanies these online retail holidays. Webroot noted a surge in phishing and fraud sites of 203 percent between November 19 and December 5, with the number of such sites peaking on Cyber Monday. Instances of spyware and adware also rose 57 percent during the busy holiday shopping period, again peaking on Cyber Monday.
For business owners and those in IT, Cyber Monday likely means lost productivity as employees bargain hunt at work rather than actually work. (It’s interesting to note that, according to CNET, the first Cyber Monday in 2005 was intentionally made to fall on a weekday so workers could browse shopping sites on faster computers.) As our data shows, more than just a few hours of lost productivity are at stake.
Employees expose business owners to greater risks of phishing scams, ransomware, and other types of attack that could significantly lengthen downtimes for all employees, or even shutter a business completely. According to a Better Business Bureau study on cybercrime, more than half of businesses would cease to be profitable within a month if a ransomware attack were to lock them out of essential data.
What’s a Business Owner to Do about Cyber Monday?
Whether you’re a business owner or provide IT services, you’re likely to see employees or clients indulging in deals this Cyber Monday. But there are strategies for limiting your risk on November 26. As with much of cybersecurity, you can manage your policy for online shopping based on what you consider acceptable levels of risk.
With network-level protection it’s possible to block access to any sites categorized as “shopping,” while still whitelisting trusted domains. Our research shows Amazon, the Apple iTunes Store, and Walmart rounded out the top three most visited shopping sites last Cyber Monday, so employers may want to consider whitelisting those sites specifically, while still blocking less reputable ones. Webroot offers DNS protection with the ability to filter according to more than 80 categories, including gambling, adult content, and weapons, as well as shopping. Set a policy to block the shopping category this Cyber Monday, with your own tailored exceptions and presto, problem solved.
There are also other, less prohibitive strategies for protecting employees and clients, too. Tools like Webroot’s Web Classification and Reputation services forecast the risks of visiting more than 27 billion URLs, which can help user determine if that deal really is a little too good to be true. IP Reputation Services make a similar determination based on an IP’s risk score.
Real-Time phishing protection and hands-on phishing simulations can go a long way toward improving security, too. The surge in these types of attacks represents cybercriminals focus on the weakest element of a company’s IT security: the end users themselves. Catching phishing attacks before they’re clicked and teaching users to be vigilant about threats by using custom phishing templates are paramount to your business’s security posture.
So there are a variety of methods for limiting disruption from online shopping in the workplace, so business owners and managed service providers shouldn’t let Cyber Monday come and go without preparation. Employees will almost certainly be on an online hunt for deals and cybercriminals know it.
Focus on security now, before a user’s big savings end up costing you.
HSBC has been monitoring some unauthorized access occurring over a ten-day period on their customer’s online accounts. During this time, attackers used credentials that were likely part of prior breaches to access numerous accounts. HSBC worked quickly to disable online access to any accounts that showed suspicious activity. The bank also began notifying potential victims of the incident and have taken additional steps in securing their online access points.
With the rollout of Google’s Chrome 71, the company is looking to enhance the user experience by blocking all advertisements on sites that have continued to allow the hosting of offensive material. Chrome 71 will also be more efficient at blocking phishing attacks and misleading pop-up notifications that may redirect users. Fortunately, sites that are flagged can check their status and are given 30 days to correct for offending content.
A Canadian University was forced to shut down its entire network after IT staff discovered a cryptocurrency miner operating illicitly on several university systems. While they are still unsure who installed the cryptominer, they have removed the software from the systems and brought the remainder of the networks back online. Along with slowly restoring the remaining services taken offline, the university also forced a password change for all current users.
Several arrests in Ohio have recently revealed a new scam that leverages SMS phishing attacks to withdraw money from ATMs that don’t require the use of a bank card. By sending a victim’s smartphone an SMS message containing a link to “unlock” their accounts, they are redirected to a phony site that steals their credentials. The scam has netted the attackers nearly $68,000 over a two-week period.
Even as Twitter-based Bitcoin scams have slowed, a new Elon Musk spoof account has popped up with the usual offer to multiply any amount of Bitcoins received and return the inflated amount. This scammer may have the benefit of taking over a verified account, but modifications to the profile name and obvious spelling errors reveal its clearly not legitimate, though it does leave raise questions regarding the verification system’s security.
Threat researchers and other cybersecurity industry analysts spend much of their time trying to anticipate the next major malware strain or exploit with the potential to cause millions of dollars in damage, disrupt global commerce, or put individuals at physical risk by targeting critical infrastructure.
However, a new Webroot survey of principals at 500 small to medium-sized businesses (SMBs), suggests that phishing attacks and other forms of social engineering actually represent the most real and immediate threat to the health of their business.
Twenty-four percent of SMBs consider phishing scams as their most significant threat, the highest for any single method of attack, and ahead of ransomware at 19 percent.
Statistics released by the FBI this past summer in its 2017 Internet Crime Report reinforce the scope of the problem. Costing nearly $30 million in total losses last year, phishing and other social engineering attacks were the third leading crime by volume of complaints, behind only personal data breaches and non-payment/non-delivery of services. Verizon Wireless’s 2018 Data Breach Investigations Report, a thorough and well-researched annual study we cite often, blames 93 percent of successful breaches on phishing and pretexting, another social engineering tactic.
So how are businesses responding? In short, not well.
24 percent of principals see phishing scams as the number one threat facing their business. Only 35 percent are doing something about it with cybersecurity awareness training.
One of the more insidious aspects of phishing as a method of attack is that even some otherwise strong email security gateways, network firewalls and endpoint security solutions are often unable to stop it. The tallest walls in the world won’t protect you when your users give away the keys to the castle. And that’s exactly what happens in a successful phishing scam.
Despite this, our survey found that 65 percent of SMBs reported having no employee training on cybersecurity best practices. So far in 2018, World Cup phishing scams, compromised MailChimp accounts, and opportunist GDPR hoaxers have all experienced some success, among many others.
So, can training change user behavior to stop handing over the keys to the castle? Yes! Cybersecurity awareness training, when it includes features like realistic phishing simulations and engaging, topical content, can elevate the security IQ of users, reducing user error and improving the organization’s security posture along the way.
The research and advisory firm Gartner maintains that applied examples of cybersecurity awareness training easily justify its costs. According to their data, untrained users click on 90 percent of the links within emails received from outside email addresses, causing 10,000 malware infections within a single year. By their calculations, these infections led to an overall loss of productivity of 15,000 hours per year. Assuming an average wage of $85/hr, lost productive costs reach $1,275,000 which does not necessarily account for other potential costs such as reputational damage, remediation cost, or fines associated with breaches.
And it’s not just phishing attacks users must be trained to identify. Only 20 percent of the SMBs in our survey enforced strong password management. Ransomware also remains a significant threat, and there are technological aspects to regulatory compliance that users are rarely fully trained on. Even the most basic educational courses on these threats would go a long way toward bolstering a user’s security IQ and the organizations cybersecurity posture.
Finding after finding suggests that training on cybersecurity best practices produces results. When implemented as part of a layered cybersecurity strategy, cybersecurity awareness training improves SMB security by reducing the risks of end-user hacking and creating a workforce of cyber-savvy end users with the tools they need to defend themselves from threats.
All that remains to be seen is whether a business will act in time to protect against their next phishing attack and prevent a potentially catastrophic breach.
You can access the findings of our SMB Pulse Survey here.
You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password constraints. They’re rules for how you must construct a password. If your password must be at least eight characters long, contain lower case, uppercase, numbers and symbol characters, then you have one length, and four character set constraints.
Password constraints eliminate a number of both good and bad passwords. I had never heard anyone ask “how many potential passwords, good and bad, are eliminated?” And so I began searching for the answer. The results were surprising. If you want to know the precise number of possible 8-character passwords there are if all of the character sets must be used, then the equation looks something like this.
We choose to use a Monte Carlo simulation to analyze the mathematical impact of the various combinations of constraints. A Monte Carlo simulation uses a statistical analysis approach that provides a close approximation of the answer, while also providing the flexibility to quickly and easily measure the impact of each constraint and combination of constraints.
To start, let’s look at the impact of an eight-character length constraint alone. There are 95^8 possible combinations of 8 characters. 26 uppercase letters + 26 lowercase letters + 10 numerals + 33 symbols = 95 characters. For a length of 8 characters, we have 95˄8 possible passwords.
If a password must be at least 8 characters long, then there are also about 70.6 trillion otherwise viable passwords you are not allowed to use (95+(95^2 ) +(95^3 ) +(95^4 ) +(95^5)+(95^6 )+(95^7)). That’s a good thing. It means you can’t use 95 one character passwords, 9,025 two character passwords, and so on. Almost 70 trillion of those passwords you cannot use are seven characters long. This is a great and wholly intended effect of a password length constraint.
The problem with a lack of constraints is that people will use a very small set of all possible passwords, which invariably includes passwords that are incredibly easy to guess. In the analysis of over one million leaked passwords, it was found that 30.8 percent passwords eight to 11 characters long contained only lowercase letters, and 43.9 percent contained only lowercase letters and numbers. In fact, to perform a primitive brute force attack against an eight-character password containing only lower case letters, it’s only necessary to try about 209 billion character combinations. That does not take a computer very long to crack. And, as we know from analyzing large numbers of passwords, it’s likely to contain one of the most popular ten thousand passwords.
To beef up security, we begin to add character constraints. But, in doing so, we decrease the number of possible passwords; both good and bad.
Just by requiring both uppercase and lowercase letters, more than 15 percent of all possible 8-character combinations have been eliminated as possible passwords. This means that 1QV5#T&|cannot be a password because there are no lowercase letters. Compared to Darnrats,which meets the constraint requirements, 1QV5#T&|is a fantastic password. But you cannot use it. Superior passwords that cannot be used are acceptable collateral damage in the battle for better security. “Corndogs” is acceptable, but “fruit&veggies” is not. This clearly is not a battle for lower cholesterol.
If a password must be exactly eight characters long and contain at least one lower case letter, at least one uppercase letter and at least one symbol, we are getting close to one-in-five combinations of 8 characters that are not allowable as passwords. Still, the effect of constraints on 12 and 16 character passwords is negligible. But that is all about to change… you can count on it.
Are you required to use a password that is at least eight characters long, has lower and uppercase letters, number and symbols? Just requiring a number to be part of a password removes over 40 percent of 8-character combinations from the pool of possible passwords. Even though you can use lowercase and uppercase letters, and you can use symbols, if one of the characters in your password must be a number then there are far fewer great passwords that you can use. If a 16 character long password must have a number, then 13 times more potential passwords have become illegal as a result of that one constraint than the combined constraints of lower and uppercase letters and symbols caused. More than one-in-four combinations of 12 characters can no longer become a passwords either.
People tend to be very predictable. There are more symbols (than there are in any other characters set. Theoretically that means that symbols are going to do the most to make a password strong, but 80 percent of the time it is going to be one of the top five most frequently used symbols, and 95 percent of the time is will be one of the top 10 most frequently used symbols.
Analysis of two million compromised passwords showed that about one in 14 passwords start with the number one, however for those that started with the number one, 75 percent of them ended with a number as well.
The use of birthdays and names, for example, make it much easier to quickly crack many passwords.
As covered above, all four character sets (95 characters) in an eight character password allow for about 6.634 quadrillion different password possibilities. But a 16 character password with only lowercase letters has about 43.8 sextillion possible passwords. That means that there are well over 6.5 million times more possible passwords for 16 consecutive lowercase letters than for any combination of eight characters regardless of how complex the password is.
My great password is “cats and hippos are friends!”, but I can’t use it because of constraints – and because I just told you what it is.
For years password experts have been advocating for the use of simple passphrases over complex passwords because they are stronger and simpler to remember. I’d like to throw a bit of gasoline on to the fire and tell you, those 95^8 combinations of characters are only half that many when you tell me I have to use uppercase, lowercase, numbers, and symbols.
DemonBot, while not the most sophisticated botnet discovered to date, has seen a significant rise in usage over the last week. With the ability to take control of Hadoop cloud frameworks, DemonBot has been using the platform to carry out DDoS attacks across the globe. By exploiting Hadoop’s resource management functionality, the infection can quickly spread itself and allows for remote code execution on affected servers.
Bank Islami, one of the largest banks in Pakistan, announced that an unusual attack had occurred involving local cards used far outside of the country’s borders. While the bank was quick to return the funds removed from customer’s accounts, the remainder of the malicious transactions processed internationally have the bank being on the hook for nearly $6 million in phony withdrawals, mainly in the US and Brazil. Unfortunately, due to a lack of information regarding the malicious transactions, several other top banks in the country were forced to temporarily restrict international purchases to protect their own clients.
Researchers recently discovered the credentials for over 600,000 individuals, all closely tied to construction or building firms, available for sale on the dark web. Presently it appears that the credentials were all compromised during breaches involving third-parties users would have given corporate email into, rather than specific breaches for the industry group. Fortunately, it appears there haven’t been any related breaches thus far, though this type of data could lead to additional sensitive information being stolen.
A new ransomware variant has been making an unusual request from its victims: allowing remote desktop access in order to decrypt their files. Dubbed CommonRansom, due to the appended extension on the encrypted files, the variant also demands a 0.1 Bitcoin payment before making the request for administrator credentials to the victim’s computer. Even though this variant isn’t widespread, it does appear to be using a similar Bitcoin wallet as other infections, as 65 Bitcoins were recently sent from the designated wallet.
The Centers for Medicare & Medicaid Services (CMS) announced last week they had discovered malicious activity within their direct enrollment pathway, which connects patients and healthcare brokers. At least 75,000 individuals were affected. The pathway has since been disabled to prevent further exposure. Until the pathway is fixed, hopefully within a week, CMS is contacting affected patients and offering them credit protection services.
City officials in West Haven, Connecticut finally gave in to ransom demands following a cyberattack against their systems. The attack began early Tuesday morning and disabled 23 individual servers before a decision was made to pay a ransom in hopes for the return of their data. While it is still unclear if the systems were fully restored, the town was lucky to receive a relatively small ransom request ($2,000 given the significant amount of data stolen.
A string of eight adult sites, all owned by the same individual, fell victim to hackers who took advantage of poor security to expose records for up to 1.2 million individuals. While not as large as similar adult-related breaches, it still presents questions as to why proper security measures aren’t put in place on these sites proactively. The owner of the sites has since taken them down and replaced them with messages warning users to update their passwords and take extra security precautions.
A new browser-based tech support scam has been spotted recently that warns users their McAfee subscription has run out and needs to be renewed. Rather than redirect victims through an affiliate link to the real McAfee site, though, this latest scam directly prompts the user to input payment card information and other personal data into a small pop-up window. To top it off, once payment info is entered, an additional pop-up appears that suggests contacting support to help install your new software and eventually falsely claiming payment wasn’t successful and users must re-purchase the software.
The city of Muscatine, Iowa is working to determine how several of their main computer systems, both within city hall and its library, were infiltrated by ransomware that’s knocked them offline. Officials have announced that no information was stolen and the city does not maintain any payment records, so citizens shouldn’t be worried. The city’s emergency services were also unaffected and continue to operate as normal.
By now, you likely know that a Virtual Private Network (VPN) is essential to remaining safe when working remotely. But, once set up, how can you optimize your VPN to work well with your devices and meet your security needs? Here are our top five tips for maximizing your VPN experience.
One of the biggest misconceptions about VPNs is that they protect your device from malicious programs. While a VPN will encrypt your network traffic, preventing others from viewing intercepted data, most do not warn you when you visit dangerous sites. If your VPN provides advanced web filtering for risky sites, that can be an additional defense against cyber threats such as malware and phishing. Alternatively, while strong antivirus software actively monitors for viruses and malware within files and applications, it does not encrypt your data or prevent it from being monitored. Both are equally important for protecting your devices, and are ideally used together. Combining the two services provides additional security.
Setting up a VPN to keep your data safe is an important first step, but what happens if your VPN server goes down or disconnects while you are entering sensitive data and you don’t notice the connection was lost? Without the protection of a VPN kill switch, your devices will often automatically reconnect to the network without alerting you, this time without the protection of your VPN. A kill switch feature blocks sending and receiving data until the VPN connection is re-established.. For maximum protection, select a VPN with a kill switch feature and ensure it has been enabled.
Having a VPN on your home router may seem like a helpful boost to your cybersecurity, but it’s actually the opposite. Most routers lack the processing power of a modern CPU, meaning that even older personal devices (phones, tablets, computers) will have a much easier time handling the task of encrypting/decrypting data than your router will. Instead, set up a VPN for each personal device to prevent a bottleneck of data to your router while simultaneously securing it at all access points. Selecting an easy-to-use VPN solution with cross-device functionality will make this task much easier on the end user, while providing maximum security.
When it comes to cybersecurity, we tend to imagine a nefarious hacker out to steal and sell your data. But not all data collection is illegal. Your Internet Service Provider (ISP) has a vested interest in tracking your streaming habits, and they may even throttle your network depending on your usage. Our phones, computers, and tablets are each a potential interception point for our private data. Securing each of your smart devices with a VPN, even those that stay in your home, is the best way to prevent your data from potentially being monitored by third parties.
While your cellular network is more secure than public WiFi options, it remains vulnerable to an attack. LTE user data can be exploited by what is known as an “aLTEr attack”. This attack redirects domain name system (DNS) requests, performing a DNS spoofing attack that can fool your device into using a malicious DNS server. This spoofed DNS server will deliver you to websites as normal until you request a high-value website the attack is targeting, like your banking or email provider. Oftentimes this fake website will scrape your data before you realize what has happened. You give yourself an extra layer of security by wrapping your LTE connection in a VPN, allowing you to access your most sensitive data confidently.
When it comes to getting the most out of your VPN, this list is just the beginning. Our privacy concerns and security needs will continue to change as our connected devices mature and we recommend keeping an eye on your VPN provider for any potential updates to their services.
Ready to take back control of your privacy? Learn how our Webroot WiFi Security VPN protects what matters most wherever you connect.
As the United States midterm elections draw closer, concern surrounding voter information is on the rise, and for good reason. Records for nearly 35 million registered voters from 19 different states were found for sale on a hacker forum, with prices ranging from $500 to $12,500, depending on the state. Unfortunately, a crowdfunding campaign has begun on the forums to purchase each database and post them publicly, with 2 states already being published.
Just a week after Hurricane Florence hit land in North Carolina, a coastline county’s water utilities fell victim to a ransomware attack. Effectively shutting down all services during a time when they are working on emergency operations left the local water authority with limited capabilities until they began the lengthy process of restoring everything from backup files. By choosing to ignore the ransom and restore manually, the utility service has taken on a more time and resource consuming task, as they continue operating without any of their online systems.
A new exploit has been discovered that allows attackers to send a malicious message to other PlayStations that will effectively render the console unusable. The message itself doesn’t even need to be opened to cause considerable damage, resulting in most users performing a factory reset to return everything to normal. While some users have been successful in deleting the message from the mobile app before it causes any harm, others still had to rebuild the system’s database.
Days after Apple released a patch for iOS 12.0 that shutdown a passcode bypass method, the same researcher was able to find yet another way to access the phone illicitly. By using a combination of Siri and the VoiceOver feature, anyone with physical access to the device could obtain pictures, and other data with ease. To make matters worse, the latest bypass also gives attackers the ability to send files to other devices and view them in full resolution, rather than minimized like the previous bypass allowed.
Over the weekend, thousands of emails were sent out to the relatively small population of Iceland, most of which claimed to be from the local police and threatened judicial action if they did not comply. The email then linked victims to a nearly perfect replica of the official Icelandic Police website and requested their social security number. The attack itself was focused on gaining bank details and further compromising already infected computers for more information.
Your SMB clients will be attacked.
Basic security will not stop an attack.
The MSP will be held accountable.
While MSPs may have historically set up clients with “effective” security measures, the threat landscape is changing and the evolution of risk needs to be properly, and immediately, addressed. This means redefining how your clients think about risk and encouraging them to respond to the significant increase in attack volume with security measures that will actually prove effective in today’s threat environment.
Even if the security tools you’ve been leveraging are 99.99% effective, risk has evolved from minimal to material due simply to the fact that there are far more security events per year than ever before.
Again, the state of cybersecurity today is pretty straightforward: with advanced threats like rapidly evolving and hyper-targeted malware, ransomware, and user-enabled breaches, foundational security tools aren’t enough to keep SMB clients secure. Their data is valuable, and there is real risk of a breach if they remain vulnerable.Additional layers of security need to be added to the equation to provide holistic protection. Otherwise, your opportunity to fulfill the role as your clients’ managed security services providerwill be missed, and your SMB clients could be exposed to existential risk.
Start by discussing “acceptable risk.” Your client should understand that there will always be some level of risk in today’s cyber landscape. Working together to define a businesses’ acceptable risk, and to determine what it will take to maintain an acceptable risk level, will solidify your partnership. Keep in mind that security needs to be both proactive and reactive in its capabilities for risk levels to remain in check.
Once you’ve identified where the gaps in your client’s protection lie, map them to the type of security services that will keep those risks constantly managed. Providing regular visibility into security gaps, offering cybersecurity training,and leveraging more advanced and comprehensive security tools will ultimately get the client to their desired state of protection—and that should be clearly communicated upfront.
At this point, it’s not a question of ifSMBs will experience a cyberattack, but when. That’s why it’s important to establish ongoing, communicative relationships with all clients. Assure clients that your security services will improve their risk level over time, and that you will maintain acceptable risk levels by consistently identifying, prioritizing, and mitigating gaps in coverage. This essentially justifies additional costs and opens you to upsell opportunities over the course of your relationship.
Keeping your security solutions well-defined and client communication clear will help validate your offering. Through a combination of advanced software and services, you can build a framework that maps to your clients’ specific security needs so you’re providing the technologies that are now essential for securing their business from modern attacks.
Once you understand how to effectively respond to new and shifting risks, you’ll be in the best possible position to keep your clients secure and avoid potentially debilitating breaches.
For the past 20 years, Webroot’s technology has been driven by our dedication to protecting users from malware, viruses, and other online threats. The release of Webroot® WiFi Security—a new virtual private network (VPN) app for phones, computers, and tablets—is the next step in fulfilling our commitment to protect everyone’s right to be secure in a connected world.
Webroot WiFi Security arrives at a time when the fragile state of our online privacy is becoming more apparent and better understood by internet users around the world. Recent revelations of government surveillance via the Snowden leaks, social media data collection like that in the Facebook/Cambridge Analytica scandal, and data breaches including the Equifax hack have fueled a palpable rise in data privacy concerns.
Over half of internet users from around the world say they are “more concerned about their online privacy than they were a year ago,” according to a 2018 CIGI-Ipsos Global Survey on Internet Security and Trust.
Another key factor with grave implications for data privacy in the United States specifically was the 2017 repeal of privacy regulations for Internet Service Providers (ISPs), which aimed to ensure broadband customers had choice, greater transparency, and strong security protections for their personal info collected by ISPs.
“ISPs are facing less regulation today, and so can continue to share, sell, and profit by passing on user information to third parties— browser history, location, communications content, financial details, etc.—without the user’s knowledge or consent,” said Webroot Sr. VP of Product Strategy & Technology Alliances Chad Bacher.
Now more than ever, individual users must take steps to regain control over their online privacy and security. Along with keeping trusted antivirus software installed on mobile and home devices, users should actively protect their data in transit over networks with a VPN.
But it’s important to note that all VPN applications are not created equal. Many users looking for a privacy solution find themselves wondering if they can trust that their VPN provider has their interests at heart. Consumer wariness concerning the privacy of VPN products is justified—some VPN apps, especially free ones, are guilty of sharing or selling their user data to third parties, limiting bandwidth, or serving ads. Facebook’s VPN app was recently removed from the Apple App Store® following concerns over the app’s misuse of user data.
Webroot WiFi Security provides one of the most powerful forms of encryption available, AES 256-bit encryption, and protects user data from cybercriminals and ISPs alike. Webroot WiFi Security does not collect your browsing activity, the sites you visit, downloaded data (or shared or viewed), DNS queries, or IP addresses. The full Webroot WiFi Security Privacy Statement can be found here.
In addition to the privacy safeguards of Webroot WiFi Security that protect users while they work, share, bank, and browse online, users also benefit from the integration of Webroot BrightCloud® Threat Intelligence.* The app’s Web Filtering feature provides an extra layer of protection to keep your financial information, passwords, and personal files from being exploited. Webroot WiFi Security is powered by the same threat intelligence platform the world’s leading IT security vendors trust.
“Not only is Webroot protecting user privacy, it’s also shielding users from phishing sites and websites associated with malware,” said Malinger.
Webroot WiFi Security is compatible with devices running iOS®, Android™, macOS® and Windows® operating systems, and is now available to download on the Apple App Store, Google Play™ store, and Webroot.com. | 2019-04-24T04:50:12Z | https://www.webroot.com/blog/page/5/ |
In this debate, Peter Navarro, the director and producer of the movie "Death by China," and Phil Potter debate wheter China's unfair trade and membership in the WTO are the primary causes of job losses and weak US growth. September, 2012.
Related: Ford Policy Union - U.S.-China Relations: Cooperation or Conflict?
>> My name is Cynthia Rathinasamy and I am an MPP here at the Ford School, and I'll be your moderator today. So on behalf of Alstom, I'd like to welcome you all to the first of the policy -- Ford Policy MU Debates. These debates, sponsored by the Ford School's International Policy Center are intended to bring informed discussion of international policy issues of importance and interest to the students of the Ford School, the University of Michigan community and the wider policy world as a part of the Ford School's mission to educate the future policymakers. The International Policy Center plans to host several of these events over the remainder of this academic year, and continue the series in subsequent years to enrich the educational experiences of students, bring the leading voices on key policy issues to the Ford School, and contribute to the wider, more informed discussion. Today's topic is the issue of U.S. - China relations, and in particular U.S. - China trade relations. I will explain the conduct of the debate in a moment, but first I'd like to welcome our two participants, first let me introduce Doctor Pete Navarro, a professor of economics and public policy at the Paul Merage School of Business at the University of California, Irvine, welcome.
>> Our other participant [applause], other participant is Doctor Phil Potter, an assistant professor of public policy here at the Ford School, specializing in international security and American foreign policy. If you all could please -- and welcome [applause]. If you all could please refer to your programs for their full biographies they have more -- much more information in there. So our debate today will be conducted in a fashion similar to a competitive forensic debate but with the difference that there will be participation by the audience. The debate will center on the following question: whether China's trade and membership in the World Trade Organization are not the primary causes of job losses and weak growth in the United States. Doctor Potter will be advocating for the passage of this resolution, while Doctor Navarro will argue against passage. In all rounds of the debate, Doctor Potter, as the advocate, will go first. The debate will begin with each debater giving a twelve-minute opening statement of his argument, with the argument for resolution by Doctor Potter opening the debate. And then Doctor Navarro will go, and two minutes of his twelve will be used to show the trailer for his film, Death by China. Following the two opening statements, each debater will then make a five minute closing statement. The debate will close with questions submitted by the audience, as you came into the auditorium you all received index cards, and we'll plan to collect those after the opening statement. Please write whatever question you may have on there, and people will come around and collect then, and we'll continue to ask as many of those questions as time allows during the audience portion. Following the audience questions we will then evaluate the results in two -- the debate in two ways. First we'll take a vote in the audience by show of hands, I'll ask all of you just to raise your hands and ask--- also ask for some patience as we just count because there's a lot of people here, as we're doing this, Miss Maria Lew up here in the front will serve as our forensic debate judge, and she will also provide her expert opinion on who she believes won the results of the debate. Finally, after all of that counting and evaluation we'll submit -- we'll tell you all who won, both in your opinion and Maria's opinion. Finally, after the debate has concluded there'll be a few minutes while we clean up and organize everything for the showing of the film -- Doctor Navarro's film, Death by China, so please stick around if you'd like to watch that. And then once again, welcome to our ongoing series of international policy debates, and I'm just going to move over there and we'll get started. All right, so Doctor Potter you have twelve minutes to go ahead with your opening statement.
>> Let's see if I've messed with this. Can everyone hear me all right? Okay, so I am not a debater by training, so I will probably now break every rule and convention of that discipline, but here goes anyway. So what I'm going to argue is that the WTO is not the primary cause of - or China's entry into the WTO is not the primary cause of our current economic difficulties, and more generally that we need to be taking a more nuanced view of the U.S. - China relationship than what is being proposed in this film that you're going to see a trailer for in a moment, and then I believe the full movie will show afterwards if you're interested in staying and taking a look at that. The reason for that is that at its core, China is now a major power, and we need to be taking seriously how we want to deal with China. We're not in a position to dictate terms in the way that I think this discussion suggests we could, and still achieve U.S. strategic interests. By pursuing some of these -- kind of cracking down on China paths, we're actually likely to undermine our own self-interest. So at its core I really question sort of what this movie really is for, right? It seems to be about sort of stirring up passions in the U.S., about exciting people for a certain course of political action, in a lot of ways it strikes me as something that is very much at home in the current debates regarding the presidential election. But I see this as much more an inherently complex situation and more than that, the oversimplifications of this kind are not benign, they're not clarifying and they can, in fact, be dangerous. So the first reason for that I think is that this and a lot of arguments about the deficiencies of China on the international system sort of harken back to these "Good Old Days" arguments, right? I think one needs to be very careful about that in the U.S., right? And specifically, I'm referring to stories about how, you know in the 50's through the 70's, man could have a blue collar job, and his wife could stay at home and they could have a car and life was good, right? First of all, household income in the U.S. was $25,000 adjusted for U.S. dollars now, it's roughly double that now, there are issues of inequality, some of which China has something to do with that we should be paying attention to and I'll return to that in a minute, but I don't think that this is a cut-and-dried case where we want to be returning to the past, right? Second of all, that past was very much the product of a very odd historical moment in which we were coming out of World War II; we controlled half of the global GDP, right? This is not something that's likely to be replicated, okay? And so we need to start thinking about how we grapple with other major powers, other major economic powers, rather than cracking down on them. So the reason for this I think is that blaming China is really pretty easy, right? But they're not fundamentally the problem. Manufacturing output in the U.S. has actually been relatively consistent since the 1940's, that line is actually quite flat with some bouncing around the mean, of course the number of people employed in manufacturing has declined almost linearly over that same period, okay? The reason for that is not China, right? It's machines, it's computers, it's productivity, okay? Second of all -- sorry, lost my train of thought there, broke a debating rule I'm sure. Second of all, manufacturing as a sheer global GDP has also been in decline over this period, right? And the share of U.S. GDP has gone right along with it. Again, much longer time series than you see with China's entry into the WTO, and representing a broader global phenomenon that we need to be taking -- paying attention to, right? Manufacturing just isn't the way to prosperity anymore, and this is sort of the fundamental thing that we're missing here. Both in the U.S. and globally, the path forward is not through manufacturing, okay? Finally, China's entry into the WTO -- it's a singular event, right? It comes in in 2001, late 2001 specifically, right? And tinning everything that happened after that with all its complexities, with sort of U.S. rises and declines, I think really washes out a lot of the information we want to know, okay? First of all, we entered a recession in 2001, right? And when you look at -- maybe some of you have seen this, there's kind of a pretty graph that got kicked around pretty frequently with the decline in U.S. jobs and manufacturing that seems to go down in 2001, I'd actually point tot that same graph as evidence that something else was going on. China entered in late 2001; the trend's already falling off the cliff prior to that, right? We have things like 9/11 in 2001. I could name any number of events in that period that could have important shifts -- important effects on the U.S. system, okay? So China's had some impact, I'm not trying to say that they've had no impact, but it's been dwarfed by larger shifts in the global economy. Specifically I think points where Doctor Navarro is correct is that there are some issues with particular regard to intellectual property, with regard to property rights, things that are not problems are things like currency manipulation, just being in Beijing and talking to a lot of business leaders at the beginning of the summer, a lot of people in U.S. business circles are concerned that if China floated its currency it would go the other way, not the way that we are insisting in congress that it's likely to go, okay? So part of the reason I think we need to be very careful about this, and that these are not just statements that are in my opinion factually incorrect, but are potentially damaging, are issues of unintended audiences, okay? I am not trying to draw an overly strong parallel here, but we've seen what happens when you put movies out that could reach the wrong people, right? And I'm specifically referring to this movie that we've been dealing with in the broader Middle East, which has enraged a lot of passions. Throughout this movie, Doctor Navarro has sort of caveats that say, "Well, there's the big bad Chinese government, but we do love the Chinese people."
Okay, I would put forward to you that the Chinese people are not out of step with the government in this direction. If anything, Chinese people have lower opinions of U.S. behavior, right, and would like to see the government take a stronger line against us, right? And then this is something that we need to be paying a fair amount of attention to, right? We assume on some level that at a popular level, if the Chinese government went away then the Chinese people would be our friends. It's false, okay? On this same trip to Beijing some Ford School students and I sat through a fairly lengthy diatribe by a member of the economics ministry who pointed out that the U.S. is -- sorry I'm trying to think of a more civil word for it, ruining China's day because of control of the reserve currency, because of our control of international institutions, because of our control of an international system in which they were a latecomer, okay? And so what I want to say is that our -- China's presence in the WTO is actually a very positive thing for the U.S., right? It brings China to the table and it brings us into a conversation with China where otherwise we might be direct loggerheads. That conversation doesn't always go well, it doesn't always work smoothly, we don't always get what we want, but it's a hell of a lot better than the alternatives, okay? So rather than China exploiting us, I think it's much more productive to think of this in terms of a mutual hostage situation, okay? Yes, absolutely, China owes -- has an enormous amount of our debt, that's a problem, but this also poses substantial problems for China, right? It prevents efficient investment, right? It inflates -- and on the U.S. side, it's inflated asset bubbles, okay, so this is not a good thing. It's something that both sides need to back off in a serious way, but that's done through conversation, right? In a mutual hostage situation you can't dictate terms, okay? And I would posit that that is very much where we are. So the point that I'd like to make here is Navarro's film is both sort of wrong and antiquated, and the real question is what we're going to do when China falls on hard times, okay? This film is very much geared towards the U.S. falling on hard times, but I think the real question for us is what happens when China falls on hard times, and I think that's likely to happen fairly soon. Inflation is very high; some of these same issues we've talked about productive investment are coming home to roost, right? From the Chinese perspective, they didn't kick us while we were down, right? They did it in their own way, but they stimulated when we said they should stimulate, they played ball with the global system, okay, and I think for a lot of Chinese people, the real test is going to come when it comes time for us to reciprocate. And what concerns me about movies like this and a lot of the dialogue that comes out of the presidential elections and out of the congress is that the U.S. is much more inclined to take advantage of the situation. And if you're going to take advantage of the situation you'd better finish the job, because this is a country that is gigantic in population, has an enormous amount going for it and is likely to rebound regardless of what we do. And when they rebound, it's going to be a heck of a lot harder for the Chinese government to make the case to the Chinese people that they should be cooperating in a system that we designed and ran and in many ways privilege our interests. Thanks [applause].
>> How are you all doing?
>> Yeah? Last time I was at U of M was literally 45 years ago and I jumped out of a plane, it was weird. My brother went here and he made me go skydiving, and this might be just the same kind of experience [laughter]. The question before us is really simple, is China's entry into the World Trade Organization responsible for the last ten years, essentially of economic misery that we've endured here in the United States. That's the question. So let's stay focused just on that for a minute. If you look at the five and a half decades prior to 2001, our gross domestic product in this country averaged 3.5% and life was pretty good. Once we hit 2001, for the last 11 years now, that GDP growth rate has fallen to 1.6%. 3.5 to 1.6. Now, two percentage points, roughly, may not seem much, but one percent is one million jobs you don't create when you lose it, two a year for ten years is about 20 million jobs, and that's about what we need right now to put everybody back to work. We have an unemployment rate which looks to be at 8.3, but for example the unemployment rate dropped in the last report, but only because 400,000 people dropped out of the labor force, 400,000 people. By my estimate and by the estimate of many economists, there's 25 million people in this country that can't find a decent job. Now, it's true that the forces of globalization started long before 2001. But something happened that year you can blame it maybe on the wars in Iraq and Afghanistan, you can blame it on the war on terror, but the other elephant in the room is China's entry into the World Trade Organization. If you look at the history of our economy, the problems of this last decade did not begin in 2007, make no mistake about that. Here in Michigan, which was ground zero for the problem, the recession started back in 2001 and just kept going, okay? There was never, never any recovery here. And you've got General Motors, one of the biggest corporations in the world now, saved by our government, offshoring not only its production to China, but also its research and development, which is where the new jobs come from. So something happened. If you look at the statistics, they're pretty simple, and you'll see them in the film, 50,000 factories gone, six million manufacturing jobs out of here. Now this whole notion which is common to academia that you don't really need manufacturing base anymore, you don't need an industrial base, you know, we're all going to be running around in suits, and life's going to be okay, really doesn't make sense. If you look for example at one of the strongest economies in the world, Germany, 25% of their women and men are in manufacturing. What do you think it is for us ? What do you think? Pick a number. Ten, yeah, but it's nine and still going down. Okay? And when I talk about manufacturing in America, I'm not talking about t-shirts, all right? They're gone forever to Honduras and so be it, great. But the difference between countries like Honduras and China is Honduras will buy our stuff and probably they won't go to war with us, okay? Now here's the thing about the World Trade Organization: China joins it and that would have been fine if they'd done what they said they were going to do, which is play by the rules, okay? What does that mean? It means no illegal export subsidies and respect for intellectual property. Now, since that time, because of weakness here in the U.S., they've broken every single rule in the book. The currency manipulation which 40% -- 40% advantage alone, okay, just on that, and then you have -- you'll see a wonderful scene in the film where this guy Dan Slane, Bowling Green, Kentucky, 2002, because China got in he was forced to move his furniture company over to China or go out of business, right? So he's over there and he makes stuff and he makes it at cost, right? Ships it over here, dumps it over here, because business don't generally do stuff at cost, right? The way he made his profit? The Chinese government gave him a check every month for 17% of his revenues, okay? That's huge, okay? Now another thing that's interesting about the World Trade Organization is that it is absolutely silent on two things: worker abuses and then environmental abuses. In other words, you can do anything you want -- anything you want to your workers or to your environment, there's no ability to complain to the World Trade Organization. And the biggest flaw with the World Trade Organization is that you have to take it case by case by case, and any case that you file takes three or four years. And often by the time you get relief, the problem's gone. The factories that you were trying to save are gone.
So this is a serious issue, and if the people of Michigan -- most of you are sons and daughters of the people of Michigan, I would assume, the people of Michigan can't understand how important manufacturing is by the fact that you see now what has happened that it's gone and nothing's really replaced it, then we've got issues here in this country. Now in terms of what needs to happen going forward, I really think we need to talk about whether this country needs to be in the World Trade Organization at all, I mean if you think about what it is, I remember when I was shooting the film, one of the worst things that happened was I had this really good interview with a lawyer who prosecuted cases at the World Trade Organization, and he told me things like, "Yeah there's over 150 countries in the World Trade Organization and most of them don't like us." Okay? So we're not going to get much justice there. The funny thing about that interview was simply that when we shot it we lost the sound on it. It was the one interview we had where that happened; it was kind of the worst case for a director. Now what I've been doing with the film is going throughout the Midwest, I spent a lot of time in Ohio -- let me just tell you a couple of stories so you kind of understand kind of what I'm hearing from the grassroots. For example, I go to a place like Mansfield, Ohio, used to be a huge steelmaking town. There's a mill there, AK Steel. It's about a mile long, about a mile long okay? And you can cut that thing in half and half of it now is nothing but weeds and grass and beat up concrete, and what happened to that -- half of that plant, a cold finishing mill, is it was boxed up and shipped off to China, and now that plant competes against American steelmakers. You'll see in the film there's this guy, Tom Dancer, who talks about the irony of China being the highest cost producer, check this out now, highest cost producer of steel in the world, with the lowest price, okay? That can only happen if there are legal -- illegal export subsidies. But when you take half a plant from a place like Mansfield, you take out not only the steelworker jobs that go with it, but all of the surrounding support jobs. I was in Portsmouth, Ohio, down -- it's a beautiful town, anybody ever been there? Anybody? Portsmouth, it's a beautiful river, Port's mouth, hence Portsmouth, there's a young man there who had just graduated from college. He wanted to be a teacher. The best work he could get was occasionally a sub, but the tax base of Ohio has been so decimated by the loss of the manufacturing base, that they're cutting teachers left and right and cutting budgets left and right, so the only place he could work was Wal-Mart, which was some high irony. But what he told me, with tears in his eyes, and he told the people in the audience was, his grandfather who was a World War I veteran, he wanted to go and basically honor him with a flag on the grave, and he couldn't find an American flag that wasn't made in China. And there's something really desperately wrong with that. And so the bottom line here is, this is a mystery, okay? You solve it. You look at the statistics and you give me a counter hypothesis as to why in 2001, like a step function down, everything's gone. You tell me if you can compete here in the state of Michigan with a company over in Chengdu run by the state government that has the advantage of currency manipulation, that has the advantage of illegal export subsidies, that may have taken your own technology and taken it over to use against you, to dump anything in the river, anything in the air, and keep its workers working 16 hour days, 7 days a week and often not pay them. And I think some of you may have noticed the news today? Anybody see that? 2000 workers, 2000 workers in a Foxcon, i.e. an apple factory in China, rioted, and it's just like the Pinkertons back in the Ford days, right? They sent in 5000 storm troopers to keep those folks under wrap. So bottom line is I never say, "Enjoy the film," because that's not the kind of film it is. It is alarming, but I reject the idea that it's alarmist, because everything in there is factual, and the 50 people you will see in there, every one of them is an expert in their own way, that tells a very simple truth, and it's a very, very nonpartisan film. Neither right nor left but it's about right or wrong. It's the American film. Thank you [applause].
>> [Music] I was laid off three times within six months until I was permanently laid off.
>> I graduated with my Bachelor's and I haven't been able to find anything.
>> Jobs disappear, and the way the economy's going right now it's tough to find a job.
>> When the workers in China are being abused, then workers in America have a tougher time competing against them.
>> Five and a half million manufacturing jobs gone.
>> 57,000 manufacturing facilities closed in this nation.
>> Some of the workers at the companies literally their last act at the factory was to unbolt the machine and load it up to be shipped off to China.
>> There's no question that a large part of China's competitive advantage has come from environmental neglect. 16 of the world's 20 dirtiest cities are located in the People's Republic.
>> That leads to carbon emissions and particulate matter falling all along the coast of the United States.
>> If you put it in your mouth or the hands of a child, don't buy it from China.
>> We're poisoning our children with the toys that we give them!
>> China today is a [inaudible] regime. It's a dynasty, no republic, not people's country.
>> China's military power is strengthening very, very rapidly. It's developing a modern, well-equipped, technologically capable military.
>> China is the only major nation in the world that is preparing to kill Americans.
>> [Music] we're a subsidiary of China and getting worse and worse because they're going to own us pretty soon.
>> If we talk about who's to blame, I think partially our own government.
>> Our government should be doing something.
>> They could have stepped in I think a long time ago.
>> I think that at every level, people could break out, and there would be a shot heard around the world.
>> Doctor Potter you have five minutes for your response statement.
>> Okay, so maybe we should have started with that, because it gives us, I think, a better idea of why this movie sort of alarms me a little bit. I would say it's alarmist, but I mean images of World War II-looking jets replace Asian people here with Chinese, carpet bombing the U.S.? A bowie knife, blood dripping out of the continental United States, I mean, maybe alarmist is not the right word but I might one up, okay. So, you know, Doctor Navarro gave us some really touching anecdotes, but then challenged us to look at the numbers a little bit, okay? So I would say, let's start there: let's look at the numbers, all right? This supposed cutoff in 2001, right, where you have over 3% growth higher than that, 1.6% growth after that, so you know here at the Ford School we like to do a fair bit of analysis, I think this should be well within your reach. What happens to those numbers if we shift the cutoff to 2000? We still have high on one side, low on the other. If we cut it to 2005 or better yet, 8, right? You have negative on the one side and positive on the other. So my point is this supposedly smoking gun cutoff at 2001 is arbitrary, okay? And it looks compelling if you sort of say that the number's on one side or the other, but that is not smoking gun evidence, that's not what smoking gun evidence looks like. In general, China has consistently lagged behind the U.S. several steps on the value chain, okay? So this is part of the problem with the story that China is taking American jobs, right? China's comparative advantage despite what's being claimed here is actually low-cost labor, okay? That's what they've got, they've got people. This isn't terribly complicated, okay? Unfortunately, and I think the Foxcom example's a great pointer for this -- that's been changing, right? China's been having a lot of problems recently because they're having trouble competing on price for the lowest cost labor, which are jobs they took from the rest of the developing world, not from us, right? They're having trouble competing on price for labor, and having a really tough time moving up the value chain the kind of things that we do well, okay? And this is what really concerns me about this story we keep hearing that "we need to be returning to manufacturing." Right, the Chinese are desperately trying to figure out how to get the heck out of manufacturing, okay? It makes very little sense for us to turn around and say, "That's what we need to be doing," okay?
The Germany example I think is a really good one, all right? Germany's in the World Trade Organization, right? Why is Germany -- if you need the [inaudible], why is Germany doing well, and the U.S. not? It's the type of manufacturing that matters, okay? China has not been doing that sort of -- that high tech, machining, that sort of work that the Germans have long been very good at, right? And certainly it is true that having some manufacturing sector, the right kind of manufacturing sector, German-style manufacturing sector, is good for security interests, those are things that -- those are capabilities you want to have, but these blanket statements about steel mills being hollowed out in Youngstown or wherever it might be are again, missing the larger point. That's enough [laughter and applause].
>> Doctor Navarro before you start your response statement I just want to remind everyone if you have any questions to please give it to the individuals at the top row here and they will give them to me.
>> Okay, let's start with the data, first of all. The claim here is that the points are arbitrary, okay? But let's look at the data. Let's start with jobs growth, okay? If you look at the average monthly job, net new jobs, which is the big number that comes out in the employment report, last one was like 90,000. If you look at that and you go back to the 1960's, right, through that whole decade we were generating about 160,000. We went to the 1970's, about 170,000 a month. Our best year was the nineties, and that was 181,000 a month throughout the nineties. Once we got to 2001 for the last decade, okay? What is it? It's minus 2000. Minus 2000! And that's not like a single year, it's across years. It's not an aberration, it just does that. Same thing with personal income, okay? Our average median household income grew 18% in the 80's, 16% in the 90's, went to zero, zero in the 2000's. Something happened. Something happened. Now the thing that I find to be the most counterfactual is the idea that cheap labor is the source of Chinese competitive advantage. If that were true, Bangladesh and Cambodia would be powerhouses. I spent two years studying the sources of Chinese competitive advantage at UCI, and the study I did came up with the fact that, yeah, cheap labor matters, okay, but it was the other five things, the other five things, the currency manipulation, the illegal export subsidies, the counterfeiting and piracy, the pollution, the ability to pollute for profits, and the ability to abuse workers, which creates the real advantage in China, the real advantage in China. And so everything that the Chinese government is doing to gain competitive advantage, even as their labor costs start to rise is contrary to the rules of the World Trade Organization. They cheat, you'll see in the film people talking about they cheat, they cheat. Now, in terms of the knife going through, yeah, that's a little bit of Hollywood, but I was in Los Angeles standing up with 12 people from China or Tibet and this gentleman from Tibet says, "When I saw that knife, first time I saw that knife it was exactly how I felt about what the Chinese government has done to Tibet." Any Tibetans in the audience? Do you know what is being done to the Tibetans and the Uighurs? These people are kept in essentially locked states, all right? And they bring in Han Chinese to dilute the population. And they send the women out so they can't breed with Tibetan or Uighur men as a way of pacifying -- these are the kinds of things that are going on that we -- you know, we go about our merry way, we buy the cheap stuff, you'll see in the film, it's like, you can go ahead and buy the cheap stuff, but as Lord Chang says in the film, "Yeah things are cheap at Wal-Mart but we have to consider the consequences." So approach this like an academic. Look at the numbers. Look at the startling step function down, look at how year after year since 2001, year after year we've lost -- steadily lost our manufacturing base, trend it out, see where we're going, and understand that unless we start producing things -- and by the way the Chinese are the largest producers of automobiles right now, do you know that? They are the largest producers of automobiles and they're going to aircraft, okay? Unless we start making things again, there are not going to be any jobs for everybody to prosper. Thank you [applause].
>> Great, now we will proceed to the question portion, and Doctor Potter you will have the first question. What factors influenced the movement of manufacturing jobs abroad? Are these all traceable to China's trade policies?
>> So no, I don't think they're all traceable to China's trade policies. The U.S. has been losing manufacturing jobs for quite a long time, right? As I said, a lot of this story is inevitable, right? When we talk about this incredible vibrancy of our manufacturing sector you're talking about a post-World War II environment in which we are primed and everybody else is decimated, right? And we used that to lock in a lot of advantages in manufacturing that carried us for quite a ways. We also used it to lock in things like the World Trade Organization which can continue to help us out, right? So as far as things that have shifted manufacturing jobs abroad, as I said, the U.S. has kept a fairly steady state as far as overall manufacturing production, all right, we have become a lot more efficient in how we do it. We've done most of our economic growth in other sectors: the financial sector, various service sectors, and you know, I think this example that was brought up just a moment ago about the 1990's is a perfect illustration of that. We did not grow in the 1990's because we got super good at building cars, right? We were not doing that -- growth was not about manufacturing, that was a decade of unprecedented American growth and it was about things that we are, frankly, right now better than China at, and I think that's where we need to be dedicating our attention.
>> Doctor Navarro, the next one is for you, how can the U.S. avoid starting a trade war with China at a time of economic uncertainty? Or are you advocating a trade war?
>> There's a great part in the movie where Dan Slane a member of the U.S. China Commission says that we're already in a trade war, and I think that's the case. It's an undeclared trade war. If you think about what trade wars are they're basically when one country bends the rules for advantage, and China has been doing that very, very effectively since they joined the World Trade Organization. So I don't advocate a -- so you see, here's what's the most interesting thing. If you simply take the currency manipulation issue, okay, if you just take that issue alone, if you have an undervalued currency by 40% gives them an advantage that's basically like a tariff on our exports to China and a subsidy to their exports here. Now that's worked for them up to this point in time, but if you were to let them strengthen their currency now, gradually, say over a two year period, it would solve the most fundamental problem facing the Chinese economy: which is they're too export-dependent. In order for China to maintain a steady growth rate they've got to sell to Europe and the U.S. and now the U.S. and Europe are so weak it can't do that. So a stronger Yuan coupled with health and pension reform would give birth to a Chinese consumer and therefore basically make that country strong, prosperous and less in conflict with us.
>> And here's a question that I'd like both of you to answer, Doctor Potter you can feel free to take the first whack at it. What are the next steps to achieving a more normalized trade relationship between China and the United States?
>> I think a lot of it is continuing with what we've been doing, right? Which is having conversations in an international forum, right? So we've you know, the car example just came up a moment ago, we don't like how China is handling their car exports, right? Are we better off in a situation where we force conflict and force China out of the World Trade Organization which is a built-in forum, where we -- or as was posited earlier, where we remove ourselves from the World Trade Organization, where we don't have the opportunity to have conversations about these things, right? Everybody in the end bends the rules on the World Trade Organization, right? We -- the aforementioned diatribe we got from the Chinese economic ministry, I cut that off after about two and a half hours, because it was moving into the discussion of all of the ways that the U.S. has manipulated the World Trade Organization to rip off China, right?
We actually globally have a pretty lousy reputation, as far as the World Trade Organization is concerned, but it continues to be an important place where we can have conversations, and it prevents us from having these sorts of spillages where suddenly economic concerns have no built-in place for discussion, they start spilling into security concerns, and this is what I mean about us needing to take seriously the implications of these arguments for our broader geopolitical interests.
>> Repeat the question, please?
>> What are the next steps to achieving a more normalized trade relationship between China and the United States?
>> My own view is that China respects strength and exploits weakness, and what we've been showing China for a long time now is either benign neglect in the Bush administration or flat-out weakness in the Clinton administration. One of the first things that Hillary Clinton did, and I've been a fan of hers, but one of the first things she did in 2008 when she became Secretary of State is basically announce in a speech that she would not hassle the Chinese government about human rights, that it was all about trade relationships and national security things vis-à-vis North Korea and things like that. The Chinese will exploit that kind of weakness. I believe that if Barack Obama had kept his promise that he made in 2008 to the people of Michigan and Pennsylvania to brand China a currency manipulator, that if he'd kept that promise then we'd have a strong Yuan and a more balanced trade with China. I think that we just simply have to stand up for our own interests, not tolerate cheating and I think that the Chinese government will respond positively to that.
>> Thank you. The next question is from Doctor Potter: The 2001 recession is commonly attributed to the bursting of the tech bubble and the Federal Reserve keeping interest rates too high. How does this explanation square with Doctor Navarro's assertion that China's entrance into the World Trade Organization is the primary cause of the U.S. economic woes starting at that time?
>> It doesn't. No, I mean, in all seriousness though, the answer to the question is baked into it, right? The origins of the 2001 recession, which is often attributed -- you know, it starts slightly before China's entry into the World Trade Organization, right, and certainly before the effects of China's entry into the World Trade Organization is felt on an economic level, right? And what's often attributed to this sort of step function thing that Doctor Navarro has referred to a number of times is that declines and declining sectors tend to happen in recessionary periods, right? So you're inefficient in important ways, you're being passed by, suddenly there's a lot of belt-tightening, a lot of industries got shaken out, but the fact that the macroeconomic situation has changed means that when the rebound comes, that industry doesn't rebound to the same extent, right? So that's a lot of the origin of this supposed numerical blip that we see, which again, as I said before, actually comes ever so slightly before the supposed causal factor.
>> Would it be okay to say something at this point?
>> Sure, if you'd like to respond.
>> Look, again, treat this as a mystery that you have to solve, okay, and then look at the data. It's pretty clear that what happened after China came into the World Trade Organization and began using basically these illegal subsidies, it's pretty clear what happened, okay? You look -- the first industries that got hit were in the south. They were primarily furniture, film and textiles. I mean, virtually within a two to three year period, half of those industries were wiped out, and that was all due to China -- those things went right to China, okay? And then as you go through time to today even, you see this spread first up into the Midwest with things like steel and autos and then it spread to the rest of the country. So there's no way you can explain 1.6 over a ten year period when you had three and a half over the past five and a half decades. There's got to be a reason, okay? And it can't be, well, yeah, we had 9/11. That's not it, okay? There has to be something. So you tell me what it is, if it's not letting the largest populated country in the world come into your markets with cheap labor and ungodly unfair trade practices.
>> Doctor Potter, would you like to respond to this, since I gave him an opportunity to? It's all off-book, you don't have to.
>> Then I'll go to the next question after that.
>> I think by saying, you know, I would need to be able to look this up, but I'd be really interested to know what the numbers were once we'd rebounded from the 2001 recession and prior to the 2008 crash. My sense is that those are not consistently lousy numbers for U.S. growth.
>> We dropped into this lower pattern, it's fascinating, like the latest numbers that came out, we're back down to 1.6, like we're settling into this lower glide path. Like somebody get tenure studying this, or a PhD thesis okay? But I'm telling you that the numbers are really startling.
>> But if you could explain why it happened, you could solve it, and that's what we're supposed to do in academia, my friend. I think we're in a policy place.
>> Agreed, and so my concern here is that we seem to be averaging in the financial crisis, which has again , as I've said, something that has to do with these asset bubbles, but has not a lot to do with this World Trade Organization entry.
>> It's not a glide path.
>> This thing started, okay, the idea that our economic woes began in '07 is absurd. And everybody in Michigan should know that, because the recession and the slow growth basically began here, and in Ohio and in Pennsylvania. And that goes back to '03 and '04 and has persisted throughout that time. And what's missing? The only thing that's missing is all the steel mills and the auto parts factories and the manufacturing facilities that are now gone. And you'll see Richard McCormick in there, an expert on this, gone, vanished. And that's what's missing.
>> This has been a very good exchange, but I will move on to the next question, Doctor Navarro, is there a role for cooperation and competition, since the economies are so closely intertwined?
>> See, you know, look. I think that in one scenario, the relationship between China and the U.S. could be wonderful, okay? You go -- you'll see in the film there's this great rhetoric by Bill Clinton talking about how we were going to let China into the World Trade Organization and get access to the biggest market in the world, and American companies are going to produce on American soil selling to that market, okay? If the Chinese government can make the move now, basically, and empower their consumers, and move from a third of their economy consumption to two-thirds like Germany, Europe and we are, okay. They would buy our stuff, we would make some of it here, their standard of living would go up, and life would be good. That's what free and fair trade is supposed to be like, but we don't have that now, and until we have that, the relationship is going to be very, very, very conflicting, as it is now. And you can just see what's going on with Japan and China, and us being drawn into that, to know that there's nothing alarmist about a prediction that there could be a hot war.
>> I have a question for both of you, Doctor Potter you can start: do U.S. consumers benefit from cheaper Chinese commodities?
>> Yes, I mean, cheaper is good, there are costs to that, right? I'm not making the case that this is a relationship that has been perfect or that China does not engage in some unfair trade practices, right? This is not a perfect relationship, right? So yes the U.S. consumers benefit from that but in certain cases there are downsides to that as well. I would say that in aggregate the U.S. benefits, but the point is that -- you know, it's two questions, right? Whether it's World Trade Organization entry is the key variable we need to be paying attention to, and whether these sorts of remedies that we're talking about are essentially taking a baseball bat to the problem, right? And whether we in the end would be a lot worse off for doing that, and I'm making the case that yeah, we would be worse off for trying to blow this thing up.
>> Sure, look, here's the choice, okay? Yeah, things are cheap at Wal-Mart, as Gordon Chang says, but you have to consider the consequences. So here's one scenario: you have income basically zero for the last ten years, you have 25 million people now out of work, and when they go to a Wal-Mart they can barely pay for anything, and it's nice to have the prices as low as possible.
Scenario two: 25 million people have a job, and they have rising income and they pay a little bit more for their stuff at Wal-Mart. I like that world a lot better.
>> Doctor Potter, next question's for you. How would you advocate addressing IP theft and illegal export subsidies?
>> I think that this is something that we should be pursuing through the channels that we're pursuing it, right? I mean, there are limited avenues to force China's hand, right? And this is sort of the broader theme that I'm driving at here, I think there's the sense here that this film is sort of putting out there that we have tools at our disposal that involve compelling China to end practices like that, right? That era's gone. We don't have compelling tools in that regard without essentially withdrawing from the international system. All right, so the question is how do we get the most of what we want, right? How do we move in the right direction? And I think that's what international institutions do, right? They allow powers to come together in an iterated way, build collaboration, cooperation and trust. That doesn't mean that that's a clean process, that doesn't mean that you immediately get to where you want to be, but these forums allow us to continually revisit the issue, to file trade claims, to hash that out, and hopefully in a step-wise manner, move in a direction that we want to be moving in. I don't think the alternative is either realistic, I don't think this is something we can do on a policy level. There's a reason that presidents on the campaign trail tend to get tough with China, and then when reality comes home and they look at what tools are at their disposal, everyone tends to go back to the same course, right? You can tell a special interest story, as Doctor Navarro does about that, but I think the reality is that they're highly constrained in this relationship, right? And so I think, that's what these international institutions are for, I think we're very lucky that we designed the rules of the road and that by forcing China out and reshaking the whole situation, we're looking at a new order in which we would be significantly disadvantaged.
>> Let me just ask you, though, if you want to use these institutions: the White House, through the treasury department, has the duty every six months to consider branding China a currency manipulator, and if they do that, that allows the ability to introduce countervailing duties if China does not comply. Now, would you as president in '08 or '09 have branded China a currency manipulator, if not, why?
>> But it's not working!
>> Hold on, it is working!
>> How has it worked? How has this worked?
>> Nothing works! I mean, China just does what they do.
>> If you guys are both okay with going on with this exchange we can continue, but I just want to make sure it's okay with both of you.
>> So, you changed the nature of the discussion there, right? You said we kept losing jobs. Where it's worked is where it's supposed to work: on currency.
>> But you wouldn't have cracked down on China as a currency manipulator.
>> As technical matter, okay, you can have a currency appreciating, maybe appreciating 20% at the most over time, but it's the trade deficits increasing at a faster rate, the undervaluation stays either the same or gets worse. Any macro class that you take, any macro class that you take which talks about how trade is balanced will talk about how it's through currency adjustments, it goes back to David Hume, and the goal species low adjustment mechanism. And if China pegs the currency, it doesn't allow what's supposed to happen, which is in the presence of trade deficit, the Yuan is supposed to go up, the dollar is supposed to go down, our exports are cheaper and you sell more to China, our imports here, we buy less and everything comes back into balance, so this idea that they've done something like, oh yeah it's gone up a little bit, if you've got a 300 Billion dollar deficit every year and rising, that currency by definition is undervalued, my friend, and I just, I don't understand -- see, you mentioned the special interest story. Yeah, in the movie you'll see how it's GE, GM, Caterpillar and Boeing, basically they love that currency manipulation because it allows them to go offshore, produce over there, dump stuff here.
>> We can go on to the next question?
>> This is for you Doctor Navarro. Doctor Potter said, 'The advantage to having China in the World Trade Organization is that they have a seat at the negotiating table." if, as you say, they break all the rules, why not have an opportunity to hold them responsible?
>> Well, there's two things. There's an interesting thing going on on the campaign trail. Romney comes out and wants to brand China a currency manipulator on his first day in office. Now the advantage of that is that it's a global solution: in other words, if you impose duties there, it would basically be duties and tariffs across the board and would help all industries in America offset that. On the other hand, Obama, when he was down in Ohio, in fact in Columbus, the day I was there, he announced some additional cases before the World Trade Organization for auto parts. Okay, so far in his administration he's done like 80 cases. That helped very specific industries but it leaves all the other industries apart. So the World Trade Organization is a very, very ineffective mechanism to basically bring somebody to the table on the question of unfair trade practices, because you have to go piece by piece, industry by industry and it takes too long.
>> So a question for both: how do we encourage American investment in the U.S.? Doctor Potter?
>> I think we, I don't know, that' a tough question. I think that we want to continue to, within the rules, subsidize certain industries, right, again, this is a little bit like the critique that China lobbed at us, that you actually protect a number of your domestic industries, right? We've been in the process of trying to grow a, you know, a green energy industry for example, and I think that techniques like that can have their place, but you have to be very careful because we run into charges of hypocrisy on this stuff fairly regularly, you know? Some of these practices that China is doing, they're looking at the situation and saying, "You know, you had long periods in which you were protecting domestic industries before you sort of loosed them on us and now you tell us that we have to -- or even if you weren't actually protecting them they were allowed to grow, sort of, free of competition, and now you're telling us as a developing country that we have to play by mature country rules, right?" That's a critique that we need to take seriously because even if we don't believe it it's strongly felt.
>> Well, interestingly enough one of the things that draws our American multinational companies abroad is the differential tax system, and we go far beyond China on this, we have the highest corporate tax in the world of the major producing countries. And so if Caterpillar has a choice between Peoria and Chengdu, okay, they can move a new plant, right, build it in Chengdu and get immediate huge tax break. I was in Cincinnati doing a town hall and after the film this former P and G, Proctor and Gamble executive says -- I don't know if you know this, but Cincinnati is like, Proctor and Gamble land, they might as well call it Proctor and Gamble instead of Cincinnati, but he was an accountant and his whole job for many years was to evaluate where to put production distribution facilities. And he said that the only thing that mattered at the end of the day after he did his calculations was not labor, labor costs had nothing to do with it, it was all about the tax system. So that would be one constructive thing that we could do in terms of tax reform, and the other thing is, look, you'll see in the film, Alan Tomlinson says, you know, these American based multinationals that do not salute the American flag, they like the status quo, they like the cheap currency and the subsidies, if you take those away they'll be more likely to come back here. And by the way, if we're going to bail out GM, we ought to have a little clause in the contract that says, "Hey, the next plant you build, build it here."
>> The next question is also for you, Doctor Navarro. Don't U.S. companies benefit from cheap production abroad? Isn't greater efficiency in the U.S.' interest as well?
>> Well, who's the U.S.? If you look there's a great scene in the film, this guy Ralph Domery [phonetic spelling], who was professor emeritus at I think MIT and a very distinguished man, and he says, he says, he was talking about Apple, and it was like, "The shareholders get the profits, but China gets the wages," right?
And what America needs is wages, right, so that's the conundrum. So we're in danger in this country -- I mean this whole thing with Romney and the 47% thing, right? It's scary, if you think about to have 47% of the people in this country not paying any taxes, I was in Calgary about four days ago, giving a speech up there and they were talking all about it because in Canada it's only 36%, it's only 36%, so our percentage is rising and rising and rising because we've lost this manufacturing base and we've had zero wage raise. So there it is.
>> And I believe this is the last question? It's about 5:15. And it's a question for both, and it's about human rights. How can the U.S. promote human rights in China without being counterproductive?
>> I think this is, like a lot of these issues, it's important to understand what we can do and what we can't do. The reason that China engages in a lot of these practices that we're talking about, right, that promote -- that promote some of these export imbalances is because they're deeply, deeply concerned with domestic employment, right? They're concerned with internal security. Okay, they're concerned about regime preservation, all right, when those are the stakes of your adversary, it's very important to sort of know what you're dealing with, right. When those are the values that they think are on the table here, it -- most of the tools we're talking about are not going to work for you, right, because the stakes are too high. What they care about is more important than what you care about. I think you're dealing with a similar situation with regard to human rights. A lot of the ways in which people talk about manipulating the human rights issue fail to understand the origins of both problems in the Chinese system. Okay, so I think it's very important both with trade and with human rights for the U.S. not to be overly confident about how many tools we have in our tool bag for dealing with this, all right? That said, I think that there are practices that can be put in place involving sort of identifying human rights violations, boycotts of particular industries, bringing in, you know, using trade rules to deal with unfair practices as far as the overlap between human rights and trade production, which Doctor Navarro brings into the film, so there are tools, and I think this is something that the U.S. needs to be concerned about, and it is something that we've talked to the Chinese about it every time we have one of these bilateral meetings, but part of the reason you don't see a lot of either us banging our fists or them responding in kind is because there aren't an enormous number of tools we can do that'll allow -- sort of force the Chinese to start behaving you know, in ways we want them to.
>> This is really important. We gave away the most powerful tool we had to put pressure on the Chinese government on human rights, when we let them into the World Trade Organization, okay? And the history goes like this. Before China had most favored nation status, which was a precondition for entering the World Trade Organization, there was an annual rite of passage in congress basically, as to whether or not we were going to renew trade with China under the existing rules, okay? At that point there was some trade, but it wasn't a flood, okay? So we did it, we did it every year, and every year we were able to use that debate to extract concessions from the Chinese government on human rights. Now, 1994 was the year that Bill Clinton as president loosened up on that, and you'll see in the film a guy named Chris Smith, conservative, Republican, who focuses a lot on human rights, just disgusted with that because it was a pure sellout to the multinationals that you'll see also in the film. But when we got to 2001, the vote that was held in congress wasn't to let them into the World Trade Organization, it was to give them permanent MFN, permanent Most Favored Nation status. And that was the best bargaining tool we had up until that point to have them abide by more humane human rights abuses. And you will see in the film. Do we have any Thalum Dong [phonetic spelling] in this room? Does anybody know what that is, Thalum Dong practitioners? Okay, you will see in the film that for the practice of Thalum Dong Buddhism, that's probably the wrong word, but tens of thousands of people have been put --- not only put in prison, worked in forced labor camps. But some of them have their organs removed while they're still alive by the government as part of an organ harvesting thing. That kind of thing, I mean -- our government allows that, we allow that. When we go into a Wal-Mart, we as consumers basically tacitly approve that kind of thing. There's a great scene, I'll end it with this: Harry Root was in a forced labor camp for 19 years, you'll see him in the film, he says in the film, China is a dynasty, no republic, not people's country." And he talks about from firsthand experience how the rubber boots we buy, the buttons on our shirts, the Christmas lights and a lot of stuff in between are made in forced labor camps, by people who get no payment at all, and when I was in Los Angeles that one time, along with the Tibetan there was a woman on the stage who's in a movie now called Free China, and she sat there and told the audience that in 2002 she was a Thalun Dong practitioner, in a prison camp, making rabbits, little furry rabbits that got sold out into the west. So the human rights issue is one of many, but I'm telling you, this country, as the greatest democracy in the world, has at least some responsibility to do a lot better on that issue than we're doing. | 2019-04-19T10:58:14Z | http://fordschool.umich.edu/video/2012/peter-navarro-phil-potter-us-china-relations-cooperation-or-conflict |
5/22/2013 - SCHRIEVER AIR FORCE BASE, Colo. -- "You are, in fact, the masters of space."
These are the words Gen. Robert Kehler, commander of U.S. Strategic Command, stated when he visited Schriever Air Force Base May 17 to present the 2012 Omaha Trophy for Global Operations to the 50th Space Wing.
For the second time in three years, the wing has captured the trophy, which is awarded annually to units that demonstrate the highest performance standards in USSTRATCOM's global strategic mission. Selections are based on formal evaluations, meritorious achievement, safety and other factors such as community involvement and humanitarian actions. Col. James Ross, 50 SW commander, received the trophy on behalf of the wing.
"I want to congratulate you on a job spectacularly well done," Kehler said. "The Omaha trophy is a big deal; it's a big deal in Strategic Command and it's a big deal for the people of Omaha. They maintain a connection with this award. They know who gets it. We sit down with our consultation committee members, which is the sponsor of the Omaha trophy. And every year, we review with them who gets the award and why."
Typically, the committee members find a very tough set of choices they have in order to get to a selection.
"Once we make the selection, it's obvious why we did it," Kehler said. "And for this case, it's obvious why we did it."
The general said many of the units assigned to USSTRATCOM are operating in the shadows with the 50 SW as the epitome of "ultimate operation in the shadows."
"It's difficult for the people who benefit the most from what you do, which are the Soldiers, Sailors, Marines, Airmen and in particular, those who are forward deployed, and in some cases, engaged with the enemy, and in other cases, deployed elsewhere around the world, [to appreciate what you do]," he said. "They are the ones who benefit the most from what you do and yet the odds are, they don't know who is doing it. This is our chance to say thanks to you, on their behalf."
During the presentation ceremony, Kehler also talked about the changes in USSTRATCOM and how the wing is not only a part of a legacy of honor and valor, but also a part of legacy of change.
"Not only will we recognize you here today for what you have done and the outstanding way you've done it, but I think when we leave this trophy with you today, we are recognizing your potential," he said. "You are, in fact, the masters of space. We are going to rely on you to do things differently as time passes. We are going to rely on your expertise to keep providing for those forward users who can't fight the American way of warfare without GPS, can't fight the American way of warfare without satellite communications, can't fight the American way of warfare without surveillance, without weather, without all of the other things that are provided by you and people like you."
Additionally, Kehler stressed the award is about the whole team, which includes civil engineers, security forces, medical services and more.
"All of the things that go in to making the skills across an entire wing are being recognized here with the Omaha trophy," he said. "Congratulations to you, you deserve it. You don't get enough praise for the things that you do. You labor in silence and in the shadows."
Ross said the award, the Trophy for Global Operations, is what the wing does with its mission "Command satellites to deliver decisive global effects."
"What General Kehler said was exactly right," he said. "It was a team effort; the entire team is responsible for this. This is your award. Each and every one of you should be proud of how you contributed to the outstanding manner in which we did our mission."
Ross said he is blessed to be part of this team and proud of each and every member.
"Hopefully, you are as proud of this unit as I am," Ross said. "Thank you for what you do for the wing, for the Air Force and for this great nation."
/25/2013 - LOS ANGELES AIR FORCE BASE, El Segundo, California -- The U.S. Air Force's fifth Wideband Global SATCOM spacecraft (WGS-5) was successfully launched on a United Launch Alliance Delta IV launch vehicle at Cape Canaveral Air Force Station, Fla., on May 24, the first step in its journey to expand satellite communications services to the warfighter.
Over the next several months, the satellite will undergo orbit-raising activities to reach geosynchronous orbit and on-orbit testing to verify nominal performance and prepare the satellite for operational use. Ultimately, the satellite will be controlled by the U.S. Air Force's 3rd Space Operations Squadron at Schriever Air Force Base Colo. WGS-5 should enter operations by the end of 2013.
"WGS continues to meet user requirements and provides the highest capacity of any DoD communications satellite," said Mr. Luke Scab, chief Wideband SATCOM division, MILSATCOM Systems directorate. "WGS is a vital piece of the MILSATCOM enterprise consisting of WGS, Defense Satellite Communications System, Advanced Extremely High Frequency System, Minstar, and terminals providing diversified communications services to soldiers, sailors, marines and airmen around the world. This continued success is due to the hard work and dedication from the combined government and industry team."
The Space and Missile Systems Center, located at Los Angeles Air Force Base, Calif., is the U.S. Air Force's center of acquisition excellence for acquiring and developing military space systems including Global Positioning System, military satellite communications, defense meteorological satellites, space launch and range systems, satellite control network, space based infrared systems, and space situational awareness capabilities.
Good afternoon, everyone. Thank you for the kind introduction. It’s a pleasure to be here with you today and speak to you at the Georgetown Cybersecurity Law Institute.
The cyber threat takes the form of Distributed Denial-of-Service (DDOS) attacks – that have interrupted or suspended the service of webservers at banks.
It takes the form of theft and general invasions of privacy by “keystroke logging.” Installing malicious code, or malware, into a computer, and tracking almost every letter, number, or character you type on your keyboard, including all of the communications you are having over the Internet.
The cyber world has been a useful tool for economic espionage and trade secret theft. Criminal organizations, or even foreign governments, without having to leave their countries or even their offices, can break into the computer system of a private company and steal innovative product designs, formulas, or trade secrets. As a result of this, the company loses the benefit of its investment of money and years of hard work, and more importantly, Americans lose their jobs.
The cyber threat also takes the form of destructive malware. This is malicious software that is capable of deleting everything on a given computer hard drive. This is not an imaginary scenario. In Saudi Arabia, an oil company called Aramco was infected with just such a virus.
Our country’s critical infrastructure is one of the most important areas requiring protection from cyber-threats. Today, most of the important critical functions in our society are run by computer systems. The power grid, hydroelectric dams, nuclear power plants, transportation systems, stock markets and communication systems are all controlled through sophisticated computer systems that allow them to be efficient, effective and coordinate with numerous other critical functions.
By now, you have also heard a lot about what the government can do to help you address cybersecurity issues. But I want to emphasize that government cannot fight the cyber threat alone. And I want to provide you with some thoughts about your role in all of this. What are the things that you can do in the areas of prevention, preparedness, and incidence response. Some of this may seem quite basic to many of you, but it doesn't hurt to hear it again. Unless we work together, we will not be able to address the cyber threat successfully.
Let’s begin with prevention. There are some key things that you and your companies should be doing to build resilience to your networks. Companies should put best practices and technologies in place. For example, each company needs a strong system of network firewalls. You, of course, need an external firewall. This will serve to protect you from the hacker trying to get inside. But that’s not enough. No matter how strong your external firewall is, the likelihood is that a hacker will inevitably break inside. So you also need internal firewalls. These should wall off different departments or divisions in your company from each other. And those areas that contain your company's most sensitive and valuable information should have particularly robust protections. This way, even if a hacker gets onto your network, he doesn’t get very far. Or, at least, he doesn’t get to your company’s most sensitive information.
Companies need to educate their employees on intrusion techniques such as spear-phishing or redirecting websites – the scams that use a combination of email and bogus websites to trick victims into clicking on website links or opening attachments. It only takes the carelessness of one employee to let a hacker into your network. So companies need to train their employees to recognize and avoid these kinds of scams.
And you need to set up a strong system for passwords. The strongest system has multiple layers, and yes, I know it is a pain, but it is so much less of a pain than losing all your data, your trade secrets, or your financial information. This may require the user not only to type in a number of different passwords, but also to send images or even to do a form of biometrics. You should consider using all of these to protect your core, most sensitive network areas.
But you can't do this alone, either. You're going to need up to date information on what cyber threats are out there and what they look like. Participating in information sharing platforms like InfraGard can help you in this regard. InfraGard is an FBI-sponsored initiative that brings together representatives from the private and public sectors to help protect our nation’s critical infrastructure from attacks by terrorists and criminals. Members have access to FBI secure communications network featuring an encrypted website, web mail, list serves, and message boards. FBI uses the InfraGard website to disseminate threat alerts and advisories. InfraGard also sends out intelligence products from the FBI and other agencies.
Beyond InfraGard, you can access other information sharing organizations like the Information Sharing and Analysis Centers – ISACs. ISACs are trusted groups established by critical infrastructure owners and operators. There are different ISACs for different sectors and areas of expertise. Members of ISACs share information with each other and maintain contacts with the government to share and receive cyber threat information. Services provided by ISACs include risk mitigation, incidence response, and information sharing. Depending on the ISAC, you may have access to a 24/7 security operations center, briefings, and white papers.
What can the Government do to help with prevention? Well, for starters, we can share actionable information with you. We have collected and shared hundreds of thousands of indicators of malicious activity with the private sector and over a hundred nations. And this is just in the past six months. These indicators include information like IP addresses associated with malicious activity.
You may have also heard about ECS — the Enhanced Cybersecurity Services program. This is a program that has been available to the U.S. defense industrial base. The Department of Homeland Security has been working with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS provides that information to qualified service providers to help them counter known malicious cyber activity.
In the Executive Order that the President announced at the State of the Union earlier this year, we committed to expanding ECS beyond the defense industrial base to cover our nation's critical infrastructure. We also committed to redoubling the effort to share malicious indicators not just with members of critical infrastructure, but with the private sector writ large.
Beyond information sharing, the President’s EO gave also the National Institutes of Standards and Technology – NIST – the responsibility, along with the private sector, to develop a framework of baseline standards for cybersecurity. The Framework’s purpose is to assist owners and operators of critical infrastructure to identify and manage risks posed from cyber threats. Once the Framework is established, DHS will establish a voluntary program to support adoption of the Framework. While the Framework is directly applicable to critical infrastructure members, there is nothing that prevents all companies from adopting the framework as part of their cyber program.
Next is preparation for an attack. Even a well-defended organization will inevitably experience a cyber incidence at some point. Therefore, your company has got to have a strong and comprehensive plan for responding to a cyber incident. Determine what kinds of filters to employ in the face of a DDOS attack, how to implement mechanisms to shut down access to important sectors of your computer systems, procedures to change passwords and access controls, and provisions to preserve all your critical data to ensure continuity of your company's operation if your data has been destroyed. And importantly, mechanisms to notify customers or employees if PII has been stolen.
I may be saying the obvious, but these procedures need to be developed before any cyber attack occurs. After an attack has started, it’s usually too late to figure what to do, or to have any hope that it will be effective. And your plan needs to be tailored to your particular company. You and the other IT professionals in your company are the only ones with the expertise and detailed familiarity with your own system to undertake the evaluation of how all your systems work together and how a hostile actor might exploit vulnerabilities. So take the time to really think about it.
Finally, think about your cyber protection program from the perspective of your shareholders. The SEC has issued specific guidance regarding disclosure obligations relating to cybersecurity risks and cyber incidents. The guidance, which was issued in 2011, makes clear that there are particular obligations that apply before, during, and after a cyber incident. But you should think about your disclosure obligations beyond just particular cyber incidents. If you had to explain to your shareholders how you are going about protecting the most valuable trade secrets of your company, or its financial information, or its critical operations, or the personally identifiable information of your customers or employees, what would you want that explanation to look like? What kind of impression would you want the investing public to have about your dedication to cyber protection.
So, your company has followed all this advice. It has put in place a resilient network, and you have set up a comprehensive plan of action for responding to cyber incidences. You have also been able to rehearse your plan repeatedly and have even exercised it in responding to small-scale cyber attacks. But the attack still comes. Unfortunately, it’s inevitable. What do you do then? I know that many companies are reluctant to let anyone know they have been the victim of a cyber attack. They don't want their shareholders or their customers to lose confidence in their systems. So they deal with it themselves, and don't tell anyone about it. But that kind of thinking leads to only one result - more attacks, on you and other companies. I want to urge you, in those situations, to notify law enforcement immediately. We have tools to help you and others who are the victims of the attack and we can use your attack information to help prevent future attacks. And, we are dedicated to maintaining the confidentiality as best we can so you don’t get victimized again through bad publicity.
Let me give you an example of how law enforcement can respond when we learn of a cyber attack.
This was a particularly pernicious infection, in large part because the malware was continually updated to escape detection by most anti-virus tools. In this scheme, the botnet creators, through keystroke loggers, were stealing peoples’ personal and financial information. Because these criminals were overseas and could not be easily identified, arrested or prosecuted, we had to figure out a way to disrupt the network and stop the theft. We did this through a combination of civil and criminal authorities that allowed us to wrest control of the network from the criminals and shut it down.
First, because the central command computers that operated the botnet were in the United States, we sought a criminal seizure order to take control of those servers. This took the botnet control away from the criminals, and let us respond when the infected computers beaconed back asking for their next instruction.
Finally, although we had put the malware to sleep, it was still on all of the individual computers. With the malware in place the botnet creators could reconstitute the botnet fairly easily. So we went to work with antivirus companies and other industry partners to solve this problem. Software companies and Internet Service Providers offered free self-help tools and advice that enabled users to rid their computers of the malware. By combining authorities and working together with the private sector, we developed an effective solution to address this one network of malicious code.
But in this instance we were lucky. We were able to locate key components in the United States and did some creative lawyering to seize control of those servers. But that won't always be the case. Most of the law enforcement we have today was designed for the 20th century. We are, unfortunately, dealing with a 21st century problem.
Although the federal government currently has a range of tools at its disposal, we still need to give law enforcement better ways to stop cyber crime without having to piece together ad hoc, creative solutions.
We need to facilitate the appropriate sharing of cybersecurity information like malware codes between the government and private industry so industry can protect itself.
We also need legislation to incorporate privacy and civil liberties safeguards into all aspects of cybersecurity.
We have been and should also continue to engage our Allies and partners worldwide to solidify norms of cyber behavior — to help ensure that the Internet remains open, secure, and stable. It is also crucial for us to maintain a meaningful dialogue with the world’s largest cyber actors and work together to develop an understanding of acceptable behavior in cyberspace.
But above all, we must work together — the government and the private sector — to build closer and even better partnerships. Only by doing this will be able to make the future Internet a place where we can be more confident that our businesses, our privacy, and our personal finances can operate safely. The responsibility of protecting all of this rests not only with the government, but also with, individuals, firms, and companies themselves. We know that you have been working hard to provide security for your systems. We commend you for doing so and look forward to working closely with you as we move forward in addressing and countering the cyber threat.
Thank you again giving me the opportunity to talk with you today about this important topic.
5/23/2013 - CAPE CANAVERAL AIR FORCE STATION, Fla. -- When the Air Force successfully launched an Atlas rocket carrying a GPS satellite May 15, reservists in the 19th Space Operations Squadron provided all of the operational manpower from the launch through the first 96 hours on orbit.
"The Air Force Reserve has supported 28 of 36 GPS launches," said Lt. Col. Mark Strub, 19th SOPS commander at Schriever Air Force Base, Colo. "This is the ninth launch led by the 19th SOPS and the 12th for which squadron personnel have been an integral part of the launch team."
The GPS IIF-4 spacecraft ascended into a constellation of satellites circling 11,000 nautical miles above the earth. It provides precision navigation and timing to U.S. military forces and civilian users worldwide.
- A 12-year design life providing long-term service.
These upgrades improve anti-jam capabilities for the warfighter and improve security for military and civil users around the world.
SAN DIEGO, May 17, 2013 – Unmanned vehicles, known as UxVs, deliver enhanced information dominance capabilities to the fleet, increasing the utility of robotic systems employed in military operations.
Such military operations can range from combat to disaster-relief missions, which create the requirement for robotic command-and-control systems with mission-specific functionality that display mission-specific information to the operator.
Guided by Gary Gilbreath, chief software engineer for unmanned systems here at the Space and Naval Warfare Systems Center Pacific -- SSC Pacific for short -- has developed an unmanned vehicle/sensor operator-control interface that can simultaneously handle multiple sets of disparate remote systems.
Development of the Multi-robot Operator Control Unit, which enables command and control of a wide range of vehicles and payloads under varying mission scenarios, began in 2001.
It’s the first “common controller” for SSC Pacific’s broad family of developmental UxV systems, including land, air, sea and undersea vehicles and sensors.
Government-owned, MOCU has a modular, scalable, and flexible architecture. Modularity allows for a breadth of functionality, such as communicating in unrelated protocols. Scalability allows MOCU to be installed on a wide range of hardware. While, flexibility allows MOCU users to define what information is displayed and determine what control is needed for each system.
One key advantage of MOCU is that the user interface can be easily reconfigured as needed by editing XML configuration files, without the need to recompile.
Under Gilbreath’s direction, MOCU was ported to more than 30 government programs by 2005, and to an additional 26 outside users by 2010.
Additionally, MOCU was selected for use on the Navy's littoral combat ship mission modules and the Advanced Explosive Ordnance Disposal Robotic System. More recently, it was selected by the Marine Corps/Army Robotic Systems Joint Program Office for joint UxV acquisition programs.
With this rapid adoption of MOCU by industry and other government agencies, the title of chief software engineer for unmanned systems was created to oversee, coordinate, and manage all internal and external development and implementation activities.
“As our chief software engineer, Gilbreath has provided technical direction, coordination, and management of the growth of MOCU software across [the Defense Department] and throughout industry and academia,” Everett said.
Having worked in the area of unmanned systems for more than 26 years, Gilbreath is nationally recognized as a subject-matter expert in UxV C2. He has provided high-level architecture design for UxV C2 software, guiding multiple stakeholders, including the Naval Sea Systems Command, Naval Air Systems Command, Office of the Secretary of Defense, the Army, the Marine Corps and industry.
“Our goal is to provide the most adaptable, extensible, and appropriate technology solution to the sponsors and users, thereby ensuring SPAWAR remains at the forefront of UxV C2 in all operational domains and across the globe,” Gilbreath said.
5/16/2013 - CAPE CANAVERAL AIR FORCE STATION, Fla. -- The U.S. Air Force's 45th Space Wing successfully launched the first Atlas rocket carrying a GPS satellite since 1985 at 5:38 p.m. May 15 from Space Complex 41.
The United Launch Alliance-built Atlas V rocket carried into orbit the 64th GPS satellite, an enhancement to the orbiting constellation.
Brig. Gen. Anthony Cotton, commander, 45th Space Wing, praised the combined team of military, government civilians and contractors on the outstanding results.
"I am proud of the hard work of the 45th and 50th Space Wings, the Space and Missile Systems Center, United Launch Alliance, Boeing, our industry partners and the Atlas V and GPS IIF launch teams," said Brig. Gen. Cotton. "Once again, our entire team worked hand-in-hand to make this another successful launch for the Air Force and our nation."
The GPS IIF-4 spacecraft ascended into a constellation of satellites circling 11,000 nautical miles above Earth. It provides precision navigation and timing to U.S. military forces and civilian users worldwide.
The new capabilities of the IIF satellites will provide greater navigational accuracy through improvements in atomic clock technology; a more robust signal for commercial aviation and safety-of-life applications, known as the new third civil signal (L5); and a 12-year design life providing long-term service. These upgrades improve anti-jam capabilities for the warfighter and improve security for military and civil users around the world.
"The Air Force is working hard to advance the GPS network for improved accuracy across the board for things like commercial aviation signals, anti-jammers and a longer shelf life as we evolve the system over time," said Lt. Col. Paul Konyha, commander, 5th Launch Support Squadron.
OFFUTT AIR FORCE BASE, Neb., May 14, 2013 – Recognizing the value of multinational coalitions for operations in the land, maritime and air domains, officials at U.S. Strategic Command here hope to forge a coalition that shares assets and capabilities in space.
However, as more nations, organizations and commercial companies vie to take advantage of space-based capabilities, the once-pristine space domain is becoming increasingly congested and competitive, Thompson said.
And of particular concern to military leaders, space is an increasingly contested domain, with potential adversaries hoping to level the playing field by denying access to space and space-based capabilities, he said. The response, Thompson said, must be the same unity in numbers that has proven itself out in every other domain. Coalitions provide more capability than any one nation can provide alone, while also sending an important deterrent message to potential adversaries, he said.
Unlike recent coalitions, formed for specific periods to accomplish specific objectives, Thompson said he hopes those formed for operations in space endure.
“We have enduring requirements and enduring interests that are common among ourselves. So we see this as a longer-standing coalition with these nations,” he said.
Working together to support their shared interests and objectives, Thompson said, the coalition members will help ensure that space remains a global common open to all.
5/14/2013 - LOS ANGELES AIR FORCE BASE, Calif. -- The U.S. Air Force Global Positioning System (GPS) IIF-4 satellite is ready for launch aboard a UnitedLaunch Alliance Atlas V Launch Vehicle on May 15 from Cape Canaveral Air Force Station, Fla.
The launch window opens at 5:38 p.m. EDT and will remain open for 18 minutes to accommodate any delays for weather or technical reasons. The satellite, designated as Space Vehicle Number (SVN) 66, is the fourth in the series of 12 IIF space vehicles that Boeing has on contract with the Air Force. SVN-66 will be joining the other operational satellites currently on-orbit in the GPS constellation.
"We are looking forward to yet another successful launch; tremendous progress is being made with the GPS IIF space vehicles. The first three satellites are on-orbit and meeting all mission requirements and the atomic clocks on-board the payloads are providing the best accuracy ever," said Col. Bernie Gruber, director of the Space and Missile Systems Center's Global Positioning Systems Directorate.
"This is just the beginning of the modernization plan to improve operations, sustainment and overall GPS service for military and civil users around the globe. I would like to commend the 45th and the 50th Space Wings, United Launch Alliance, our industry partners, the Atlas V and GPS IIF launch teams. Thanks to the hard work and focus on mission success, we are ready tolaunch the fourth GPS IIF satellite," he said. "To mission success!"
The new capabilities of the IIF satellites will provide greater navigational accuracy through improvements in atomic clock technology; an increased design life of 12 years for long-term service; and a new third civil signal (L5) to provide a more robust signal for commercial aviation and safety-of-life applications, while the second civil signal (L2C) is available for dual-frequency equipment.
GPS will deliver sustained, reliable and improved military and civil navigation capabilities to ensure GPS remains the "Center of Excellence forspaced-based navigation."
5/14/2013 - PETERSON AIR FORCE BASE, Colo. -- In the early 1940s, Peterson Air Force Base, or as it was known back then, Colorado Springs Army Air Base, was little more than a dusty runway with a few small white buildings that provided a place to train bombers during World War II. After the war, the base closed until the start of the Cold War in the 1950s.
From this point forward, Peterson Air Force Base saw many transitions, but none more significant than the birth of the 21st Space Wing in 1992. This week marks the 21st anniversary for the 21st Space Wing. As we celebrate how far we've come, it's important to remember how the wing began.
Retired Brig. Gen. Ronald Gray, the first commander of the 21st Space Wing, recently explained that the creation of the 21st Space Wing was a much needed improvement from the 1st Space and 3rd Space Support Wings that previously occupied Peterson AFB.
"I guess you had to be there previously to get a real understanding of how it was a significant change," Gray said.
Gray, who was the director of operations at Air Force Space Command during this time, said this change was a direct result of newly appointed Chief of Staff of the Air Force, Gen. Merrill McPeak.
"(McPeak) had some very strong views on the Air Force's organization and where the problems were and what could be done to solve some of those problems," said Gray. "He came up with a concept called the 'objective wing,' meaning that the organizational structure, roles and missions would be the objective for all Air Force wings to adhere to."
The objective wing concept, said Gray, eliminated staff activities overseeing operations and maintenance creating group commanders instead. Gray added that this new structure created a clearly defined line of responsibility from the CSAF to the lowest ranking airman.
Along with the 1st Space Wing and 3rd Space Support Wing at Peterson AFB, there was also the 2nd Space Wing at Schriever AFB. Many of the issues faced by Peterson and Schriever AFBs as well as the GSUs is the difficulty in working with another wing to garner critical support.
Prior to Gray's assignment at AFSPC, Gray was the commander of the 1st Space Wing. One of his many frustrations at that time was the funding decisions made by the support wing that affected mission organizations.
"We were buying sod at Peterson AFB while mission organizations were starving," said Gray. "We were always $10 short on funds and $20 short on people."
Gray said all of that changed on May 1, 1992, however, when they stood up the 21st Space Wing.
"It was a new start in many ways: organizationally, functionally, mission-wise, as well as people, which was a breath of fresh air," said Gray. "It gave them a purpose, I think, that they did not have before. They couldn't point to any mission other than support."
Stepping into the role of commander of the 21st Space Wing, Gray made a promise to visit every office on base. Although it took him three months, Gray fulfilled that promise.
"I walked into every shop on Peterson AFB and I emphasized to them, the purpose of the 21st Space Wing is missile warning and space surveillance and don't you forget it," said Gray. "I figured I could get everyone moving in the same direction at the same time doing the same mission, and I think it worked."
Since then, the Wing has grown to be the fourth largest wing in the Air Force, spread out over 16 states, eight countries and 13 time zones. It supports six installations across 34 locations and employs about 4,300 military, civilians and contractors. These Airmen operate and sustain global missile warning and space control capabilities and installations to dominate the high ground for America and its allies.
5/8/2013 - ROBINS AIR FORCE BASE, Ga. -- An innovative program developed by Headquarters Air Force Reserve Command here is expected to improve productivity, save maintenance man-hours, and the Air Force $12 million.
Called eTools Lite, the program improves on the Air Force's original mandate to put aircraft maintenance technical orders into an electronic format by placing the digital files on iPads instead of the costlier, heavier and more complicated ruggedized laptops.
With the iPads and eTools Lite, access to more than 2,000 technical orders is a simple swipe of the finger, a convenience not lost on aircraft maintainers.
"Maintainers are calling this the best thing since sliced bread, a game changer," said Corey Runge, a former F-16 crew chief and a member of the AFRC team that developed, tested and fielded the ingenious solution.
Developed in partnership with AFRC's Communications and Logistics directorates, eTools Lite reduces the number of ruggedized laptops needed by the maintenance community. Some laptops will still be used in supervisory and troubleshooting roles but the vast majority of tech data access by AFRC maintainers will be done via iPads.
According to Col. Wendy Deemer, chief of AFRC Logistics Operations, eTools Lite will be adopted by the Air Force on an attrition basis.
Col. Larry Stephenson, deputy director of Logistics, led the AFRC team that took eTools Lite from concept to implementation in just two and half years. Team members included, Deemer, Majs. Christina Manning and Ellen Weaver, Capt. Terrell Eikner, Senior Master Sgt. Wendy Blevins, Jerry Ruiz, Bruce Gaynor, Cynthia Schultz, Michael Phillips and Runge.
Several years ago Air Force mandated that technical orders and other instructions be converted from paper to portable digital format so aircraft maintainers could easily access tech data in PDF form on laptops instead of lugging binders of paper TOs to the flightline.
In concept, the laptop solution seemed plausible. In reality, Deemer said, the laptops did not work as originally intended.
Runge agreed. A crew chief for eight years at Homestead Air Reserve Base, Fla., before joining the AFRC logistics team, he has firsthand experience with the cumbersome, heavy laptops.
"We had to wait 10-15 minutes after logging in just to connect to the network," he said. "By the time I got out to the flight line, I had to deal with WIFI connectivity issues. It just wasn't working. At the time, most of the mechanics preferred to take paper TOs."
"It really defeated the purpose [of having electronic tech orders]," Deemer said. "The whole idea was to save money. It didn't save a whole lot of money.
Ruggedized laptops cost nearly $3,500 apiece. Converting to the iPads provides the Air Force a cost avoidance of more than $12 million over the course of a three-year tech refresh cycle, according to Deemer.
Michael Phillips, AFRC Technical Order Distribution Office manager, is credited with bringing the iPad solution to the table.
The iPad was chosen because it performed better than other tablet devices they tested, Phillips said.
"The iPad can hold thousands of TOs, and it can open more than one book at a time, which wasn't a capability of some of the other tablets we tested at the time," he said.
"These are standard off-the-shelf iPads," Phillips explained. "We haven't changed a thing other than disable WIFI and the camera. All we added was a rubber waterproof and scratch-resistant cover. And, we can field them at less than one-ninth the cost of the ruggedized laptops."
"Oddly enough, the maintainers like the iPads so much, they take better care of them because they see them as such a valuable tool"
To ensure the iPads could safely be used in and around aircraft, the devices underwent military standards testing at the Air National Guard and Air Reserve Test Center in Tucson, Ariz.
The command then fielded iPads at six AFRC bases to stress the devices in extreme cold, heat and humidity. Maintainers in Minnesota, Massachusetts, New York, Indiana, Ohio and Florida put the iPads through the paces.
"Feedback we got from the maintainers was fantastic. They said the devices could revolutionize maintenance," Phillips said.
"What we're seeing with the iPads is more efficient and effective tech order usage, as has been reported during operational readiness and other inspections," Deemer said.
A recent Air Combat Command Combined Unit Inspection of the 920th Rescue Wing, Patrick AFB, Fla., commended the unit for "sound technical order usage." The rescue wing was an early adopter of the eTools Lite system.
The iPads are so convenient and easy to use, maintainers race to the tool crib each morning to get one before they run out.
On a typical maintenance job, an F-16 crew chief carries six to eight tech orders, work cards and job guides. This makes the TO kit weigh 15 to 20 pounds. The iPad, which contains nearly all the TO's in the Air Force library, weighs 2.5 pounds and can be grasped in one hand.
"With paper tech orders, maintainers have a tough time dealing with wind, rain and hydraulic fluid. The paper has the potential to blow away, creating a foreign object damage hazard better known as FOD," Runge said. "You get the picture."
Despite the benefits of the iPads, the logistics directorate faced an uphill battle to get them, said Deemer.
"There were a lot of naysayers," she said. Fielding the iPads took considerable effort, from selecting the best device from a host of competing products, testing, then developing the concept of operations, policies and procedures and management of the program.
"But, it was worth pursing," Deemer said.
"We've had the great privilege to have leaders here who recognized that it was worth pursuing and went through all the pain that is required to get something like this. I think this is a tremendous accomplishment.
"This is one of the greatest advancements in maintenance that we've seen in recent years because it directly benefits maintainers. It immediately makes their jobs easier, quicker. I'm excited about this and as more people start using the iPad they will be excited, too," Deemer said.
FORT MEADE, Md., May 9, 2013 – Approval last week of security technical implementation guides for BlackBerry and Samsung Knox devices means that Defense Department organizations will be able to use those devices in conjunction with a secure enterprise mobility environment.
The May 2 release of the Defense Information Systems Agency’s Samsung Knox STIG provisionally allows DOD to use the latest technology as soon as it is available commercially. Officials also released STIGs for the BlackBerry 10, Blackberry Playbook and Blackberry Device Service. The STIGs allow use of accepted devices as part of approved mobility pilots with actively defended mobile device management systems, DISA officials said.
The Samsung Knox STIG represents a paradigm shift in DISA's business processes that dramatically increased the efficiency of bringing new devices into the DOD enterprise, officials added. DISA field security operations developed the Samsung Knox STIG ahead of its commercial release, they noted, highlighting how close partnerships between government and industry are delivering the latest enterprise technology to meet department needs.
A key component of the secure mobility environment is the mobile device management system that provides enforcement of the STIG settings, as well as other key security functions. Achieving DOD security objectives requires both the device security, defined in the STIG, as well as active defense provided through the mobile device management system, which DISA will implement through a contract award in early summer.
The DOD Commercial Mobile Device Implementation Plan, released in February, led to the new process and served as the basis for establishing the list of approved devices. The plan tasked DISA to develop a new process for approving mobile devices "to ensure that DOD will have access to the latest mobile technologies in a timely manner by maximizing vendor participation."
"DISA established a process where vendors develop STIGs following DOD security requirements guides and submit documentation and evidence for DISA's validation," said Terry Sherald, chief of DISA’s information assurance standards branch. "We are excited to continue working with other commercial mobile device providers to support a diverse, competitive multivendor environment."
WASHINGTON, May 8, 2013 – The Defense Department is committed to providing the best medical care and recovery for service members with traumatic brain injury, DOD’s top doctor said in a statement issued yesterday.
NICoE was constructed with philanthropic donations and is staffed by DOD personnel, which represents an “important new model in public-private partnership,” Woodson said.
Located on the Walter Reed National Military Medical Center campus in Bethesda, Md., NICoE brings in leading academic and military researchers to collaborate on the “nexus of TBI and psychological health conditions” that affect military readiness and public health, Woodson said.
Coming initiatives will further broaden TBI research, treatment and education as facilities and programs come online, he said.
-- NICoE is expanding with nine satellite clinics situated on military installations. They are Camp Lejeune, S.C.; Camp Pendleton, Calif.; Fort Campbell, Ky.; Fort Belvoir, Va.; Joint Base Lewis-McChord, Wash.; Fort Bragg, N.C.; Fort Carson, Colo.; and Fort Hood and Fort Bliss, Texas.
-- Research findings will be rapidly translated into clinical policy to ensure service members receive the most up-to-date, evidence-based medical care following a concussion.
-- Another goal is to reduce the stigma of TBI through partnerships, such as the formalized agreement made in August 2012 between the Army and NFL Commissioner Roger Goodell. The agreement pledges work on both sides to improve awareness of brain injuries, reduce the stigma of TBI, and change the culture surrounding such injuries on the battlefield and in the locker room.
-- The first brain tissue repository has been created to address the underlying mechanisms that cause brain injury and disabilities in service members with TBI. The repository is kept at the Uniformed Services University of the Health Sciences, also on the Walter Reed campus.
“Although our work has been underway for years, we are still in the early stages of beginning to unlock the mysteries of how the brain responds to traumatic events,” Woodson said.
WASHINGTON, May 3, 2013 – Pentagon officials yesterday approved the security technical implementation guides for BlackBerry 10 smartphones and BlackBerry PlayBook tablets with BlackBerry Enterprise Service 10, as well as Samsung's Android Knox, to be used on Defense Department networks.
“This is a significant step towards establishing a multivendor environment that supports a variety of state-of-the-art devices and operating systems,” Air Force Lt. Col. Damien Pickart, a Pentagon spokesman, said in a statement announcing the approval.
Several mobile devices and operating systems are going through the Defense Information Systems Agency's review and approval process. A security technical implementation guide approval establishes a configuration that allows a secure connection to DOD networks, which facilitates the process by eliminating the need for security reviews at the individual organization level, Pickart explained. However, he added, yesterday's decision does not result in product orders.
The level of security necessary throughout the department does not rest solely on any one mobile device, Pickart said, adding that the network and software also must be secured and managed appropriately. An integral part of the secure mobility framework will be the Mobility Device Management and Mobile Application Store, which is in source selection now and anticipated for award in early summer, he said.
5/3/2013 - WRIGHT-PATTERSON AIR FORCE BASE, Ohio -- The final flight of the X-51A Waverider test program has accomplished a breakthrough in the development of flight reaching Mach 5.1 over the Pacific Ocean on May 1, 2103.
"It was a full mission success," said Charlie Brink, X-51A program manager for the Air Force Research Laboratory Aerospace Systems Directorate.
The cruiser traveled over 230 nautical miles in just over six minutes over the Point Mugu Naval Air Warfare Center Sea Range. It was the longest of the four X-51A test flights and the longest air-breathing hypersonic flight ever.
The X-51A took off from the Air Force Test Center at Edwards AFB, Calif., under the wing of a B-52H Stratofortress. It was released at approximately 50,000 feet and accelerated to Mach 4.8 in about 26 seconds, powered by a solid rocket booster. After separating from the booster, the cruiser's scramjet engine then lit and accelerated to Mach 5.1 at 60,000 feet.
After exhausting its 240-second fuel supply, the vehicle continued to send back telemetry data until it splashed down into the ocean and was destroyed as designed. All told, 370 seconds of data was collected from the experiment.
"This success is the result of a lot of hard work by an incredible team. The contributions of Boeing, Pratt and Whitney Rocketdyne, the 412th Test Wing at Edwards AFB, NASA Dryden and DARPA were all vital," said Brink.
This was the last of four test vehicles originally conceived when the $300 million technology demonstration program began in 2004. The program objective was to prove the viability of air-breathing, high-speed scramjet propulsion.
The X-51A is unique primarily due to its use of a hydrocarbon fuel in its supersonic combustion ramjet, or scramjet, engine. Other vehicles have achieved hypersonic -- generally defined as speeds above Mach 5 -- flight with the use of hydrogen fuel. Without any moving parts, hydrocarbon fuel is injected into the scramjet's combustion chamber where it mixes with the air rushing through the chamber and is ignited in a process likened to lighting a match in a hurricane.
The use of logistically supportable hydrocarbon fuel is widely considered vital for the practical application of hypersonic flight.
As a technology demonstration program, there is no immediate successor to the X-51A program. However, the Air Force will continue hypersonic research and the successes of the X-51A will pay dividends to the High Speed Strike Weapon program currently in its early formation phase with AFRL.
5/2/2013 - EIELSON AIR FORCE BASE, Alaska -- A team of researchers from the NASA Airborne Science Program recently visited Eielson to assemble topography of glaciers and ice sheets in Alaska April 25 to 27, 2013.
Due to some of the research taking place in the Beaufort Sea, Eielson's location provided NASA with necessary personnel and equipment to achieve mission objectives.
"This NASA mission is just another example of how Eielson's unique location, capacity and support infrastructure can be leveraged to support and enable a myriad of [Department of Defense] and federal organization's missions," said Robert Cologie, 354th Operations Support Squadron current operations flight commander. "The NASA support distinctly captures the cornerstone essence of Team Eielson's prepare, enable and deploy skillset."
NASA's team developed a radar system capable of generating wide-swath, precise digital elevation models of glaciers and ice sheets. Aptly named GLISTIN-A, Glacier and Ice Surface Topography Interferometer-Airborne, this sensor collects glacier measurements and sea ice observations.
"Specifically, the GLISTIN-A sensor ... contributes high accuracy, high resolution swath measurements in targeted regions that are topographically and dynamically complex," said Delwyn Moller, NASA Jet Propulsion Laboratory. "The sea ice acquisitions are a test of the sensor's capabilities and potential to measure freeboard and are the first measurements of this kind."
To obtain images from the sensor, GLISTIN-A is attached to a NASA C-20A aircraft. The aircraft, obtained from the Air Force in 2003, has been structurally modified and instrumented by NASA's Dryden Flight Research Center to serve as a multirole, cooperative research platform.
The mission to Alaska focused primarily on tidal glaciers, which have a more direct contribution to sea level rise, in order to potentially seed larger-scale observations in other campaigns for climate change science, Moller said.
"Sea ice is just one factor in studying climate change, but it is a major indicator of a warming climate," she explained. "GLISTIN-A has a potential to map and monitor the distribution and mass of the sea ice in a way not currently available through alternate space-borne or airborne sensors."
With the success of the mission to Alaska and the support received from the Iceman Team, members of the C-20A crew are excited to return to the Interior in the future.
"We spend a lot of time at Air Force bases and international airports across the globe, receiving the necessary ground support that is needed to make our missions a success," said John McGrath, C-20A project manager. "The help we have received from everyone here at Eielson is by far the best we have ever experienced and has made our lives very easy and our mission a success, and we are looking forward to coming back up here again."
5/2/2013 - COLORADO SPRINGS, Colo. -- The kind of dramatic innovation that brought the world the Global Positioning System is desperately needed today in military space and cyberspace, according to Air Force Space Command's Vice Commander.
"Innovation is really what defines us as a Service," said Lt. Gen. John Hyten at the annual National Security Innovation Competition held here Apr. 25. "Our Service has been built on Airmen doing amazing things, fueled by innovation."
"There are some spectacular examples of innovation ," in the Air Force's history, General Hyten told the audience of about 50 college students and technology professionals. The Air Force was one of the first to put integrated circuits to use in the early 1960's as part of the guidance system for Minuteman intercontinental ballistic missiles. Probably the best-known innovation, he said, was the Global Positioning System, better known to the world as GPS.
Early in the development of GPS, even Air Force leaders could not fully appreciate the potential uses of global, precision navigation and timing. "Very few could think out of the box and look into the future and see there was a different way of doing business" said the general.
Today, of course, people all over the world depend on not only the navigation GPS provides, but many financial systems depend on the precision timing signal. "You can't buy gas without GPS," in the United States, he said. GPS, "fundamentally changed warfare; it fundamentally changed the world."
Innovation is a central theme in the new Air Force Vision. "Our Airmen's ability to rethink the battle while incorporating new technologies will improve the varied ways our Air Force accomplishes its missions," wrote Air Force Secretary Michael Donley and Chief of Staff General Mark Walsh III, in the document released in January, 2013.
General Hyten challenged the competitors to fight for their innovations, even in the face of opposition from bureaucracies and naysayers.
"We have a desperate need for innovation in both space and cyber," he said. "We have declining budgets. We have a completely different threat environment," in both cyber and space. "We need to figure out how to fight through contested environments," he said. "We have to come up with new ideas. If we don't, we fail as a nation."
As Vice Commander, General Hyten helps lead more than 40,000 professionals engaged in military space and cyberspace operations for the Air Force, a mission which requires experts with a Science Technology Engineering and Mathematics education.
The National Security Innovation Competition links students conducting cutting-edge research on concepts and technologies intended to meet national security capability needs with government and industry customers. Finalists this year included teams from the U.S. Air Force Academy, U.S. Military Academy at West Point, University of California, Davis; University of Colorado at Colorado Springs; Virginia Tech; Colorado Technical University and the University of Wyoming.
Innovations presented at the conference included an underwater texting system, search-and-rescue robots, cyber security software, and nerve agent detectors.
5/1/2013 - KIRTLAND AIR FORCE BASE, N.M. -- The Space Development and Test Directorate at Kirtland is helping NASA launch a spacecraft to the moon this summer.
NASA is sending the Lunar Atmosphere and Dust Environment Explorer, or LADEE, to orbit the moon and study the moon's atmosphere. LADEE will be launched into space from a rocket the SDTD helped build.
"We developed a unique five-stage rocket that could get a probe to the moon and utilize the different experiments onboard," said Col. Urban Gillespie, SDTD Launch Systems Division chief.
The rocket is built to have five stages to ensure the probe makes it to the moon and is in the right orbit to perform its mission.
"It's similar to the different clubs you use in golf," Gillespie said. "The first three stages of the rocket are like your drivers, and will be used to send the probe into orbit around the earth. The fourth stage is like your mid-iron, and is used to propel the probe toward the moon. The final stage is like a putter, and will put the probe in the exact orbit trajectory it needs to reach the moon."
The rocket, which uses three retired Peacekeeper intercontinental ballistic missile motors and two commercial motors, is scheduled to launch Aug. 12 from the Wallops Flight Facility in Virginia. LADEE is the first major NASA payload to fly on an Air Force rocket from NASA's range at Wallops.
"The rocket is being processed at Vandenberg Air Force Base, Calif., and then will be transported to Wallops and assembled there before it is launched," said Master Sgt. Dave Grimes, Peacekeeper operations support manager.
Grimes said transporting 35-foot, 117,000-pound rocket motors presents unique challenges, particularly moving it along traffic-congested highways and narrow back roads in eastern states - so to gain experience, he and his team transported rocket motor mockups across the country last year. The mockups are the same size as the real rocket motors, but are weighted with cement instead of propellant.
Once LADEE is launched, its mission is expected to last 160 days. It will take 30 days for the probe to reach the moon, followed by 30 days ensuring everything on the satellite is working properly. For the next 100 days, LADEE will orbit the moon, studying the lunar atmosphere, performing various science experiments and analyzing data.
"Obviously, we want NASA to be successful, but for us, success will be getting the rocket and the probe on the precise trajectory which will be challenging, because we have only a narrow 30-minute window to launch the rocket and get it where it needs to be," Gillespie said. | 2019-04-21T05:10:05Z | http://talk-technology.blogspot.com/2013/05/ |
You searched for subject:(Parent Involvement). Showing records 1 – 30 of 473 total matches.
1. Dove, Meghan Mimi. Parent involvement: the impact of community connections and technology.
▼ The benefits of parent involvement have been found to impact children, parents, teachers, and schools as a whole. This study builds of the Hoover-Dempsey and Sandler’s (1997, 2005) Theoretical Model of the Parental Involvement Process to explore specific influences on parent involvement behaviors. Two additions to the model were made to account for the lack of research on the impact of parents feeling connected to a school community and parents’ use of technology to connect with their children’s school. The current study used structural equation modeling to analyze the paths hypothesized by the model of parent involvement process. A sample of 220 parents with kindergarten to fifth grade students completed surveys addressing their perceptions of their personal motivators to be involved, perceptions of invitations to be involved, feelings of being connected to their child’s school community, ways of communication with the school, and involvement practices at home and at school. Findings partially supported Hoover-Dempsey’s model as well as the predicted model of parent involvement being influenced by parents feeling connected and technology usage. Furthermore, feeling connected to the school community was found to mediate the relationship between role construction and parent involvement. Lastly, lower technology usage was found to moderate the relationships between parents feeling connected to the school and parent involvement. Advisors/Committee Members: David W. Wright.
Dove, Meghan Mimi. “Parent involvement: the impact of community connections and technology.” 2013. Doctoral Dissertation, University of Georgia. Accessed April 18, 2019. http://purl.galileo.usg.edu/uga_etd/dove_meghan_m_201308_phd.
Dove, Meghan Mimi. “Parent involvement: the impact of community connections and technology.” 2013. Web. 18 Apr 2019.
Dove MM. Parent involvement: the impact of community connections and technology. [Internet] [Doctoral dissertation]. University of Georgia; 2013. [cited 2019 Apr 18]. Available from: http://purl.galileo.usg.edu/uga_etd/dove_meghan_m_201308_phd.
2. Lim, Minjung. An analysis of ethnic networking of Korean immigrant parents in school participation.
▼ Parent involvement in schools involves constantly constructing meaning through social interactions. Immigrant parents often encounter structural barriers that constrain their ownerships in schools, and turn to their own ethnic groups in search of supportive social networks. The purpose of this study is to examine whether Korean immigrant parents as a group create effective social capital conducive to authentic involvement in the school. As a collective mode of social interaction, ethnic networking of a particular ethnic group negotiates understandings and actions authored by immigrant parents, in relation to parental involvement in school. By using a critical ethnographic case study, this study unpacks contradictions and complexities in Korean immigrant parents’ participation experiences, and challenges the hegemonic discourse of parent involvement prevailing in the school. Advisors/Committee Members: Kyunghwa Lee.
Lim, Minjung. “An analysis of ethnic networking of Korean immigrant parents in school participation.” 2009. Doctoral Dissertation, University of Georgia. Accessed April 18, 2019. http://purl.galileo.usg.edu/uga_etd/lim_minjung_200908_phd.
Lim, Minjung. “An analysis of ethnic networking of Korean immigrant parents in school participation.” 2009. Web. 18 Apr 2019.
Lim M. An analysis of ethnic networking of Korean immigrant parents in school participation. [Internet] [Doctoral dissertation]. University of Georgia; 2009. [cited 2019 Apr 18]. Available from: http://purl.galileo.usg.edu/uga_etd/lim_minjung_200908_phd.
3. King, Shireen Powell. Expected and actual parental involvement during the college years: perceptions of parents and students.
▼ The majority of today’s traditional-age college students are from the Millennial generation, meaning, among other things, that they have a different type of relationship with their parents than previous generations. Typically, their parents have been involved in their school lives throughout their K-12 years. Many parents expect to continue being involved while their sons and daughters are in college. Because there is a changing trend in parent-child relationships and this change is being seen in higher education, administrators need to understand and prepare for the impact of these trends. In order to meet the challenges surrounding parental involvement and to create avenues for improvement of parent-student-institution relationships, it is important to have a clear understanding of the underpinnings and the expectations of parents and traditional-age college students. Much of what is available in the literature today regarding parental involvement during the college years is anecdotal and conceptual in nature. The purpose of this study was to examine parental involvement from the perspectives of today’s traditional-age college students and their parents, including the examination of several variables (race/ethnicity, gender, family income level, educational background of the parent, having siblings in college, first generation to attend college, student classification, type of institution currently attending, or level of parental involvement in high school) to determine if differences existed in their expectations for involvement. Additionally, 122 parent-student family unit matched pairs were examined for similarities and differences in their perceptions of parental involvement. Two parallel versions of the College Parent Experience Questionnaire (CPEQ) were administered online: one for college students and one for their parents. Data analysis of the 502 parent respondents and 159 student respondents produced a multitude of significant findings. These findings provide empirical data on parental involvement that will guide institutions in the development of parent programs, parent offices, and guideline for parent interactions. Additionally this information is useful when planning programs for today’s Millennial college students. Advisors/Committee Members: Diane L. Cooper.
King, Shireen Powell. “Expected and actual parental involvement during the college years: perceptions of parents and students.” 2007. Doctoral Dissertation, University of Georgia. Accessed April 18, 2019. http://purl.galileo.usg.edu/uga_etd/king_shireen_p_200708_phd.
King, Shireen Powell. “Expected and actual parental involvement during the college years: perceptions of parents and students.” 2007. Web. 18 Apr 2019.
King SP. Expected and actual parental involvement during the college years: perceptions of parents and students. [Internet] [Doctoral dissertation]. University of Georgia; 2007. [cited 2019 Apr 18]. Available from: http://purl.galileo.usg.edu/uga_etd/king_shireen_p_200708_phd.
4. Nosek, Erin Marie. The Initiation and Implementation of a K-2 Parent Involvement Program in a Rural Context.
▼ This qualitative case study focused on K-2 Parent Involvement in a small rural elementary school. It was designed to review the types of parent involvement that occur over time and to identify the most effective forms of parent involvement. The study also investigated specific teacher beliefs and behaviors related to parent involvement and documented any changes in these beliefs and behaviors as a result of being in the study. A final review of challenges to parent involvement was documented. Data was collected from six volunteer teachers working in kindergarten, grade one, and grade two. Data collection tools included staff pre and post interviews, staff surveys, classroom parent involvement logs, and teacher monthly reflection prompts. The findings of the study indicate that teachers do value parent involvement and that they believe they encourage this involvement in their classroom. The teachers also believe there is a link between parent involvement and student achievement. The teachers in this study identified many challenges to the creation of a parent involvement program including time constraints of parents and teachers, a classroom and school structure that may not welcome or support parent involvement, as well as an education or training issue for parents, so that they may understand the benefits of parent involvement. It was also suggested that teachers would benefit from professional development in the area of parent involvement. Implications for practice include offering workshops for parents on curriculum expectations and on the importance of parent involvement, professional development for teachers highlighting the need for parent involvement, initiating a coordinated school wide parent involvement program, and creating a welcoming and supportive school climate that encourages parent involvement. Limitations to the study include the small sample size, the short duration of the study, and the researcher's role as superintendent. Advisors/Committee Members: Elizabeth Twomey (Thesis advisor), Robert Starratt (Thesis advisor).
Nosek, Erin Marie. “The Initiation and Implementation of a K-2 Parent Involvement Program in a Rural Context.” 2009. Doctoral Dissertation, Boston College. Accessed April 18, 2019. http://dlib.bc.edu/islandora/object/bc-ir:101826.
Nosek, Erin Marie. “The Initiation and Implementation of a K-2 Parent Involvement Program in a Rural Context.” 2009. Web. 18 Apr 2019.
Nosek EM. The Initiation and Implementation of a K-2 Parent Involvement Program in a Rural Context. [Internet] [Doctoral dissertation]. Boston College; 2009. [cited 2019 Apr 18]. Available from: http://dlib.bc.edu/islandora/object/bc-ir:101826.
5. Sedory, Stacy Jill. Comparing the Viewpoint: Understanding New and Experienced High School Teachers' Perceptions of Parent Involvement in Students' Educational Experiences.
▼ The purpose of this study was to examine the high school teacher's perceptions of parent involvement and how viewpoints differ based on years of experience and the population served. The study consisted of a survey with open-ended questions given to teachers and administrators and other non-classroom instructional personnel at a high socio-economic school and at a low socio-economic school. The surveys were analyzed and data were presented based on the viewpoints of teachers with fewer than six years of experience, between six and fourteen years of experience and greater than fifteen years of experience. Responses were also presented from non-classroom educators such as guidance counselors and administrators. There were five findings emerging from this study. The first finding revealed that teacher perceptions of parent involvement varied between low and high socio-economic schools. Another finding discovered that the group of students being taught may play more of a role in teacher perception of parent involvement than the socio-economic status of the school. The third finding was teacher perceptions of key characteristics of parent involvement don't necessarily align with ways teachers say parents are involved. The next finding revealed that teachers communicate with parents via various forms of technology. The final finding exposed that teachers feel that school related involvement at home is important. Advisors/Committee Members: Cash, Carol S. (committeechair), Rogers, Catherine Spain (committee member), Price, Ted S. (committee member), Twiford, Travis W. (committee member).
Sedory, Stacy Jill. “Comparing the Viewpoint: Understanding New and Experienced High School Teachers' Perceptions of Parent Involvement in Students' Educational Experiences.” 2014. Doctoral Dissertation, Virginia Tech. Accessed April 18, 2019. http://hdl.handle.net/10919/48590.
Sedory, Stacy Jill. “Comparing the Viewpoint: Understanding New and Experienced High School Teachers' Perceptions of Parent Involvement in Students' Educational Experiences.” 2014. Web. 18 Apr 2019.
Sedory SJ. Comparing the Viewpoint: Understanding New and Experienced High School Teachers' Perceptions of Parent Involvement in Students' Educational Experiences. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10919/48590.
6. Wanda, Innocent Bhekani. Parent-educator partnership in schools .
▼ The aims of this study are: ~ To pursue a study of relevant literature on the parent-educator partnership. ~ To undertake an empirical investigation concerning parents and educators as partners in the education of the child. ~ To formulate certain recommendations that may serve as guidelines for the establishment of an effective partnership between parents and educators at schools. Research with regard to this study will be conducted as follows: ~ A literature study of available relevant literature. ~ An empirical survey comprising a questionnaire to be completed by educators. Chapter 2 will be a literature review on the parent-educator partnership. Chapter 3 will explain the planning of the empirical research. Chapter 4 will be a presentation and analysis of the research data. Chapter 5 will contain a summary, findings and recommendations. Advisors/Committee Members: Vos, M.S (advisor).
Wanda, Innocent Bhekani. “Parent-educator partnership in schools .” 2006. Thesis, University of Zululand. Accessed April 18, 2019. http://hdl.handle.net/10530/98.
Wanda, Innocent Bhekani. “Parent-educator partnership in schools .” 2006. Web. 18 Apr 2019.
Wanda IB. Parent-educator partnership in schools . [Internet] [Thesis]. University of Zululand; 2006. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10530/98.
7. Adams, Jackie Brewer. When parents meet with a high school principal.
▼ The purpose of this study was to examine the interactions between parents and principals in principal-parent conferences in a high school setting. Ethnographic research procedures, guided by the theoretical framework of symbolic interactionism, were used to report the interactions from the perspectives of the participants. This research was a case study featuring in-depth interviews with parents and principals. Interviews, focusing on participant perspectives of the conference, were audio taped and transcribed for interpretation and analysis. Additional research procedures included observations of the conferences, journal writing, and the inclusion of archival materials drawn from the site. A phenomenological analysis, applied to the data, yielded categories and themes that were grounded in the data and framed interactions as stories based on the perspectives of each principal and parent participant. Although limited in scope, findings from the study revealed principal-parent interactions provide a valuable source of knowledge surrounding principal-parent conferences. The study revealed differences in the meanings principals and parents attached to the same conference. At times, these differences blocked partnership building between parent and principal participants. Results from the study emphasized the importance of understanding meanings parents attach to interactions with principals. This kind of knowledge could contribute to building more effective relationships with parents. The study also points to the need for more research that could help principals implement strategies for building partnerships with parents for the benefit of all students. Advisors/Committee Members: Sally Zepeda.
Adams, Jackie Brewer. “When parents meet with a high school principal.” 2003. Doctoral Dissertation, University of Georgia. Accessed April 18, 2019. http://purl.galileo.usg.edu/uga_etd/adams_jackie_b_200308_edd.
Adams, Jackie Brewer. “When parents meet with a high school principal.” 2003. Web. 18 Apr 2019.
Adams JB. When parents meet with a high school principal. [Internet] [Doctoral dissertation]. University of Georgia; 2003. [cited 2019 Apr 18]. Available from: http://purl.galileo.usg.edu/uga_etd/adams_jackie_b_200308_edd.
8. Smith, Kimberly Evon. Critical Reflections: Interviews with Parents Regarding Truancy.
▼ Truancy is an issue that markedly impacts many children nationwide. Truancy takes root in many elementary schools. When socioeconomic and engagement problems are unaddressed, students exhibit a much higher likelihood of abusing drugs and alcohol and engaging in criminal behaviors that are harmful to themselves and society at large. Research on truancy has mainly focused on high school students; however, little research has been conducted specific to elementary school students and parental involvement as it relates to truancy. This research study queried the perspectives of minority parents of habitually truant elementary school students on truancy. The key question was if school attendance review board letters sent to truant families monthly effectively resolved truancy at the school in this study. This study captured the voices of parents using semistructured interviews, examining the effectiveness of current truancy-reduction strategies at the school site studied and gain insight from parents about possible solutions to truancy problems. Predicated on Ogbu’s cultural-inversion theory and Cummins’s cultural-invasion theory, the study focused on minority families’ attitudes and behaviors toward systemic and crystallized institutions of learning. The following themes emerged from participants’ responses to the interview questions: a lack of academic impact, a different perception of truancy, illness as a challenge, lack of support, and limited ability to be involved with school matters. In conclusion, findings revealed that parents genuinely cared about their child’s education and felt disempowered due to socioeconomic challenges. Also, impersonal letters were ineffective as parents desired to be treated as individuals by the school. Additional research is needed concerning parents’ knowledge and understanding of truancy laws. Advisors/Committee Members: Dr. Patricia Mitchell, Dr. Betty Taylor, Dr. Rosita Galang.
Smith, Kimberly Evon. “Critical Reflections: Interviews with Parents Regarding Truancy.” 2015. Thesis, University of San Francisco. Accessed April 18, 2019. https://repository.usfca.edu/diss/290.
Smith, Kimberly Evon. “Critical Reflections: Interviews with Parents Regarding Truancy.” 2015. Web. 18 Apr 2019.
Smith KE. Critical Reflections: Interviews with Parents Regarding Truancy. [Internet] [Thesis]. University of San Francisco; 2015. [cited 2019 Apr 18]. Available from: https://repository.usfca.edu/diss/290.
9. Flavell, Margaret. Pacific Island families’ perceptions of the parental role in the learning process – in a high school setting.
Flavell, Margaret. “Pacific Island families’ perceptions of the parental role in the learning process – in a high school setting.” 2014. Masters Thesis, Victoria University of Wellington. Accessed April 18, 2019. http://hdl.handle.net/10063/3468.
Flavell, Margaret. “Pacific Island families’ perceptions of the parental role in the learning process – in a high school setting.” 2014. Web. 18 Apr 2019.
Flavell M. Pacific Island families’ perceptions of the parental role in the learning process – in a high school setting. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10063/3468.
10. Unsinn, Alicia Savelich. The efficacies of home visits: a study in Mrs. Garcia's 3rd grade classroom at Tahoe Elementary School.
▼ The purpose of this study was to determine the efficacies of home visits in Mrs. Garcia???s 3rd grade classroom at Tahoe Elementary School. Specifically, answers to the following research questions were sought: ??? Do the families feel that home visits have positive outcomes? ??? Do the students feel that home visits have positive outcomes? ??? How did the families and their children react to the home visits? ??? What effect did the home visits have on the parent teacher communication throughout the school year? Sources of Data The population used for this study consisted of the students and their families in Mrs. Garcia???s 3rd grade classroom, Mrs. Garcia herself, and the principal, Ms. Curry, at Tahoe Elementary School. Data was collected through the use of questionnaires and in-depth interviews. The responses represented the opinions of those students and their parents in Mrs. Garcia???s 3rd grade classroom. The data collected was reviewed and analysed by the researcher. All of this information was documented and formulated into an organized group of data to complete this study. Conclusions Reached The researcher concludes that the students and their families in Mrs. Garcia???s classroom, Mrs. Garcia herself, and the principal at Tahoe Elementary School, are all advocates of home visits. All of the subjects agreed that the outcomes of home visits were positive and beneficial to not only the students but their families as well. The communication between the student, their families and the teacher increased due to the home visits. Many of the students??? confidence in school increased as well, both socially and academically. Advisors/Committee Members: Orey, Daniel C..
Unsinn, Alicia Savelich. “The efficacies of home visits: a study in Mrs. Garcia's 3rd grade classroom at Tahoe Elementary School.” 2010. Masters Thesis, California State University – Sacramento. Accessed April 18, 2019. http://hdl.handle.net/10211.9/447.
Unsinn, Alicia Savelich. “The efficacies of home visits: a study in Mrs. Garcia's 3rd grade classroom at Tahoe Elementary School.” 2010. Web. 18 Apr 2019.
Unsinn AS. The efficacies of home visits: a study in Mrs. Garcia's 3rd grade classroom at Tahoe Elementary School. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.9/447.
11. Romero, Gabriela. The Role of Latino Parent Involvement and Academic Achievement of Students .
▼ Parent involvement in the classroom is a challenge to acquire for communities that have not had positive experience with schools, specifically Latinos. The issues with overcoming the lack of Latino parental involvement can be addressed by educators with a focus on culture, andragogy and effective outreach. This project includes a set of workshops to reach out to Latino parents and help them understand schooling and learn how to support their child???s learning at home. The workshops are designed with a focus on Latino culture (culturally relevant pedagogy), best practices for adult learning (andragogy) and effective instruction (Understanding by Design (Wiggins & McTighe, 2005). The project consists of five workshops: What are (Homework) Boundaries?, How to Make a Special Place to Do Homework, Better Communication Between Parent and Child, Math Support Strategies, and Getting Involved with the School. Each workshop has been developed to provide engaging activities that are supported by culture and language. The workshops focus on the importance of parent involvement, culture, and developing a relationship between parents, children, and teachers. Advisors/Committee Members: Elsbree, Anne Rene (advisor).
Romero, Gabriela. “The Role of Latino Parent Involvement and Academic Achievement of Students .” 2012. Thesis, California State University – San Marcos. Accessed April 18, 2019. http://hdl.handle.net/10211.8/126.
Romero, Gabriela. “The Role of Latino Parent Involvement and Academic Achievement of Students .” 2012. Web. 18 Apr 2019.
Romero G. The Role of Latino Parent Involvement and Academic Achievement of Students . [Internet] [Thesis]. California State University – San Marcos; 2012. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.8/126.
12. Mason, Alleson. Parent Involvement in Education Among African and Caribbean Born Immigrants in Saskatoon.
▼ Abstract The difference in educators’ and immigrant parents’ definition of parent involvement has led to the view that immigrant parents are less involved in their children’s education than native parents from the middle class (Crozier & Davies, 2005). The purpose of this study was to understand the experience of three immigrant parents born in Africa and the Caribbean with parent involvement in their children’s education at the elementary level. This phenomenological study utilized semi-structured interviews to gain a better understanding of the various ways in which immigrant parents are involved in their children’s education, and the factors that influenced how they became involved. The findings revealed that the essence of the parents’ experience of involvement in their children’s education was maintaining nurturing relationships. Participants guided their children into a relationship with God, they cultivated a loving relationship with their children, and had a cooperative relationship with their children’s school. The parents’ experience is explored using the themes spiritual leadership, creating and nurturing relationships, and anticipatory socialization. The description of the parents’ experiences provides some insight into how immigrant parents view and enact their role in their children’s education. The study also highlights how different cultural beliefs influence the ways in which parents contributed to their children’s development. The parents were already making contributions in a variety of ways to their children’s education. However, for the most part their activities were home-based and geared towards only their own children. There were opportunities for the parent to become more involved in ways that would extend to other members of the school community. The implications of this study for practice are that educators should give an orientation to parents new to Canada about strategies they can use to incorporate school based involvement activities into their busy schedules. This will suggest ideas that parents may not have considered and could be effective in increasing their involvement on the school compound. Implications for future research include the need to investigate how culture delimits the ways in which parents become involved. There is also a need to explore what factors would motivate immigrant parents to become more involved in their children’s education on the school site. Advisors/Committee Members: Okoko, Janet, Burgess, David, Noonan, Warren, Newton, Paul, Pushor, Debbie.
Mason, Alleson. “Parent Involvement in Education Among African and Caribbean Born Immigrants in Saskatoon.” 2016. Thesis, University of Saskatchewan. Accessed April 18, 2019. http://hdl.handle.net/10388/ETD-2016-12-2375.
Mason, Alleson. “Parent Involvement in Education Among African and Caribbean Born Immigrants in Saskatoon.” 2016. Web. 18 Apr 2019.
Mason A. Parent Involvement in Education Among African and Caribbean Born Immigrants in Saskatoon. [Internet] [Thesis]. University of Saskatchewan; 2016. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10388/ETD-2016-12-2375.
13. Zink, Sarah. Involvement Matters.
▼ This project examines how parents’ past educational experiences affect how they help their children at home with literacy. To conduct this study, I sent home open-ended surveys to parents in my second grade classroom that pertain to parents’ knowledge, beliefs, and how they contribute to their current involvement with their children’s literacy activities at home. Along with the survey, I interviewed second grade students with open-ended questions to uncover their perception of interactions and involvement of their parents at home. Analysis uncovered common themes across the data. Previous literature shows that there is a connection between parent involvement and student’s achievement; however, literature is limited to parents’ past experiences and their involvement. Advisors/Committee Members: Sue Robb.
Zink, Sarah. “Involvement Matters.” 2016. Thesis, SUNY College at Brockport. Accessed April 18, 2019. https://digitalcommons.brockport.edu/ehd_theses/649.
Zink, Sarah. “Involvement Matters.” 2016. Web. 18 Apr 2019.
Zink S. Involvement Matters. [Internet] [Thesis]. SUNY College at Brockport; 2016. [cited 2019 Apr 18]. Available from: https://digitalcommons.brockport.edu/ehd_theses/649.
14. Hurst, Natalie Jo. Parental Participation in Speech and Language Therapy.
▼ This study explored parental involvement and factors that may affect parental involvement. Parental involvement has been shown to provide beneficial outcomes when used in conjunction with speech-language therapy. The purpose of this study was to explore factors that may affect parental involvement. Fifteen parents participated in this study. Parents were administered the Parent Involvement Questionnaire, which was designed for the purpose of this study. This questionnaire was used to interview parents about their involvement in speech-language therapy. Questions looked at parental involvement on three levels: first, the type of initiation; second, the type of input provided by the parent; and third, the frequency of parental involvement in the clinic or at home. Results indicate that parental education level was a substantial factor in parental involvement. Parent education level had significant positive correlations with parent initiation of interaction with clinician and working with the child at home on therapy goals. Also, results indicate that parents are participating in the home far more frequently than in the clinical setting. Advisors/Committee Members: Ash, Andrea (advisor), Giddens, Cheryl L. (committee member), Strom-Aulgur, Kaye (committee member).
Hurst, Natalie Jo. “Parental Participation in Speech and Language Therapy.” 2010. Thesis, Oklahoma State University. Accessed April 18, 2019. http://hdl.handle.net/11244/8587.
Hurst, Natalie Jo. “Parental Participation in Speech and Language Therapy.” 2010. Web. 18 Apr 2019.
Hurst NJ. Parental Participation in Speech and Language Therapy. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/11244/8587.
15. St. George, Carol Yerger; Mock, Martha. An Action research study : how can elementary teachers collaborate more effectively with parents to support student literacy learning?.
▼ Parental involvement (broadly defined as including both natural parents and other significant adults) has been consistently shown to produce positive results in students’ literacy achievement, and there is widespread agreement among parents and school personnel about the value of parental involvement in education. However, educators do not routinely include parents in literacy learning programs. The literature suggests that there may be many reasons for this phenomenon, including educators’ unfamiliarity with ways to build and sustain productive home-school connections. I developed this study with the ultimate goal of initiating better home-school partnerships to support elementary students’ literacy learning in my district, capitalizing on the findings of the rich literature on parental involvement. As a first step in this direction, I engaged a mixed group of elementary teachers and parents in my district in a Collegial Circle (a type of professional development offered in my district) designed to explore effective ways to collaborate with parents to support literacy learning. The Collegial Circle involved the participants in readings and discussions to make them aware of relevant literature findings, personal perceptions and biases, and alternative viewpoints, with the ultimate goal of producing a list of concrete recommendations about how to establish productive home-school collaborations to support literacy learning in our district. Assuming action research as the research methodology, this intervention along with the accompanying data collection and analysis was designed to address the following research questions: 1) What are some of the perceived challenges to building effective partnerships between parents (broadly defined) and teachers in our district? 2) How can the challenges thus identified be overcome? 3) How has participation in the Collegial Circle changed the thinking of the participating parents and teachers concerning the concepts of parent-teacher partnerships and literacy? I collected data from a variety of sources, including participants’ reflective journals and other assignments, audiotapes and artifacts from the Collegial Circle sessions, and a researcher’s journal. Qualitative methodology was employed to analyze these data with the goal of uncovering emerging themes that could shed light on each of the research questions. Epstein’s Theory of Overlapping Spheres and her typology of parental involvement provided the theoretical basis and framework informing the study. In the spirit of action research, teachers and parents participating in the Collegial Circle were not “passive participants” but rather were involved in on-going reflection about the Collegial Circle activities and provided input that changed some of the original plan and activities, as well as co-constructed with the researcher the list of recommendations constituting the end product of the Collegial Circle.
St. George, Carol Yerger; Mock, Martha. “An Action research study : how can elementary teachers collaborate more effectively with parents to support student literacy learning?.” 2009. Doctoral Dissertation, University of Rochester. Accessed April 18, 2019. http://hdl.handle.net/1802/7544.
St. George, Carol Yerger; Mock, Martha. “An Action research study : how can elementary teachers collaborate more effectively with parents to support student literacy learning?.” 2009. Web. 18 Apr 2019.
St. George, Carol Yerger; Mock M. An Action research study : how can elementary teachers collaborate more effectively with parents to support student literacy learning?. [Internet] [Doctoral dissertation]. University of Rochester; 2009. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/1802/7544.
16. Kuzin, Chuan Ally. Parent compacts in urban charter schools: an exploration of contents and processes.
▼ Research has shown that parent involvement activities, as outlined by Epstein (2001), are positively associated with student achievement. In urban areas, however, schools often face challenges in the area of parent involvement. Charter schools, as laboratories of innovation, often utilize parent compacts as tools for parent involvement. The goal of parent compacts is to increase parent involvement activities that support and contribute to student achievement. ❧ This study utilizes a qualitative case study approach to examine charter schools’ use of parent compact as a tool for parent involvement. A research model for the study of parent compact is employed to assess the implementation processes of parent compacts. Findings revealed that parent compacts can be utilized by schools of various sizes, ages, grade levels, and locations as a tool for parent involvement. The contents of parent compacts currently being used by urban charter schools included much of the activities outlined by Epstein. Findings also showed that the proper implementation, namely the communication, implementation, and enforcement of parent compacts along with contextual variables such as organizational culture are keys to compact success. ❧ This research has implications for charter school operators seeking to increase parent involvement, as well as for policymakers who shape legislation that can mandate and facilitate the use of parent compacts. Advisors/Committee Members: Wohlstetter, Priscilla (Committee Chair), Wong, Janelle (Committee Member), Hentschke, Guilbert (Committee Member).
Kuzin, Chuan Ally. “Parent compacts in urban charter schools: an exploration of contents and processes.” 2012. Doctoral Dissertation, University of Southern California. Accessed April 18, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/67766/rec/4917.
Kuzin, Chuan Ally. “Parent compacts in urban charter schools: an exploration of contents and processes.” 2012. Web. 18 Apr 2019.
Kuzin CA. Parent compacts in urban charter schools: an exploration of contents and processes. [Internet] [Doctoral dissertation]. University of Southern California; 2012. [cited 2019 Apr 18]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/67766/rec/4917.
17. Morrison, Tomasine A. The Impact of a Family Home-learning Program on levels of Parental/Caregiver Efficacy.
▼ This study sought to determine if participation in a home education learning program would impact the perceived levels of parental self-efficacy of parents/caregivers who participate in the completion of home-learning assignments and increase their levels of home-learning involvement practices. Also, the study examined the relationship between the parental involvement practice of completing interactive home-learning assignments and the reading comprehension achievement of first grade students. A total of 146 students and their parents/caregivers representing a convenience sample of eight first grade classes participated in the study. Four classes (n=74) were selected as the experimental group and four classes (n=72) served as the control group. . There were 72 girls in the sample and 74 boys and the median age was 6 years 6 months. The study employed a quasi-experimental research design utilizing eight existing first grade classes. It examined the effects of a home-learning support intervention program on the perceived efficacy levels of the participating parents/care¬givers, as measured by the Parent Perceptions of Parent Efficacy Scale (Hoover-Dempsey, Bassler, & Brissie, 1992) administered on a pre/post basis. The amount and type of parent involvement in the completion of home assignments was determined by means of a locally developed instrument, the H.E.L.P. Parent Involvement Home-learning Scale, administered on a pre/post basis. Student achievement in reading comprehension was measured via the reading subtest of the Brigance, CIB-S pre and post. The elementary students and their parents/caregivers participated in an interactive home-learning intervention program for 12 weeks that required parent/caregiver assistance. Results revealed the experimental group of parents/caregivers had a significant increase in their levels of perceived self-efficacy, p<.001, from the pre to post, and also had significantly increased levels of parental involvement in seven home-learning activities, p<.001, than the control group parents/caregivers. The experimental group students demonstrated significantly higher reading levels than the control group students, p<.001. This study provided evidence that interactive home-learning activities improved the levels of parental self-efficacy and parental involvement in home-learning activities, and improved the reading comprehension of the experimental group in comparison to the control. Advisors/Committee Members: Delia C. Garcia, Peter J. Cistone, Paulette Johnson, Glenda Musoba, Aixa Perez-Prado.
Morrison, Tomasine A. “The Impact of a Family Home-learning Program on levels of Parental/Caregiver Efficacy.” 2009. Thesis, Florida International University. Accessed April 18, 2019. http://digitalcommons.fiu.edu/etd/102 ; 10.25148/etd.FI09082404 ; FI09082404.
Morrison, Tomasine A. “The Impact of a Family Home-learning Program on levels of Parental/Caregiver Efficacy.” 2009. Web. 18 Apr 2019.
Morrison TA. The Impact of a Family Home-learning Program on levels of Parental/Caregiver Efficacy. [Internet] [Thesis]. Florida International University; 2009. [cited 2019 Apr 18]. Available from: http://digitalcommons.fiu.edu/etd/102 ; 10.25148/etd.FI09082404 ; FI09082404.
18. Majerus, Timothy C. Development of a parent-teacher relationship survey.
▼ Elementary educators searching for strategies to improve student achievement may benefit from examining the relationship between parents and classroom teachers. The literature indicates that parent involvement may be linked to student achievement, attendance, student motivation, and student self-esteem. Likewise, parents who have a positive relationship with their child's teacher may also be associated with an increase in their child's academic achievement. The intent of this study was to create an instrument to measure parents' perceptions of their relationship with their child's classroom teacher. An initial instrument was developed based upon a review of the literature on parent involvement in schools, and on parent-teacher relationships. The instrument was administered to 945 parents from a mid-size Midwestern school district. A 26-item, four-factor instrument was developed through the use of factor analysis. The Parent-Teacher Relationship Survey provides classroom teachers and principals the opportunity to gather data to gain an understanding of parents' perceptions of their child's classroom teacher. Furthermore, use of the survey could help determine whether a correlation exists between parents' positive perceptions of their child's classroom teacher and increased student achievement. If a positive correlation exists, teachers and administrators will have concrete evidence regarding the importance of the parent-teacher relationship. Having this information will greatly help educators in their efforts to help every child achieve to his or her potential. Advisors/Committee Members: Valentine, Jerry (advisor).
Majerus, Timothy C. “Development of a parent-teacher relationship survey.” 2011. Thesis, University of Missouri – Columbia. Accessed April 18, 2019. http://hdl.handle.net/10355/14424.
Majerus, Timothy C. “Development of a parent-teacher relationship survey.” 2011. Web. 18 Apr 2019.
Majerus TC. Development of a parent-teacher relationship survey. [Internet] [Thesis]. University of Missouri – Columbia; 2011. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10355/14424.
19. Pitts, Lindsey. Increasing father involvement: a research based workshop to support father involvement.
▼ Father involvement is linked to children's positive developmental outcomes in social-emotional development, cognitive development, and academic achievement (Wilson & Prior, 2011). While previous research in relation to children's development focuses on mother??s involvement, current research on father??s involvement continues to grow. Research reveals evidence-based strategies for increasing the quality and quantity of time fathers spend with their children to help support development (Wilson & Prior, 2011). Research also suggests that fathers who attend parenting workshops show increased involvement with their child (Doherty, Erickson, Farrell & La Rossa, 2006). The current project sought to inform fathers about how increasing involvement with their children could benefit children's overall development, as well as provide tools for fathers to help support them in increasing involvement. Research was disseminated through the development and implementation of a Father Involvement Workshop. A variety of sources were used to compile materials for the current project including: articles, books, literatures reviews, and parent education materials. These sources provided research from the fields of child development and early childhood education, as well as parent education courses. This information was used to provide a foundation for the workshop that discussed the topics of father-child attachment, socialemotional development, cognitive development, academic achievement, and coparenting practices. The workshop was reviewed by experts in the field, then presented to a group of 20 fathers of preschool children. Fathers?? evaluation of the workshop verified it was resourceful and beneficial to fathers in attendance and most participants reported learning new information. This reveals a need for additional implementation of workshops to help support increased father involvement. Advisors/Committee Members: Gordon Biddle, Kimberly.
Pitts, Lindsey. “Increasing father involvement: a research based workshop to support father involvement.” 2018. Masters Thesis, California State University – Sacramento. Accessed April 18, 2019. http://hdl.handle.net/10211.3/206481.
Pitts, Lindsey. “Increasing father involvement: a research based workshop to support father involvement.” 2018. Web. 18 Apr 2019.
Pitts L. Increasing father involvement: a research based workshop to support father involvement. [Internet] [Masters thesis]. California State University – Sacramento; 2018. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.3/206481.
20. Mahoney, Margaret A. The Relation between Parent Involvement and Student Academic Achievement: Parent, Teacher, and Child Perspectives.
▼ Using a multidimensional conceptualization of parent involvement, this study examined the relations between academic achievement and parent involvement across three informants (parents, teachers, and children), explored the dimensions of parent involvement that best predict student academic achievement, and examined the extent to which children's perceptions of involvement mediated the relationship between parent involvement and academic achievement. Participants were 275 elementary school students, their parents, and teachers from a rural school district. Measures of parent involvement were completed during the 3rd quarter of the academic year based upon perceptions of parent involvement during the first two quarters of the year. The parent involvement dimensions assessed included parent educational expectations, home involvement/supervision, and school contact/participation. Teacher and parent reports were found to be strongly associated. Reports of parent involvement from the child perception differed significantly from parent and teacher. Across all predictors, parent educational expectations (as perceived by parents and teachers) were found to be the strongest predictor of academic achievement, accounting for 9.4 to 19.6 percent of the variance in GPA (depending on the model), beyond that accounted for by socioeconomic status. Parental education, family configuration, and socioeconomic status played a significant role in the relation between parent involvement and academic achievement. Implications and future directions are presented. Advisors/Committee Members: Owens, Julie (Advisor).
Mahoney, Margaret A. “The Relation between Parent Involvement and Student Academic Achievement: Parent, Teacher, and Child Perspectives.” 2010. Masters Thesis, Ohio University. Accessed April 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1285798165.
Mahoney, Margaret A. “The Relation between Parent Involvement and Student Academic Achievement: Parent, Teacher, and Child Perspectives.” 2010. Web. 18 Apr 2019.
Mahoney MA. The Relation between Parent Involvement and Student Academic Achievement: Parent, Teacher, and Child Perspectives. [Internet] [Masters thesis]. Ohio University; 2010. [cited 2019 Apr 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1285798165.
21. Damman, Jeri L. Birth Parent Involvement at a System Level in Child Welfare: Exploring the Perspectives of Birth Parents in Parent Partner Programs.
▼ Promoting child welfare services improvement and reform through the system level involvement of birth parents is an emerging national trend, but little is known about how this type of involvement is reflected in practice and what involvement achieves. One approach to involving parents is through parent partner programs, where parents with prior child welfare service experience provide direct services to families currently receiving child welfare services, and often serve as representatives to the child welfare agency. This exploratory qualitative study uses a pragmatic paradigm to examine birth parent involvement at the system level through parent partner programs. In-depth telephone and focus group interviews were conducted with 28 birth parents in parent partner and parent partner coordinator roles at two nationally recognized parent partner programs in the U.S. Interviews explored the perceptions and experiences of parent partners, including the factors that led to parent partners becoming involved at a system level, what they hope to achieve from this involvement, their experiences of involvement activity, and how their involvement may contribute to service improvement and reform. Findings indicate that birth parents’ life experiences are a substantial factor in their decision to become a parent partner, and that considerable development is required to prepare them for their system level involvement role. Parent partners are involved in a wide range of involvement activities that include varied roles and processes. Parent partners also identify child, family, system, and community outcomes they hope to achieve or perceive are being achieved through their system level involvement. This study develops new knowledge of birth parent involvement at the system level in child welfare and offers practice, policy, and research implications to inform the continued development of meaningful involvement practices in child welfare. Advisors/Committee Members: Johnson-Motoyama, Michelle (advisor), Banerjee, Mahasweta (cmtemember), Akin, Becci (cmtemember), Petr, Chris (cmtemember), Skrtic, Tom (cmtemember).
Damman, Jeri L. “Birth Parent Involvement at a System Level in Child Welfare: Exploring the Perspectives of Birth Parents in Parent Partner Programs.” 2018. Doctoral Dissertation, University of Kansas. Accessed April 18, 2019. http://hdl.handle.net/1808/27116.
Damman, Jeri L. “Birth Parent Involvement at a System Level in Child Welfare: Exploring the Perspectives of Birth Parents in Parent Partner Programs.” 2018. Web. 18 Apr 2019.
Damman JL. Birth Parent Involvement at a System Level in Child Welfare: Exploring the Perspectives of Birth Parents in Parent Partner Programs. [Internet] [Doctoral dissertation]. University of Kansas; 2018. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/1808/27116.
22. Dede, Brandy Taylor. The Effect of Parent School Involvement and Parent Perceptions about School on Children?s Perceived Academic Competence and Behavioral Engagement: A Mediational Model.
▼ Behavioral engagement at school has been cited as an avenue for improving low academic performance and decreasing boredom and disaffection among students and dropout rate. What we don?t know is how dimensions of parent involvement and students? perceived academic competence contribute to behavioral engagement at school. Specifically, the present study contributed to the limited research on the mechanisms responsible for the influences of the aforementioned variables on students? academic related outcomes. Participants consisted of a sample of 637 elementary students from a larger sample of 784 academically at-risk and ethnically and linguistically diverse first grade students recruited from three school districts (i.e., two rural and one urban) for a longitudinal study focused on the impact of grade retention on academic achievement. Participants? behavioral engagement, parent school-based involvement, and parents? perceptions about the school were rated by their teachers and parents. Three separate Structural Equation Model (SEM) analyses were conducted, one for each dimension of parent involvement. Results suggest that perceived academic competence does not mediate the relationship between these dimensions of parent involvement and behavioral engagement. However, there were expected within-wave associations between study variables, further supporting concurrent relationships between dimensions of parent involvement, academic competence, and behavioral engagement. Findings have implications for researching more indirect forms of parent involvement and their impact on children?s academic competence and behavioral engagement. Advisors/Committee Members: Hughes, Jan N (advisor), Liew, Jeffrey (committee member), Bowman-Perrott, Lisa (committee member), Shaw-Ridley, Mary (committee member).
Dede, Brandy Taylor. “The Effect of Parent School Involvement and Parent Perceptions about School on Children?s Perceived Academic Competence and Behavioral Engagement: A Mediational Model.” 2015. Thesis, Texas A&M University. Accessed April 18, 2019. http://hdl.handle.net/1969.1/155393.
Dede, Brandy Taylor. “The Effect of Parent School Involvement and Parent Perceptions about School on Children?s Perceived Academic Competence and Behavioral Engagement: A Mediational Model.” 2015. Web. 18 Apr 2019.
Dede BT. The Effect of Parent School Involvement and Parent Perceptions about School on Children?s Perceived Academic Competence and Behavioral Engagement: A Mediational Model. [Internet] [Thesis]. Texas A&M University; 2015. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/1969.1/155393.
23. Scott, Quiauna Nate. The Parents' Perspective: Deconstructing the Overrepresentation of African American Males in Special Education.
▼ Nationwide, there has been an overrepresentation of students of color in the special education programs in public schools. There were multiple factors researchers theorized that contributed to such overrepresentation. Despite the vast amount of research analyzing the overrepresentation of African American males in special education, there was a lack of research that focused on the African American parents' involvement in the special education process. With the overrepresentation of African American males in special education, parents are a vital part of the Individualized Education Plan (IEP) referral process. The purpose of this study was to examine the parents' experiences and perspectives of the IEP process and to understand what extent the parents were involved in the decision making process for their male children. By using a mixed methods study through the lens of critical race theory, the researcher examined to what extent practices within a school district can help to redress the overrepresentation of African American male students in special education programs. Advisors/Committee Members: Jennings, Dr. Greg (advisor).
Scott, Quiauna Nate. “The Parents' Perspective: Deconstructing the Overrepresentation of African American Males in Special Education.” 2014. Thesis, California State University – East Bay. Accessed April 18, 2019. http://hdl.handle.net/10211.3/131268.
Scott, Quiauna Nate. “The Parents' Perspective: Deconstructing the Overrepresentation of African American Males in Special Education.” 2014. Web. 18 Apr 2019.
Scott QN. The Parents' Perspective: Deconstructing the Overrepresentation of African American Males in Special Education. [Internet] [Thesis]. California State University – East Bay; 2014. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.3/131268.
24. Gledhill, Aimee. Homework and continued learning at home: How should parents be involved?.
Gledhill, Aimee. “Homework and continued learning at home: How should parents be involved?.” 2015. Thesis, University of Canterbury. Accessed April 18, 2019. http://hdl.handle.net/10092/11457.
Gledhill, Aimee. “Homework and continued learning at home: How should parents be involved?.” 2015. Web. 18 Apr 2019.
Gledhill A. Homework and continued learning at home: How should parents be involved?. [Internet] [Thesis]. University of Canterbury; 2015. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10092/11457.
25. Ramsay, Paula Mary Virginia. Using home visits to connect with families: a classroom action research project.
▼ Federal guidelines mandate that schools find meaningful ways to communicate with families. One of the most effective means of communication is the home visit. This project uses classroom action research in home visits using the model developed by the Parent/Teacher Home Visit Project to document the effectiveness of home visits and provide a handbook for special education teachers at Vineland Preschool. The handbook is designed to assuage the fears of educators and provide effective tools for using home visits to improve the quality of classroom instruction. This project concludes that home visits are a particularly effective means of engaging parents in the education of their children and are particularly meaningful when educators treat each individual visit as a unique experience. Home visits should be strongly encouraged at all levels and teachers provided tools to train allow them to make use of the information gained during home visits to transform teaching practice in all areas. Advisors/Committee Members: Gonzales, Rachael.
Ramsay, Paula Mary Virginia. “Using home visits to connect with families: a classroom action research project.” 2010. Masters Thesis, California State University – Sacramento. Accessed April 18, 2019. http://hdl.handle.net/10211.9/831.
Ramsay, Paula Mary Virginia. “Using home visits to connect with families: a classroom action research project.” 2010. Web. 18 Apr 2019.
Ramsay PMV. Using home visits to connect with families: a classroom action research project. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.9/831.
26. Richards, Kaitlynn Ann. Experiencing the prison industrial complex: the impact of incarceration on families.
▼ The purpose of this mixed methods study is to understand how families are affected by the incarceration of their loved ones. This research uses 1) quantitative data to determine the level of family involvedness of incarcerated individuals across race and SES factors, 2) qualitative methods to understand how families cope with incarceration and 3) frames these experiences within the prison industrial complex and neoliberal politics. The results showed that family involvement is not predicted by race and that race was not a salient theme, however, lack of emotional support, stigma, isolation and the acquisition of additional parental roles were salient issues for the families of prisoners. Identifying the struggles of families and understanding how race and class play out in this context may inform future outreach and build upon existing prison research. Advisors/Committee Members: Wehr, Kevin, 1972-.
Richards, Kaitlynn Ann. “Experiencing the prison industrial complex: the impact of incarceration on families.” 2014. Masters Thesis, California State University – Sacramento. Accessed April 18, 2019. http://hdl.handle.net/10211.3/121927.
Richards, Kaitlynn Ann. “Experiencing the prison industrial complex: the impact of incarceration on families.” 2014. Web. 18 Apr 2019.
Richards KA. Experiencing the prison industrial complex: the impact of incarceration on families. [Internet] [Masters thesis]. California State University – Sacramento; 2014. [cited 2019 Apr 18]. Available from: http://hdl.handle.net/10211.3/121927.
27. Simpson Baird, Ashley. "The Children Want to Learn; the Parents Want to Participate": Expanding Understandings of the Parental Involvement of English Learners.
This manuscript-style dissertation contains three papers on EL parent involvement. The first, Beyond the Greatest Hits: A Counter Story of English Learners’ Parent Involvement, is an integrative review of 20 years of research on EL parent involvement. Specifically, I examine the ways in which EL parent involvement aligns with and/or differs from widely held notions of what constitutes involvement for all parents—in other words, “the greatest hits” (Hong, 2011). I show how parents are involved in their ELs’ education through engaging in three key relationships: (1) relationships with their children’s schools, (2) relationships with their children, and (3) relationships with other families. Moreover, I argue that these relationships exist along a continuum that moves away from school-directed involvement to more parent-led engagement.
The second and third manuscripts are both studies from data that I collected during seven months at Arbor Elementary, an urban school with a large and quickly growing Latino, EL population—a trend that is reflective of many schools across the U.S. (Hussar & Bailey, 2014). In the second manuscript, Teachers Reading Parents: An Examination of Urban Elementary School Educators’ Reflections on Latino Families, I used data collected from parent workshops to create a discourse-based interview protocol that elicited educators’ reflections on statements made by parents during the workshops. Analyses of these reflections revealed that educators’ backgrounds and experiences were related to the types of reflections that they made. Additionally, these reflections show the Arbor is a school in transition where educators are still coming to understand and respond to its recent demographic shifts.
In manuscript three, Contradictory Discourses of Valued Participation: A Principal’s Discursive Construction of a Parent Literacy Program, I examine the discourse of Eleanor Parker, Arbor’s principal, as she designs and implements an in-class literacy program aimed at Latino parents. I show that Eleanor’s discourse presents two contradictory Discourses of valued participation for EL parents. The first is a Discourse of responsivity where the school acts in response to the needs of EL parents. The second is a Discourse of rigidity where the school maintains a unidirectional transmission of communication from the school to the home.
Advisors/Committee Members: Kibler, Amanda (advisor).
Simpson Baird, Ashley. “"The Children Want to Learn; the Parents Want to Participate": Expanding Understandings of the Parental Involvement of English Learners.” 2015. Doctoral Dissertation, University of Virginia. Accessed April 18, 2019. http://libra.virginia.edu/catalog/libra-oa:8521.
Simpson Baird, Ashley. “"The Children Want to Learn; the Parents Want to Participate": Expanding Understandings of the Parental Involvement of English Learners.” 2015. Web. 18 Apr 2019.
Simpson Baird A. "The Children Want to Learn; the Parents Want to Participate": Expanding Understandings of the Parental Involvement of English Learners. [Internet] [Doctoral dissertation]. University of Virginia; 2015. [cited 2019 Apr 18]. Available from: http://libra.virginia.edu/catalog/libra-oa:8521.
28. FitzGerald, Anne Marie. How and why do Latino parents get involved in their children's education? A test of the Hoover-Dempsey and Sandler model with middle school parents in a community school.
▼ This study used qualitative interviews to explore and describe the perceptions of Latino and Puerto Rican parents in a community middle school about if, why, and how Latino families decide to engage in their children's schooling. All 15 Latino parents perceived that they held or shared responsibility with the school for their child's educational success (parent or partnership-focused). Parents reported involvement despite their perceptions of low levels of knowledge and skills, and/or time and energy. Parents responded to school, teacher, and student invitations for involvement; however, no parent described the school as a community school and few parents reported teacher invitations. Parents reported much more home-based involvement than school-based involvement. All parents reported talking to their children in ways that communicated values, goals, expectations, or aspirations, yet only one parent reported planning for post-secondary education. Implications for further research with Latino parents and school practice are presented. Advisors/Committee Members: White, George P..
FitzGerald, Anne Marie. “How and why do Latino parents get involved in their children's education? A test of the Hoover-Dempsey and Sandler model with middle school parents in a community school.” 2013. Thesis, Lehigh University. Accessed April 18, 2019. https://preserve.lehigh.edu/etd/1484.
FitzGerald, Anne Marie. “How and why do Latino parents get involved in their children's education? A test of the Hoover-Dempsey and Sandler model with middle school parents in a community school.” 2013. Web. 18 Apr 2019.
FitzGerald AM. How and why do Latino parents get involved in their children's education? A test of the Hoover-Dempsey and Sandler model with middle school parents in a community school. [Internet] [Thesis]. Lehigh University; 2013. [cited 2019 Apr 18]. Available from: https://preserve.lehigh.edu/etd/1484.
29. Barlet, Katelyn Danielle. Latina parent involvement: An action research study exploring a Spanish teaching and learning program.
Barlet, Katelyn Danielle. “Latina parent involvement: An action research study exploring a Spanish teaching and learning program.” 2014. Doctoral Dissertation, Penn State University. Accessed April 18, 2019. https://etda.libraries.psu.edu/catalog/21082.
Barlet, Katelyn Danielle. “Latina parent involvement: An action research study exploring a Spanish teaching and learning program.” 2014. Web. 18 Apr 2019.
Barlet KD. Latina parent involvement: An action research study exploring a Spanish teaching and learning program. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2019 Apr 18]. Available from: https://etda.libraries.psu.edu/catalog/21082.
30. Morgan, Nicole R. Evaluating the role of parental involvement in public preschool in predicting the development of emergent literacy skills.
▼ Preschool parental involvement is critical to fighting the war on poverty and strengthening children’s school readiness skills. Existing empirical studies demonstrate that broad indicators of parent involvement are positively associated with children’s academic success. However, longitudinal studies that clarify the role of preschool participation in promoting parent involvement and that link specific components of parental involvement to specific dimensions of emergent literacy skills are needed. This dissertation has two primary goals: (1) to clarify how parent involvement changes as a result of one year compared to two years of a universal preschool program; and (2) to clarify how specific domains of parent involvement predict to children’s emergent literacy skills in Kindergarten. Preschool children (ages 3-4 years) and their parents were recruited from a very disadvantaged Northeastern urban community. The total analytic sample included 290 children (n=145 entered at age 3; n=145 entered at age 4). Three hypotheses were partially supported. The first hypothesis was that a longer duration of preschool programming (2 years versus 1 year) would result in increased parent involvement. By using matched propensity score analyses, findings suggest that two years of preschool programming, compared to one year, improved parent-child talking activities and parent emergent literacy practices at home. Also, two years of preschool programming was marginally related to parents “showing up” at school (e.g., volunteering in class, field trips, and attending school wide events). The second hypothesis was that the quality of teacher-parent interactions would help explain the increased parent involvement. Teacher’s ratings of the quality of the relationship with the parent were positively related to parents making more visits to the library. The third hypothesis was that greater parent involvement would improve children’s school readiness skills, specifically emergent literacy skills. Parent talking activities predicted Kindergarten receptive vocabulary skills, and a composite of parents “showing up” at school activities was a significant predictor of receptive vocabulary. Lastly, visits to the library significantly predicted children’s Kindergarten letter word identification skills. Implications for parent involvement and future directions for preschool programs are discussed.
Morgan, Nicole R. “Evaluating the role of parental involvement in public preschool in predicting the development of emergent literacy skills.” 2014. Doctoral Dissertation, Penn State University. Accessed April 18, 2019. https://etda.libraries.psu.edu/catalog/21840.
Morgan, Nicole R. “Evaluating the role of parental involvement in public preschool in predicting the development of emergent literacy skills.” 2014. Web. 18 Apr 2019.
Morgan NR. Evaluating the role of parental involvement in public preschool in predicting the development of emergent literacy skills. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2019 Apr 18]. Available from: https://etda.libraries.psu.edu/catalog/21840. | 2019-04-18T15:33:39Z | https://oatd.org/oatd/search?q=subject%3A%28Parent%20Involvement%29&pagesize=30 |
You must not misuse this Website. You will not: commit or encourage a criminal offence; transmit or distribute a virus, trojan, worm, logic bomb or post any other material which is malicious, technologically harmful, in breach of confidence or in any way offensive or obscene; hack into any aspect of the Service; corrupt data; cause annoyance to other users; infringe upon the rights of any other person's proprietary rights; send any unsolicited advertising or promotional material, commonly referred to as "spam"; or attempt to affect the performance or functionality of any computer facilities of or accessed through this Website. Breaching this provision would constitute a criminal offence under the Computer Misuse Act 1990. Isabel Wong will report any such breach to the relevant law enforcement authorities and disclose your identity to them.
The intellectual property rights in all software and content made available to you on or through this Website remains the property of Isabel Wong or its licensors and are protected by copyright laws and treaties around the world. All such rights are reserved by Isabel Wong and its licensors. You may store, print and display the content supplied solely for your own personal use. You are not permitted to publish, manipulate, distribute or otherwise reproduce, in any format, any of the content or copies of the content supplied to you or which appears on this Website nor may you use any such content in connection with any business or commercial enterprise.
You shall not modify, translate, reverse engineer, decompile, disassemble or create derivative works based on any software or accompanying documentation supplied by Isabel Wong or its licensors.
Isabel Wong shall remain the owner of all intellectual property of original, altered and bespoke designs supplied to buyers. Relabelling or white labelling of products is not permitted under any circumstance unless otherwise signed in agreement.
Isabel Wong reserves the right to close accounts if any user is seen to be using proxy IPs (Internet Protocol addresses) in order to attempt to hide the use of multiple accounts or disrupts any of our services in any way. If you use multiple logins for the purpose of disrupting the community you may have action taken against all of your accounts.
By submitting any material to us, you automatically grant Isabel Wong the royalty-free, perpetual, exclusive right and license to use, reproduce, modify, edit, adapt, publish, translate, create derivative works from, distribute, perform and display such material (in whole or part) worldwide and/or to incorporate it in other works in any form, media, or technology now known or later developed. You also acknowledge that Isabel Wong is not obliged to publish any material submitted by you on any Isabel Wong publication.
In certain circumstances Isabel Wong may also share your contribution with trusted third parties.
6a. When you subscribe to our mailing list, you agree to receive news, updates and special offers from Isabel Wong and you have the right to unsubscribe at any time. When you sign up to our newsletter via our website, your details are entered by you and received by us securely. If you have signed up in person, your details will be added manually by us. We respect your privacy and will not sell, share or distribute the information provided to us. We will never enter your details to our subscribers list without your prior consent. We do not partake in any purchasing of personal details and if you have received any communication in error, please unsubscribe and let us know immediately. If you have unsubscribed and for any reason are still receiving our newsletters, please contact us so we can check and remove your data manually. Please note that unsubscribing to our mailing list will not affect email communications regarding orders you have placed and any enquiries you have made.
6c. All email communications from Isabel Wong are sent with the suffix @isabelwong.com and any attachments are linked to our website or mail service provider. If you receive what you believe is a phishing email designed to look like it's from Isabel Wong, please report it to us via our contact form.
In order to contract with Isabel Wong you must be over 18 years of age and possess a valid credit or debit card issued by a bank acceptable to us. Isabel Wong retains the right to refuse any request made by you. If your order is accepted we will inform you by email and we will confirm the identity of the party which you have contracted with. This will usually be Isabel Wong or may in some cases be a third party. Where a contract is made with a third party Isabel Wong is not acting as either agent or principal and the contract is made between yourself and that third party and will be subject to the terms of sale which they supply you. When placing an order you undertake that all details you provide to us are true and accurate, that you are an authorised user of the credit or debit card used to place your order and that there are sufficient funds to cover the cost of the goods. The cost of foreign products and services may fluctuate. All prices advertised are subject to such changes.
When you place an order through our online store, you will receive an acknowledgement e-mail confirming receipt of your order: this email will only be an acknowledgement and will not constitute acceptance of your order. A contract between us will not be formed until we send you confirmation by e-mail that the goods which you ordered have been dispatched to you. Only those goods listed in the confirmation e-mail sent at the time of dispatch will be included in the contract formed.
When you place an order as a private client, brand or retailer, you will receive an acknowledgement e-mail confirming receipt of your order: this email will only be an acknowledgement and will not constitute acceptance of your order. A contract between us will not be formed until we send you confirmation by e-mail with an invoice outlining the goods or services ordered by you. Only those goods or services listed in the confirmation e-mail will be included in the contract formed.
All orders are subject to availability and confirmation of the order price. Whilst we try to ensure that all details, descriptions and prices which appear on this Website are accurate, errors may occur. If we discover an error in the price of any goods which you have ordered we will inform you of this as soon as possible and give you the option of reconfirming your order at the correct price or cancelling it. If we are unable to contact you we will treat the order as cancelled. If you cancel and you have already paid for the goods, you will receive a full refund. In the case that the specific materials/colours are discontinued or no longer available, we will offer an alternative material choice or colour variation. We reserve the right to review, amend and update prices at our discretion and without notice. Prices are subject to change due to annual inflation rates and subsequent increases in cost of supply, labour, manufacturing and other associated costs.
We may from time to time be out of stock and will no longer replenish these items. In these such cases, the items will be available on a made-to-order basis and subject to our Bespoke terms. Any made-to-order items are clearly detailed in the product description. We cannot guarantee that the exact materials will be available from our suppliers and colours may have slight variations from separate batches of fabric. You are required to provide your UK size for made-to-order items. If you have opted for bespoke, your measurements and colour preferences will be requested at the checkout. These orders take up to 3 weeks per item to source materials and produce. Production is exclusive of delivery times. If we are able to replenish stock, we do our best to maintain the same pricing, however we cannot guarantee the same supplies will be available and the cost of these supplies will be reflected in the final retails price.
All items are made to order. Orders are typically produced on a first come first serve basis and will only proceed once payment has been received. We cannot reserve or purchase supplies unless a 50% deposit or full payment has been made and cannot guarantee the availability or materials from our suppliers. Prices are calculated based on the individual project requirements. For low quantity orders, please allow up to 3 weeks from the day of confirmation after receiving your payment for us to complete your order. Turnaround times may vary based on the individual order and time of purchase. Alternative turnaround and delivery dates may be possible upon request.
All items are made to order. Orders are typically produced on a first come first serve basis and will only proceed once payment has been received. Our minimum order quantities vary between items and collections. These will be clearly detailed in our order forms and line sheets. Quantities available are subject to the availability of material supply at the time of placing your order. We cannot reserve or purchase supplies unless a 50% deposit or full payment has been made. In the case that the specific materials/colours are discontinued or no longer available, we will offer an alternative material choice or colour variation. Autumn Winter collection order dates are February-April. Spring Summer collection order dates are September - November. Orders may be accepted at a later date upon request. In the case of cancellation, your deposit may be non refundable once materials have been bought and cut. The remainder of the invoice shall be paid prior to delivery unless otherwise stated.
Isabel Wong is not a VAT registered company. All prices stated are the final price. Delivery costs will be charged in addition; such additional charges are clearly displayed where applicable and included in the 'Total Cost'.
Payment services made through this website are provided by Stripe. In the case you have placed an order through a third party website, the payment method will be subject to the payment terms of that particular party. Upon receiving your order we may carry out a standard pre-authorisation check on your payment card to ensure there are sufficient funds to fulfil the transaction. Goods will not be dispatched until this pre-authorisation check has been completed. Your card will be debited once the order has been accepted.
Stockists are responsible for making the appropriate payment arrangements to Isabel Wong or its Agents and distributors. Payments made to Isabel Wong must be processed by bank transfer. The amount due is a minimum of 50% of the total cost with the remaining amount due prior to delivery of the goods. We will send you an email reminder for the payment of goods within 2 weeks. We have the right to refuse the delivery of your order until full payment is made.
Agents receiving payment on behalf of Isabel Wong shall pay the agreed deposit amount as outlined in our Agency Agreement and transfer the remaining amount after goods are delivered to the agent's office. The remaining amount should be paid within 2 weeks of receiving the order. Late payments are liable to a 12% annual interest rate from the date the invoice became overdue. We have the right to refuse the delivery of any other wholesale order following a late payment.
Please note some orders may be subject to import duties, taxes and other customs related charges. Buyers bear all responsibility for all extra charges incurred (if any).
If you have placed an order and failed to make the payment due date outlined in your invoice, we reserve the right to cancel your order without notice.
Private clients, brands and bespoke orders are required to pay a 50% deposit or full payment prior to any work. The remaining amount due (if any) shall be paid upon collection or prior to delivery. If the outstanding amount is not paid, we have the right to refuse the handover of your order until full payment is made.
From time to time, we will accept orders for regular clients and send you an invoice after the work is complete. The amount and due date is set out in the invoice. If your invoice becomes overdue, we will send you an email reminder for the payment of the goods. If we do not receive the amount due within 2 weeks of our reminder, you will be charged a 12% annual interest rate from the date the invoice became overdue. We have the right to refuse any further work until full payment is made. Any invoice that remains unpaid for more than 30 days of the original due date will result in further action and court proceedings.
If you are selling products on behalf of Isabel Wong or acting as Agent, you agree to the terms set out in our contracts. If at any point you fail to pay Isabel Wong for the goods sold to customers, we reserve the right to withdraw all our products without notice. Payments will be considered 'late' after 30 days of the agreed payment due date. Late payments will be liable to a 12% annual interest rate from the date they became late. Non payments will result in further action and court proceedings.
Stock items are usually dispatched within 2 days of receiving payment and confirmation of your order. Dispatch times may vary according to availability and any guarantees or representations made as to delivery times are limited to mainland UK and subject to any delays resulting from postal delays or force majeure for which we will not be responsible. We use a reliable courier service to ensure a prompt and secure delivery. All items are sent by recorded delivery and will require a signature upon arrival. If you wish to use an alternative shipping method, please contact us prior to placing your order to make the appropriate arrangements. We are not responsible for any damage or loss during delivery. Please note some orders may be subject to import duties, taxes and other customs related charges. Buyers bear all responsibility for all extra charges incurred (if any). Please see our Delivery notice for further information.
Bespoke items are dispatched within 2 working days of completing production of your order.
Delivery methods will vary depending on the individual order and location. All orders are shipped from the UK and we use a reliable courier service to ensure a prompt and secure delivery. All items are sent by recorded delivery and will require a signature upon arrival. If you wish to use an alternative shipping method, please contact us prior to placing your order to make the appropriate arrangements. We are not responsible for any damage or loss during delivery. Agents and distributors shall make the necessary arrangements for collection and shipment unless agreed otherwise. Please note some orders may be subject to import duties, taxes and other customs related charges. Buyers bear all responsibility for all extra charges incurred (if any).
Items that are in stock are ready to be dispatched. Made to order or bespoke items as stated in the product description will require extra time for your order to be complete. These orders take a minimum of 7 working days per item for production and are exclusive of delivery times. Turnaround times are provided to you upon confirmation of your order.
Turnaround times will vary depending on the individual order taking into account payment & order dates, quantity and level of work. Standard turnaround times are 3-6weeks for individual or low quantity orders. For urgent orders, turnaround time may be negotiated upon request.
All items are made to order in the UK. Orders are typically produced on a first come first serve basis and will only proceed once payment has been received. Autumn Winter collection order dates are February-April and delivered between June-August. Spring Summer collection order dates are September - November and delivered between January-March. Alternative turnaround and delivery dates may be possible upon request.
If you have purchased from isabelwong.com, isabelwong.co.uk or at one of our sister sites where Isabel Wong is a seller, please see the terms set out by the website in which you made your purchase. Isabel Wong usually hold a limited supply of stock and the majority of our products are made to order and subject to our Bespoke terms. The items within the return are all subject to our Returns Policy. We do not offer a collections service for items you are returning. The collection of the goods does not imply an acceptance of their return. If you opt for a collections service, it is your responsibility to arrange this service with your chosen courier. All agreements are made between you and your courier. We are not responsible in the rare event that the courier damages, loses or fails to collect your goods.
Isabel Wong products are available to buy from our stockists via third party e-commerce sites and physical stores. Isabel is not liable for purchases made at any of our stockists. If you have purchased from one of our stockists, please contact the store or refer to the website you purchased from for full terms & conditions.
If you have made a purchase at any temporary stores (concept stores, pop-up store, events stalls) your item may not be refundable or exchangeable and is subject to the terms set out by the store or events organiser.
Sample sale items are non refundable. For full terms & conditions, please contact the showroom or events organisers.
Cancellations will only be accepted in the early stages of receiving your order and you may be issued a full refund. If however, supplies have already been purchased, you will be charged 50% of the sale price and refunded the remaining 50%. Once production has begun, your order shall proceed as normal and cannot be changed.
additional changes to meet your needs, you must contact us within 7 days of receiving the goods. We are happy to discuss this further and will make the necessary amendments subject to our discretion. Buyers shall accept all risks associated with the purchase & non-guaranteed resale of goods. Isabel Wong cannot be held responsible should the buyer be unable to resell.
Stock that is sold on a commissions basis or on behalf of Isabel Wong, where stock is held by an agent, representative or stockist, (collectively the "Representatives") and payment is made to Isabel Wong after the goods are sold, are considered consignment goods. Representatives are responsible for the care of all items held on consignment and are liable for any damages caused to the goods; missing and irreparable goods will be charged to the representative at the full retail price. Representatives must positively represent Isabel Wong to all clientele as not to damage the reputation of the brand or harm any present or future sales opportunities.
Stock quantities are limited for consignment stores and are subject to availability at the time of dispatch. We do not reserve stock for consignments and only accept orders on a wholesale basis. If an item becomes out of stock within a consignment store, we may replenish the goods or provide an alternative replacement. From time to time, we may provide showroom samples which are for display only and not to be sold under any circumstance. Such samples may be tried on by customers and presented to clients if the item is available on a made-to-order or wholesale basis only. Representatives may also use these samples for PR purposes. All samples must be returned to Isabel Wong upon request.
Isabel Wong is not liable for customer purchases made through consignment stores and any concerns raised must be dealt with by the representative. Returns and exchange policies are set at the discretion of the representative, unless otherwise agreed. Any damaged returns caused by the customer and accepted by the representative is at the representative's expense.
Isabel Wong does not offer representatives exclusivity, made-to-order or bespoke services for consignment inventory. However, it is possible for customers to request a bespoke service. Customers will need to arrange a consultation with Isabel Wong to discuss the requirements. When the order is finalised, an invoice shall be issued to the customer and the order will proceed once payment is received. Representatives will be paid the agreed commission rate after the order has been fulfilled. Bespoke orders generally take up to 3 weeks but will vary depending on the individual project. Bespoke items are non refundable once production has proceeded.
Representatives are responsible for the sale of goods using the RRP (recommended retail price) as provided on the original product labels, inventory list or delivery note. Promotions and discounts may be offered to customers only with prior consent from Isabel Wong. If consent has not been given and a sale is made, the difference must be paid for by the representative. Goods may only be sold online and instore via the representative's own website or store and may not be sold via any third party platforms. Isabel Wong shall not incur any delivery costs should an item be sold online or a customer requests a delivery service.
Isabel Wong shall receive payment net of the agreed commission rate. Payment to Isabel Wong must be made within 30 days of the customer sale date or within 30 days after the end date of the customer's allowable returns period, unless agreed otherwise. If, under agreement, the representative requires an invoice prior to making payment to Isabel Wong, the payment must be made within 14 days of the invoice issue date. If the invoice becomes overdue, the representative will be sent a reminder for the outstanding balance. If we do not receive the amount due within 2 weeks of our reminder, the representative will be charged a 12% annual interest rate from the date the invoice became overdue. Any invoice that remains unpaid for more than 30 days of the original due date will result in further action and court proceedings.
Goods that have not been sold by the end of the contract term must be returned to Isabel Wong in full saleable condition with all original tags & packaging. Representatives must inspect all items prior to return, arrange dry cleaning where necessary at their own expense and cover all costs for any loss or damage of goods. Delivery arrangements must be made by the representative, unless agreed otherwise. Please use a reliable courier service for returning the goods and insure the the parcel for the full retail value of the goods as it is your responsibility until they reach us.
Isabel Wong retains legal ownership of all consignment goods and reserves the right to withdraw these goods from the representative & terminate consignment contracts at any time.
Isabel Wong shall remain the owner of all intellectual property of original, altered and bespoke designs supplied to buyers and representatives. Relabelling or white labelling of any of our products is not permitted under any circumstance unless otherwise signed in agreement.
8a. Account discount codes | Discount codes may from time to time be offered to account holders; such codes may only be applied to purchases made through the account in respect of which the discount code was offered and registered.
8b. Promotional discount codes | We may from time to time offer promotional discount codes which may apply in respect of any, or certain specified, purchases made though this Website. The codes are available for a limited time and will only be valid within the promotional period stated in the email or leaflet in which the code was distributed or until stocks last which may be earlier than the promotional end date. Codes advertised on this Website may not always show the promotional period and are subject to change without notice at our discretion. Promotional codes cannot be used in conjunction with any other offer or discount and may only be valid for orders with a minimum spend.
8c. Free shipping codes must be redeemed at the checkout and may sometimes be used in conjunction with another discount code. Free shipping is not valid for express delivery or special delivery even if these options are available at the checkout. We will only use a standard recorded delivery service. If you wish to use an express delivery service with a free sipping code, you must get in contact with us first and you will be charged for the difference as this is not automatically applied at the checkout.
8d. Complimentary gifts | codes used for complimentary free gifts are subject to the availability of such items and until stocks last. If the code you redeemed has been accepted, it does not guarantee that stocks are available at the time of purchase. We reserve the right to replace the gift with an alternative product or colour of equal or higher value if necessary at our discretion. If an alternative gift product is not available at the time of purchase, you will have the opportunity to cancel your order or redeem your free gift without purchase at a later date. If you are returning an order, you must also return the free gift. Any gifts that are not returned will be charged to you at the full retail value and you will be refunded the difference.
9a. Gift cards & vouchers are only valid for a limited time and the gift amount must be redeemed by the date shown on the card/voucher – check your card/voucher to find out when to use it by. Gift cards that have been purchased are valid for 24 months from the date of purchase. Gift card prizes are valid for 3 months from the date of issue. Gift cards/vouchers cannot be redeemed on shipping costs. The purchase value (excluding shipping costs) must be equal to or more than the gift card balance, however you can request to have your available balance split into two smaller amounts to be used in 2 separate transactions.
9b. We’re afraid we can’t accept any responsibility for stolen, misplaced or deleted gift cards/vouchers.
9c. We’ll despatch your gift card/voucher either as soon as payment has been cleared or on your specified delivery date (if this is later). We’re afraid we can’t be responsible for any delays, no matter how they are caused.
9d. If you are the purchaser, please double check the delivery email and postal address you enter – it is your responsibility to do so and we’re afraid we can’t be held responsible if a gift card/voucher is used by someone other than your recipient if the email/postal address provided by you is incorrect.
In addition, we can’t take responsibility for any gift card/voucher that are lost or used by someone other than your recipient after delivery. Make sure your recipient has received their gift card/voucher, as it is their responsibility to keep the card/voucher details safe.
9e. From time to time, e-card/vouchers may get caught in pesky spam filters, and it’s up to the recipient to check these filters. We can’t take responsibility if an e-gift card/voucher cannot be delivered to the recipient’s email address because of spam filters, firewalls, the capacity of the recipient’s mailbox or any other factors outside of our control.
9f. If you need a refund, this will be made in the same way as the original payment method (such as onto a gift voucher, debit/credit card account, or a combination of the two). Refunds for gift card/vouchers follow our standard Refund Policy.
9g. As you’d expect, we reserve the right to vary these terms and conditions.
i) you confirm that the information submitted in your entry is correct. Any incorrect or falsified information will be disqualified.
Iii) you understand that you are providing your information to Isabel Wong (the owner of the social media page if you are entering a competition advertised through social media) and not to any social media or online platforms used to advertise or register your entry for the competition.
10b. The closing date is stated on each individual prize draw or competition at the closing time of (GMT) 23:59.
10e. The promotions are open to employees of Isabel Wong - with the exception of any employees (and their families), their agents or related third parties who are directly connected with the administration of these online promotions.
10h. All prizes are subject to availability, and Isabel Wong reserves the right to replace the prize with an alternative product or colour of equal or higher value if necessary at our discretion.
10j. You agree to having your name, country of residence and/or social media accounts published on our website and social media announcements and for the promotion of any future Isabel Wong prize draws and competitions. Your address, email and telephone contact details will remain confidential and will not be shared or distributed unless we have obtained your permission to do so. Your contact details will only be used to inform you of your winnings and to get the item shipped out to you.
10k. Competition Winners will be selected at random after the closing date from all entries received via a computer selection generator or independent judge. The judge's decision is final and no correspondence will be entered into.
10l. We will contact you via email or telephone using the information provided by you at entry. We may also contact your via private message via social media if your method of entry was made you have provided your social media account username as part of your entry or your entry was submitted through a social media platform. Contact will be made within 6 weeks of the closing date so that we can notify you if you have won and/or to confirm your delivery address.
we reserve the right to re-draw a winner of the competition and thereafter until a winner on these terms is found.
10n. E-vouchers or credit prizes will be sent to you via the email address provided at entry. If the prize is a physical item, we will request a postal address in order to arrange shipment.
10p. Please allow 28 days for delivery of the Prize. Shipping costs to the winner are covered by Isabel Wong and are sent via a reliable courier service. We accept no responsibility in the unfortunate event of delayed, damaged or missing competition prizes during transit and we cannot guarantee a replacement will be sent to you. International recipients are responsible for any and all customs charges that may be incurred and you may need to pay these charges once it reaches your homeland. These charges are out of our control and we have no way of predicting what they may be.
10q. Competitions and prizes are in no way sponsored, endorsed, administered or associated with any other company, brand (if the prize is a brand other than Isabel Wong), social media, online or printed platforms in which the promotion is advertised. Any such endorsements or involvement of third party companies will be clearly expressed in the competition description and credits will be referenced at all time. You understand that you are providing your information to Isabel Wong and not to any other company when submitting your entries via our website.
10t. Isabel Wong is not responsible for and cannot be held liable for any third party competition that is not administered by Isabel Wong.
The material displayed on this Website is provided without any guarantees, conditions or warranties as to its accuracy. Unless expressly stated to the contrary to the fullest extent permitted by law Isabel Wong and its suppliers, content providers and advertisers hereby expressly exclude all conditions, warranties and other terms which might otherwise be implied by statute, common law or the law of equity and shall not be liable for any damages whatsoever, including but without limitation to any direct, indirect, special, consequential, punitive or incidental damages, or damages for loss of use, profits, data or other intangibles, damage to goodwill or reputation, or the cost of procurement of substitute goods and services, arising out of or related to the use, inability to use, performance or failures of this Website or the Linked Sites and any materials posted thereon, irrespective of whether such damages were foreseeable or arise in contract, tort, equity, restitution, by statute, at common law or otherwise. This does not affect Isabel Wong's liability for death or personal injury arising from its negligence, nor for fraudulent misrepresentation, misrepresentation as to a fundamental matter or any other liability which cannot be excluded or limited under applicable law.
You may link to our home page, Collections and Shop provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval or endorsement on our part where none exists.
This Website must not be framed on any other site, nor may you create a link to any part of this Website other than the home page, collections and shop. We reserve the right to withdraw linking permission without notice.
Except where expressly stated to the contrary all persons (including their names and images), third party trade marks and images of third party products, services and/or locations featured on this Website are in no way associated, linked or affiliated with Isabel Wong and you should not rely on the existence of such a connection or affiliation. Any trade marks/names featured on this Website are owned by the respective trade mark owners. Where a trade mark or brand name is referred to it is used solely to describe or identify the products and services and is in no way an assertion that such products or services are endorsed by or connected to Isabel Wong.
You agree to indemnify, defend and hold harmless Isabel Wong, its directors, officers, employees, consultants, agents, and affiliates, from any and all third party claims, liability, damages and/or costs (including, but not limited to, legal fees) arising from your use this Website or your breach of the Terms of Service.
Isabel Wong shall have the right in its absolute discretion at any time and without notice to amend, remove or vary the Services and/or any page of this Website.
The above Terms of Service constitute the entire agreement of the parties and supersede any and all preceding and contemporaneous agreements between you and ISABEL WONG. Any waiver of any provision of the Terms of Service will be effective only if in writing and signed by a Director of Isabel Wong.
As a reputable and trusted business committed to offering its customers high quality products, Isabel Wong recognises its obligation to ensure that suppliers are operating ethically.
Isabel Wong will never knowingly source stock from countries which are in breach of the above principles. We also look to our suppliers to instil these principles when dealing with their own supplier base.
Because of the sometimes complex nature of our suppliers' supply chain, it is not always possible to monitor and control the conditions of each individual involved in the production of our products. However, as Isabel Wong continues to grow it recognises the importance of being proactive and doing everything within its power to support the rights of those involved in the manufacture of its goods. | 2019-04-21T16:53:47Z | https://www.isabelwong.com/termsandconditions |
A comparison of kiln-drying schedules and quality outcomes for 4/4-thickness black cherry lumber sawn from small-diameter logs.
With high stumpage prices, many sawmills are interested in the feasibility of processing smaller diameter hardwood logs. Most of these mills do not know the lumber yield, lumber grade, or cost of processing these logs. In this project we investigated the impact of alternative dry kiln schedules on the grade yields and defect occurrence in lumber sawn from small- diameter (logs with small-end diameters of 11 inches or less) black cherry (Prunus serotina Ehrh.) logs. The position within the log from which each board was sawn was mapped in relation to the profile of the logs. Every board was examined for end checks, surface checks, shake, twist, bow, cup, crook, and assigned a predrying grade. The lumber was dried using a conventional black cherry kiln schedule published in the Dry Kiln Operator's Manual (Simpson 1991 ) and two modified kiln schedules designed to dry lumber under milder drying conditions compared to the conventional schedule. The modified kiln schedules maintained equilibrium moisture content (EMC) conditions that were comparable to those of the conventional kiln schedules for each of the drying steps. After drying, each board was again examined for end checks, surface checks, shake, twist, bow, cup, crook, and assigned a postdrying grade Modified kiln schedule #1, in which the final dry-bulb temperature was lowered 20[degrees]F from that of the conventional schedule, provided the best drying results in terms of the reduction in defects and minimization of grade loss as compared to the conventional (T4-D8) cherry schedule. Overall, for all three kiln treatments, lumber grade yield increased with increasing log diameter and log grade, and it improved in the direction of pith to bark. This study will provide the hardwood products industry with a better understanding of the feasibility of and approach for processing lumber from small- diameter black cherry logs.
It is commonly thought that small-diameter logs are only capable of producing low-grade (and low-value) wood. Lower quality wood typically is used in the production of pallets, particleboard, pulp, and engineered wood products (Luppold and Bumgardner 2003). Very little data exist detailing the feasibility of processing small-diameter hardwood logs into dry lumber for the production of dimension stock for use in appearance products such as cabinets, furniture, and flooring. Increased handling costs, lower average lumber grades, and drying induced defects are potential problems associated with processing small-diameter hardwood logs into lumber.
Log diameter strongly influences both lumber volume and grade recovery, which is directly related to product value recovery. For example, the expected lumber volume recovered from a Forest Service Grade 3, red oak tree yielding 1-1/2 logs (24 lineal feet of logs) is 60 BF for a tree with a diameter at breast height (DBH) of 10 inches, 122 13F for a tree with a DBH of 14 inches, and 207 BF for a tree with an 18-inch DBH (based on Table 23, Hanks 1976). Multiplying the expected grade distribution of this lumber (Hanks 1976) by current northern red oak market prices (Hardwood Market Report 2008) indicates that the difference in the lumber recovery potential from these three tree diameters on a value-basis is even greater than the volume difference yielding $15, $49, and $94 in lumber value for the 10-, 14-, and 18-inch DBH trees, respectively.
Only minor attention has been given to grade and volume studies of small-diameter logs in the past. In addition to the Hanks study (1976), cited previously, a small-scale study of logs removed in a thinning operation offers guidance (Emanuel 1983). In this study, 20 small-diameter red oak, hard maple, and yellow-poplar logs removed in a thinning yielded 30 percent, 19 percent, and 15 percent No. 1 Common and Better lumber, respectively (Emanuel 1983).
A recent study of lumber recovery from small-diameter (6 to 10 inches in small-end diameter) red oak logs found that only 35 percent, by weight, of the material produced in a scragg mill operation was solid wood (Perkins et al. 2008a). The majority of the solid wood component consisted of lower-grade cants with the percentage ranging from 72 percent for the 6-inch logs to 54 percent for the 10-inch logs. The remaining solid wood volume was lumber, of which 74 percent was grade 2 A and 3 A Common and only 26 percent was grade 1 Common and Better (Perkins et al. 2008a).
A small-diameter sawing feasibility study that used the scragg mill-based yield results of Perkins et al. (2008a), returned a negative net present value and internal rate of return for all of the sawmill production scenarios that utilized 6- to 10-inch diameter logs (Perkins et al. 2008b). However, when a pallet part operation was paired with the sawmill operation, the sawing of small-diameter red oak logs was profitable when log prices were constrained to no more than $74/[m.sup.3] ($523 per MBF, Doyle scale) paid for the logs (Perkins et al. 2008b).
Increased handling costs, lower average lumber grades, and drying-induced defects are potential problems associated with processing small-diameter hardwood logs into lumber. Several prior studies have examined alternate processing methods that might be employed to process small-diameter logs economically. These include: curve sawing (Hamner et al. 2006), System 6 (Reynolds et al. 1983), Saw-Dry-Rip (Maeglin and Boone 1988), and inside-out sawing to produce beams (Patterson et al. 2002).
Unlike these other studies, in this research we focus on the lumber grade and quality characteristics of dry lumber sawn from small-diameter hardwood logs in a conventional sawmill and dried in a kiln. The results might provide insight to the many hardwood sawmill managers who are contemplating processing a higher percentage of smaller diameter logs. For those sawmills that have reduced the diameters of the logs they are processing, this study will shed light on alternate drying strategies that might be pursued to minimize quality degradation in the kiln.
Logs were obtained from north-central Pennsylvania. The logs were transported to The Pennsylvania State University on a triaxle truck, unloaded and end sealed with wax to prevent end checking and excess moisture loss. The logs varied in length from 8 feet to 23 feet and were bucked to a length of 8 feet 4 inches. The portion of the log that remained after the maximum number of 8-foot 4-inch lengths were recovered was discarded.
Two sawing patterns were used to breakdown the logs into lumber: grade sawing and live sawing. In grade sawing the log was rotated each time a higher grade was thought to be on an opposite or adjacent face. This resulted in a number of faces exposed to the sawing plane. Live sawing exposed only the open face and the best quality face. The best quality face was broken down until growth stresses in the tree intensified in the open face after which the opening face was turned into the sawing plane and the remainder of the log was sawn into boards.
Logs were grade sawn or live sawn based on log diameter, percent sweep, and percent crook. Small-diameter logs with sweep, crook, or both could not be repeatedly rotated on the log deck for grade because it was difficult to produce volume yield. These logs were live sawn. The opening face for both sawing patterns was the face opposite the best face, which was the face with the least number of surface defects.
As each board was produced, board and log numbers were marked directly on the board surface. The combination of both the log and board number allowed for each board to be located in a particular log's profile. The location of the board in the log's profile was also assigned to the core center, inner quality zone, and outer quality zone based on U.S. Forest Service log grading rules (Kenna 1981). The inner quality zone was defined as the area between 40 percent and 70 percent of the log's radius (Fig. 1).
After sawing, the boards were placed in either a pile awaiting edge sawing or stacked onto a pick-up truck for transport to the dry kiln. The edging process was accomplished through the use of a bull edger. The gasoline-powered edger had one fixed saw with a second maneuverable saw blade.
Defects that were recorded in this experiment were end checks, shake, surface checks, bow, twist, crook, and cup. Severe checks through the cross section of the wood are defined as splits. Both surface checks and end checks were scrupulously examined. Even the smallest of checks was recorded in this study (1/32nd to 1/16th of an inch deep). Different amounts of twist, bow, cup, and crook are associated with the low, medium, and high warp categories (Table 1).
The predrying inspection of the lumber was conducted within 1 day after sawing and just prior to loading the lumber in the dry kiln. The lumber was graded using National Hardwood Lumber Association (NHLA 2003) grading rules and visually scanned for seven different defects (end checks, surface checks, shake, bow, twist, crook, and cup). The initial predrying grade and surface measure were marked on the board using a green crayon representing the green grade and green surface measure. The cuttings that were used to calculate the green grade were drawn on the board (outlined) in black crayon. Marks were placed on the ends of the boards to indicate the presence of defects of interest; different types of defects were assigned different marks and colors. End markings also were used to indicate the dominant quality zone from which the board originated.
Stacking was accomplished manually. Each board was hand stacked into packs that were 8 feet by 4 feet by 4.5 feet in size. The layers of boards were then separated by oak stickers (3/4 inches by 3/4 inches by 48 inches) to create openings for airflow beneath and above the boards. Stickers were placed 2 feet apart from each other starting at the very edge of the board and aligned with the bolsters under the pack. Following the inspection and stacking processes each pack was loaded into the kiln. The kiln used in this study utilized steam heat and had a drying capacity of 1500 BF. The kiln could accommodate two 750 BF packs of lumber.
A conventional kiln schedule (T8-B4) (Simpson 1991) along with two experimental kiln schedules were used during the project. The black cherry modified kiln schedule #1 was modified from the conventional kiln schedule (T8-B4) published in the Dry Kiln Operator's Manual (Simpson 1991). The final dry-bulb (DB) temperature was lowered 20[degrees]F from that of the conventional schedule to 160[degrees]F. The wet-bulb (WB) settings were selected based on an EMC comparable to the conventional kiln schedule (Table 1). Black cherry modified kiln schedule #2 altered the conventional kiln schedule in three ways: 1) lower initial DB temperature, 2) lower final DB temperature, and 3) addition of an intermediate step change to gradually ramp the DB temperature from 110 to 140[degrees]F (Table 1). The rationale for this schedule was that lumber dried using the lower initial DB setting should result in an increase in the tension set because of the slower drying compared to the other kiln schedules used in the study. An increase in tension set may enable the wood to better resist the forces that cause warp in the later stages of drying.
In total, four kiln charges of lumber were used in this study. Two charges were dried using the conventional kiln schedule and the remaining two kiln charges were dried using the two modified kiln schedules (Table 1). Four to six kiln samples were used for MC tracking for each kiln charge. Kiln samples were selected using the following criteria: (l) square edged lumber with no wane; (2) representative amounts of heartwood and sapwood; and (3) no knots. If a portion of the board met these criteria it was considered to be a potential kiln sample board. From among those boards that met these criteria, kiln samples were randomly selected.
After completion of the drying process, the lumber was removed from the kiln. I he predrying defects, quality zone, and predrying lumber grade from the labels on the board were recorded on a data collection sheet. The postdrying inspection replicated the procedures used for the initial inspection and introduced new procedures to measure slope of grain and warp, examine cuttings used to calculate green grade, and note the presence or absence of pith. Slope of grain was determined through the use of a stencil. Warp was measured with the aid of a taper gauge for reading actual depth and a flat level surface. All four types of warp (twist, bow, cup, and crook) were measured. Crook was measured first while the board was on its edge. To measure crook the first examiner would apply a force to one end of the board and the other would measure the distance the opposing end of the board deviated from the flat surface. Bow and twist were measured with the board surface closest to the bark facing down (except in cases where more bow or twist was apparent on the opposite side) on the level surface. The corner that visually deviated from the level surface the furthest was measured for twist. Bow was measured at the point along the board's length that visually had the most deviation from the flat plane. The amount of cup was measured at the greatest distance between the surface of the board and a straight edge placed across the board's width.
The same surface measurement used to calculate the green grade was used to determine the dry grade. By standardizing this, the effects of the kiln-drying process on drying defect occurrence was unmasked. Each of the original cuttings (which had been marked on the boards prior to drying) was evaluated for defects and dimensional changes that would potentially lower the board grade. The dimensional changes that were taken into account were width shrinkage (cup/twist), length shrinkage (crook), and thickness shrinkage (cup/twist). Width shrinkage was determined by comparing the green width dimension labeled on the board with the dry width dimension. In cases of severe crook, the width of the edge cutting decreased possibly resulting in a lower board grade. The loss in width was determined by using a Lexan sheet etched with a 1-inch grid pattern. Boards that had a large degree of cup (>3/16th inch) were unable to meet the standard surface thickness for 4/4 lumber and were deemed as falling out of grade.
The odds ratio is the increase or decrease (if less than one) in the odds of a particular outcome happening in a treatment group (black cherry modified kiln schedules #1 and #2) when compared to a control group (black cherry conventional kiln schedule-- our control). For example, an odds ratio of 1.15 means that it is 1.15 times more likely for a drying-related defect to occur in a certain modified kiln schedule when compared to the black cherry control charges. In other words, there is a 15 percent increase in a particular drying defect when dried with the modified kiln schedule compared to the control kiln schedule. Conversely, if an odds ratio is equal to 0.41 there is a reduction of 59 percent in the occurrence of a defect dried with a modified kiln schedule compared to being dried with the control kiln schedule. An odds ratio of 2 or higher was considered to be substantial. The odds ratios for the black cherry lumber grade study are found in Table 2.
Analysis of variance ([alpha] = 0.05) was conducted to discern variations in the amounts of crook between board groups dried using the three kiln schedule treatments. The null hypothesis for these tests was that all group means were equal and the alternative hypothesis was that at least one mean was different. The Tukey multiple comparison test ([alpha] = 0.05) was used to identify dissimilar means for those cases in which the null hypothesis of no difference was rejected. The decision on whether to reject or accept the null hypothesis was made based on the range of the confidence interval. If the confidence interval contained zero, the two population means being compared were said to be statistically similar. However, if the confidence interval did not contain zero, the two population means being compared were determined to be statistically different.
The black cherry log sample consisted of 154 eight-foot logs. These logs yielded 991 boards with a total volume of 3,618 BF (based on green dimensions). The average age of the trees sawn was 60 years. The distribution of log diameters ranged from 6 to 11 inches. This project focused on logs considered to be pole logs (logs 5.9 to 11 inches small-end diameter) (McWilliams et al. 2002). Figure 2 illustrates the distribution of small-end log diameters used in this study. The distribution of U.S. Forest Service log grades (Kenna 1981) in the log sample was: 6 Factory Grade #2 logs, 126 Factory Grade #3 logs, and 25 Cull logs.
The black cherry control kiln schedule had a total drying time of 91 hours with a conditioning period of 3 hours. Black cherry modified kiln schedules #1 and #2 had total kiln-drying times of 117 hours with a 9-hour conditioning period and 110 hours with an 8-hour conditioning period, respectively.
End checks in both black cherry modified kiln schedules were less likely to occur compared to the black cherry control charges. Surface checks were less likely in modified kiln schedule #2 than in modified kiln schedule #1 and the control charge. Black cherry modified kiln schedule #2 had a surface check odds ratio of 0.60, which suggested that there was a reduction in odds of finding a surface check when compared to the black cherry control charges. This may have been the result of the lower initial DB temperatures in the modified kiln schedule #2. Lower initial DB temperatures deliver less heat to the woods surface during the early stages of kiln-drying. This creates less surface tension and more tension set on the board's surface resulting in less surface checking.
Three out of four types of warp (twist, bow, and crook) in modified kiln schedule #1 showed a reduction in odds when compared to the black cherry control charges; twist, bow, and crook had odds ratios of 0.39, 0.27, and 0.74, respectively. Analysis of black cherry modified kiln schedule #2 results indicated that twist and bow were less likely to occur under this schedule as compared to the control schedule (Table 2). The odds ratio for crook increased in modified kiln schedule #2 compared to modified kiln schedule #1. Crook, however, was difficult to control in all kiln charges. The reduction in the odds of occurrence of at least two of the four types of warp in each of the black cherry modified kiln schedules likely is the result of lower DB temperatures in the later stages of kilnd-rying. Lower DB temperatures may lessen the rate of warp produced owing to variable shrinkage rates throughout the board. Milder final DB temperatures may also maintain the tension set longer in the board. By maintaining the tension set longer the board may be restricted from warping.
Based on the odds ratios, black cherry modified kiln schedule #2 produced fewer boards with surface checks compared to the control charges. Black cherry modified kiln schedule #1 had lower odds of developing all other forms of drying defects (the four forms of warp, shake, and end checking), which suggests that modified kiln schedule #1 was the better schedule for kiln-drying this lumber sawn from small-diameter cherry logs.
The last three rows in Table 2 present odds ratios for the three leading reasons why boards dropped in grade. The likelihood of a board dropping in grade because of surface checking was higher in black cherry modified kiln schedule #1 than in modified kiln schedule #2. This may be related to lower initial DB temperature in the kiln-drying schedule. Surface checking with pith present and shrinkage across the board's width were less likely in both black cherry modified kiln schedules when compared to the control black cherry kiln schedule. National Hardwood Lumber Association grading rules (2003) were applied to each board before and after drying. The predrying grade of the board was compared to the lumber grade after drying (postdrying grade). If a drop in grade was noticed, the reason for the drop in grade was recorded.
The pre- and postdrying grade results are presented in Table 3. It is clear that for all kiln schedules, lumber grade exhibited a waterfall effect with many high-grade boards falling into midgrade classes and midgrade boards falling into low-grade classes after kiln-drying. Modified kiln schedule #1 resulted in a smaller proportion of higher grade boards (No. 1 Common and better) dropping grade compared to the other black cherry kiln schedules. Only 14 percent of the higher grade boards (which originally made up 11 percent of all boards based on green grade) dropped in grade under the modified kiln schedule #1 treatment (Table 3). By comparison, 34 percent of the higher grade boards (which originally made up 9 percent of all boards based on green grade) dropped in grade under the control treatment. The lumber dried using modified kiln schedule #2 was intermediate in this regard, with 21 percent of the higher grade boards being reduced in grade to No. 2 A Common or Below as a result of the drying process.
While many sectors of the hardwood industry have found viable uses for No. 3 A Common lumber, No. 3B Common and Below Grade or "Outs" lumber typically is of such poor quality that it rarely is used for anything other than low-value industrial products, wood chips, or local use lumber. Looking at these two lowest lumber grades and the change in the proportional distribution of lumber in these grades after drying compared to before drying, it is evident that a higher percentage of the boards dried using the control schedule fell into these lowest quality categories as compared to the two modified kiln schedules. The increase in the number of No. 3B Common and "Outs" boards after kiln-drying was approximately 17 percentage points compared to increases of 13 and 12 percentage points for the boards dried using the modified #1 and #2 kiln schedules, respectively (Table 3).
Table 4 summarizes the reasons why the black cherry boards dropped in grade postdrying. In all three dry-kiln treatment groups, more boards dropped in grade due to shrinkage across the width of the board than for any other reason (Table 4). This occurrence is easily explained. The smallest legal cutting, as defined by NHLA grading rules, must be at least 3 inches in width for boards to make a grade of No. 3 A Common and higher. In our postdrying inspection, it was common to find boards with cuttings that shrunk in width to a dimension less than 3 inches. If a 3-inch cutting shares its borders with the edge of the board and a defect (knot, pith, rot, check, etc.) prior to kiln-drying, the shrinkage incurred during kiln-drying will result in an illegal cutting (having an insufficient width dimension) for boards with a grade of No. 3 A Common and higher. The observed amount of shrinkage across the width of a cutting after kiln-drying was approximately one-quarter to one-half inch. The loss of a cutting frequently was substantial enough to lower the board's overall postdrying grade. This was especially true of flat sawn boards. Flat-sawn boards have a larger tangential face and therefore tend to shrink more across the width than do quarter-sawn boards.
The percentage of boards that dropped in grade due to shrinkage across the board's width was highest for boards dried using the control kiln schedule (Table 4). Lower final DB temperatures in the two modified kiln schedules may have resulted in less shrinkage in the later stages of kiln-drying such that the shrinkage in width did not affect the grade to the same extent in these two kiln treatments. Forty-six percent of the boards that dropped in grade in the control treatment because of width shrinkage were sawn from the outer quality zone. Boards sawn from the outer quality zone have a large tangential surface.
Surface checking with the pith present was the second most important reason why boards dropped in grade after kiln-drying (Table 4). When boards were graded before kiln-drying the pith was sometimes not visible because it often ran through the center of the thickness of the board. The NHLA grading rules allow unrestricted lengths of pith to be present in boards in the No. 2 A Common and lower lumber grades provided the pith is not included in the clear-face cuttings. The kiln-drying of boards with pith present caused a large number of boards to check and cup along the pith. Cuttings that were initially laid over these areas were in some cases no longer valid cuttings and in other cases, reduced in size such that the loss of cutting units was considerable enough to throw the board into a lower grade.
The percentage of boards that dropped in grade because of surface checking with pith present was highest for boards in the control treatment (Table 4). Lower initial dry-bulb temperatures used in modified kiln schedule #2 may have resulted in less tensile stresses and, therefore, less surface checking (with and without the pith present) during the early stages of kiln-drying. As expected, the core center of the log had the highest percentage of boards that dropped in grade because of surface checking with the pith present in each of the black cherry kiln schedule.
Hardwood factory log quality zones published by the United States Department of Agriculture Forest Service are helpful in identifying locations of varying lumber quality within a log (Fig. 1) (Kenna 1981). Lumber quality differences for lumber cut from the outer quality zone, inner quality zone, and core center of the logs were evident. For example, there were 189 low-grade boards (No. 3B Common and "Outs") before drying and 93 of these boards (49%) were sawn out of the core center of the log. After drying, the grade distribution deteriorated such that there were 341 low-grade boards (80% more) of which 151 (44%) were derived from wood in the core center of the log (these results are for all three drying treatments combined). Our working definition of log quality zones describes the core center as the area delineated by a circle with a radius equal to four-tenths of the log's total radius. Given this definition, the core center comprised only 16 percent of the cross sectional area of the logs yet it produced more than 40 percent of the lowest grade lumber. Looking at the other end of the lumber quality spectrum, only 3 of the 118 No. 1 Common and Better black cherry boards (2%) sawn in this study were derived from the core center regions of the logs (based on green lumber grade).
Also of interest with regard to log quality zones was whether lumber sawn from different zones was more or less apt to lose grade after being dried in the kiln. We had expected that lumber sawn from the core center would be more likely to deteriorate upon drying due to the presence of pith-related defects and juvenile wood. This was not borne out by the results, however. The percentage increase in the lowest grades of lumber (No. 3B Common and "Outs") overall, across all three drying treatments, was 100 percent for lumber sawn from the outer quality zone, 97 percent for lumber sawn from the inner quality zone, and only 62 percent for lumber sawn from the core center.
We see two lumber grade trends for material derived from logs in the different size classes. First, the percentage of lumber (based on the number of boards) that grades as No. 1 Common and Better from each log-size class tends to increase with increasing log size with the 7-inch diameter logs not yielding any No. 1 Common and Better lumber, the 11-inch logs yielding 29 percent No. 1 Common and Better lumber (based on green grade), and the 8-, 9-, and 10-inch log-size classes yielding intermediate amounts of the higher grade lumber. The second trend concerns the percentage of lumber that grades as No. 3B Common or lower. Based on the green lumber grade, 38, 41, 35, 29, and 20 percent of the lumber sawn from the 7-, 8-, 9-, 10-, and 11-inch logs falls into these lowest grades.
The degree to which these percentages change after drying does not seem to be dependent on the sizes of the logs from which the lumber was sawn. In general, the No. 1 Common and Better lumber proportion falls by a few percentage points (0 to 8) and the No. 3B Common and below proportion increases by a larger amount (1 to 12 percentage points). However, the change in grade proportions is not consistent and predictable based on the size of the logs from which the lumber was sawn.
The average amount of twist in the black cherry control charges was 0.196 inch or just less than 13/64 of an inch. The average amount of bow and cup was 0.287 (9/32 of an inch) and 0.070 (just less than 5/64 of an inch) inch, respectively. Average crook was 0.365 inch or just less than 3/8 of an inch.
The average amount of warp for the black cherry lumber dried using modified kiln schedule #1 was comparable to the average amount of warp in the black cherry control kiln schedule. Twist had an average measurement of 0.195 inch. The average bow measurement was 0.257 inch. The average cup and crook measurements were 0.068 inch and 0.366 inch, respectively.
The average measurement of twist and bow for boards dried using the black cherry modified kiln schedule #2 was 0.217 inch and 0.236 inch, respectively. The average amount of cup was 0.079 inch. Crook had an average measurement of 0.452 inch.
Analysis of variance ([alpha] = 0.05) conducted on the twist results for lumber from the three kiln schedule treatments indicated no difference among means. The comparison of bow measurements for the boards in the three drying treatments pointed to a difference in bow among the groups. The Tukey multiple comparison test ([alpha] = 0.05) indicated that the average bow of boards dried under the control schedule was statistically different than the bow measurements for boards dried using modified kiln schedule #2. Analysis of variance conducted on the cup measurements also indicated a difference among lumber groups. The Tukey test for cup showed that the differences in cup for boards dried using modified kiln schedules #1 and #2 were significant. Crook means also were found to be significantly different with the average crook measured on boards dried using modified kiln schedule #2 being different from both the average crook in the black cherry control schedule and modified kiln schedule #1.
In this research we focused on the lumber grade and quality characteristics of dry lumber sawn from small-diameter hardwood logs in a conventional sawmill and dried in a kiln. There was a common trend that defined the relationship between log diameter, log grade, log quality zone, and lumber grade post-drying. As log diameter and log grade increased, so did the lumber grade yield. Lumber quality differences for lumber cut from the outer quality zone, inner quality zone, and core center of the logs were evident. Forty-nine percent of the lumber that graded as No. 3B Common and below was derived from the core center of the log which makes up only 16 percent of the log's cross sectional area.
The two leading reasons for boards dropping in grade after drying were surface checking with pith present and shrinkage across the width of the board. Surface checking with pith present was concentrated in the core center of the log. Black cherry modified kiln schedules #1 and #2 decreased the percentage of total boards that dropped in grade because of surface checking with the pith present The modified black cherry kiln schedules reduced the total percentage of boards that dropped in grade because of shrinkage across the board's width as compared to the control (conventional) schedule.
Odds ratios were used to determine the effect of modified kiln schedules on drying defect development when compared to the control kiln schedule. An odds ratio of two was considered to be substantial. All drying defect categories (end check, surface check, shake, twist, bow, cup, and crook) were below two for both of the black cherry modified kiln schedules. The likelihood of cup increased slightly in both of the black cherry modified kiln schedules. There also was a slight increase in the odds of crook developing in black cherry modified kiln schedule #2 compared to the control schedule. The development of crook was difficult to control when kiln-drying.
Black cherry modified kiln schedule #1 was less likely than modified schedule #2 to develop six of the seven drying defects based on defect odds ratios that use the control treatment as the baseline for comparison.
For those sawmills that have reduced the diameters of the logs they are processing, this study will shed light on alternate drying strategies for black cherry lumber sawn from these smaller logs. Modified kiln schedule #1, in which the final DB temperature was lowered 20[degrees]F from that of the conventional schedule and the wet-bulb settings maintained an EMC comparable to the conventional schedule, is particularly noteworthy for the reduction in defects and minimization of grade loss that it produces as compared to the conventional (T4-D8) cherry schedule.
Emanuel, D.M. 1983. Comparison of lumber values for grade 3 hardwood logs from thinnings and mature stands. RP-NE 529. USDA Forest Serv., Northeastern Forest Expt. Sta., Broomall, Pennsylvania. 4 pp.
Hamner, P., M.S. White, and P.A. Araman. 2006. The effect of curve sawing two-sided cants from small diameter hardwood sawlogs on lumber and pallet part yields. Forest Prod. J. 56( 10):80-85.
Hanks, L.F. 1976. Hardwood tree grades for factory lumber. RP-NE-333. USDA Forest Serv. 81 pp.
Hardwood Market Rept. 2008. July 19, 2008. Memphis, Tennessee. p. 8.
Kenna, K.M. 1981. Grading hardwood logs for standard lumber. Formerly Publication No. D1737-A. USDA Forest Serv. 32 pp.
Luppold, W. and M. Bumgardner. 2003. What is low-value and/or low-grade hardwood? Forest Prod. J. 53(3):54-59.
Maeglin, R.R. and R.S. Boone. 1988. Saw-dry-rip improves quality of random-length yellow-poplar 2 by 4's. RP-FPL-490. USDA Forest Serv., Forest Products Lab., Madison, Wisconsin. 15 pp.
McWilliams, W.H., C.A. Alerich, D.A. Devlin, T.W. Lister, S.L. Sterner, and J.A. Westfall. 2002. Annual inventory report for Pennsylvania forests: Results from the first two years. Res. Bulletin NE-156, USDA Forest Serv., Northeast Res. Sta., Newtown Square, Pennsylvania. 71 pp.
National Hardwood Lumber Assoc. (NHLA). 2003. The NHLA rules for the measurement and inspection of hardwood and cypress plus NHLA sales code and inspection regulations. NHLA, Memphis, Tennessee. 133 pp.
Patterson, D.W., R.A. Kluender, and J.E. Granskog. 2002. Economic feasibility of producing inside-out beams from small-diameter logs. Forest Prod. J. 52( 1 ):23-26.
Perkins, B., R. Smith, and B. Bond. 2008a. Solid wood and residue yield analysis of small-diameter red oak logs. Forest Prod. J. 58(1/2): 97-100.
--, --, and --. 2008b. Case study of the economic feasibility of a red oak small-diameter timber sawmill and pallet-part mill. Wood and Fiber Sci. 40(20):258-270.
Reynolds, H.W., P.A. Araman, C.J. Gatchell, and B.G. Hansen. 1983. System 6 used to make kitchen cabinet C2F blanks from small-diameter, low-grade red oak. RP NE-525. USDA Forest Serv., Broomall, Pennsylvania. 11 pp.
Simpson, W.T., ed. 1991. Dry Kiln Operator's Manual. USDA Forest Serv. Ag. Handbook No. 188. 274 pp.
The authors are, respectively, Former Graduate Assistant (currently employed at Georgia-Pacific Corporation), School of Forest Resources, The Pennsylvania State Univ., Univ. Park, Pennsylvania (msscholl@gapac.com); Research Forest Products Technologist, USDA Forest Serv., Northern Research Sta., Forestry Sciences Lab., Princeton, West Virginia (jwiedenbeck@fs.fed.us); and Professor Emeritus, Associate Professor, Senior Research Assistant, and Former Graduate Assistant (currently employed at Armstrong World Industries), School of Forest Resources, The Pennsylvania State Univ., Univ. Park, Pennsylvania (prb@psu.edu, cdrl4@psu.edu, lrs4@psu.edu, bwbeakler@armstrong.com). The authors would like to thank an anonymous reviewer, "Reviewer B," for his/her comprehensive review and extremely helpful suggestions for enhancing this paper. The authors also would like to acknowledge the USDA Forest Serv., Northeastern Research Sta. (now Northern Research Sta.) for their funding support for this project. This paper was received for publication in November 2007. Article No. 10428.
one of three dry kiln schedules (in percent).
three kiln schedules (in percent).
(1) SST = standard surface thickness.
and after drying from small-diameter logs.
Productivity in the U.S. and Canadian sawmill industries: a nonparametric programming analysis.
Rectangular mortise and tenon semirigid joint connection factors. | 2019-04-20T06:32:18Z | https://www.thefreelibrary.com/A+comparison+of+kiln-drying+schedules+and+quality+outcomes+for+...-a0191954512 |
All switches sharing the exact same VLAN information has to be in exactly the same VTP domain. If needed, redesign your logo and business stationery so it supplies an immediate visual link to your brand values. Moreover, it’s always highly recommended to go for our customized assignment help.
International schools are by and large regarded as schools that serve the requirements of an expatriate population and offer a predominant internationally recognised curriculum. They never complained about the quality and price. https://www.paperwriterhelp.net/ University students need to deal with a number of assignments and they will need to adhere to the guidelines meted out by the department they belong to.
Our custom made assignment helpers are well competent and experienced in providing some of the greatest topics according to needing assignment, nature of subject and your own personal approach to the work. Therefore, it’s even more vital that you need to have expert help so you may prepare a lovely assignment. From time to time, an assignment will appear a little vague, and asking for clarification can help you receive a better score, since you’re going to be in a position to do exactly what is asked of you.
Our custom made assignment helpers are well competent and experienced in providing some of the greatest topics according to needing assignment, nature of subject and your own personal approach to the work. As the outcome, your task is going to be given in the shortest term. Even in the event that you need immediate assignment help, we promise you that we’re likely to deliver a high quality custom assignment for dissertation defense you.
If you’re organizing a team or committee, guarantee that the members have a superior mixture of talents and strengths. Being exposed to technological wonders like computers and the web and learning how to operate them from a young age, students can develop an awareness of self-esteem and confidence. Thus, the student must get in contact with the customer care and request a specific price sheet, and just then make his choice.
The perfect way to summarize an essay is to begin by reading it through a very first time quickly. Speak to us today if you would love to discover a philosophy assignment example. A writing assignment may need to be a certain length.
The company model for assignment help is extremely easy to comprehend. It’s possible not just to buy an assignment inexpensively, decently saving finances but also to explore the process which will be done by means of a specialist. Our experts aren’t only capable but have their specific means of ensuring our customers score high grades in their assignments.
Further, it’s important to list down all the sources utilized in the assignment in an alphabetic fashion for a reference list. The paper is also evaluated to create sure the perfect citation style was observed and referencing is proper. Your academic paper will also be in possession of an absolutely free plagiarism report.
Our custom made assignment help is here to direct you the appropriate direction of writing and structuring an assignment and take you forward through a step-by-step procedure for conducting research about this issue. During each session it’s possible to find out information that’s missing from your notes. For that reason, it must be a top quality paper that satisfies the expectations of the reader.
In some instances, maps from various sources don’t agree with one another. The expense of replacing a valued employee is huge. So you felt happy that you’re most likely to discover other assignment free.
From that point, after that you can begin the more comprehensive job of comparing offers and prices and specifications until you come up with the very best VPN service which is suitable for your needs just perfect. Use the help of true academic experts and get the service you’ve earned! Again, if you’re planning to utilize iPad 2 VPN services, be sure that you explicitly request the service.
Unfortunately small small business proprietors mostly have zero budget and deduct the price of marketing plans from their profit data. Numerous similar kinds of products are advertised on the market. Writing companies offer you 24-hour customer care.
The program was made to offer a well-rounded, scholarly grasp of the body of knowledge that’s centered on human movement and physical activity. The only worry on the portion of the health care schools is that all requirements are completed. With your health information management degree, you also can play a crucial part in the way the best paper writing service healthcare industry protects patient info.
Since the area of computer course is huge and detailed, there isn’t anyone specific subject which we’re likely to discuss. Complete the form on the right to learn how it is possible to get going on your journey as an expert marketer today. You will have great days and you’re likely to get bad days, and the important thing is knowing that the wonderful days will always prevail if you follow through.
The reward of a standard A.S. degree is you may work in your field for a little while and finish your bachelor’s degree farther down the road when it’s more convenient. If you’ve got a greater degree, like a master’s degree, set the bachelor’s degree information underneath the http://cs.gmu.edu/~zduric/day/how-to-write-thesis-for-expository-essay.html master’s degree info. A bachelor’s degree, also known as an undergraduate level, typically is made up of four decades of study.
Rigorous study is needed to succeed in the Nursing Program. They are required to undertake a long high quality research empirical thesis (Honours Seminar Thesis) combined with a selection of courses from the relevant field of studies. In it, they work with faculty in other areas such as chemistry, engineering, and anthropology to learn how mathematics is used in a variety of fields.
If you would like to remain in the area of mental wellbeing, think about becoming a psychiatric-mental health nurse practitioner. The faculty and staff I have collaborated with would say that I’m approachable, informed, a great communicator, problem solver, transparent and useful. Being a nurse isn’t an effortless job.
An Associate of Applied Science degree can be found in many career fields which can help you land an intriguing job which complements your skill collection. A computer science degree could arrive in the shape of an associate level, which might result in a bachelor’s degree. The Bachelor’s degree grademiners.com/write-my-thesis in Health Sciences is a dynamic major that’s interdisciplinary in nature and gives flexible choices that allow students to get ready for many types of health careers.
Research is ongoing regarding the protection of football in any way levels of competition, because of the frequency of concussions in the sport. Environmental restoration planners assess polluted websites and determine the price tag and activities required to clean up the area. Students will be ready for careers in various sport and activity settings.
A nurse who wants to develop into a pharmacist needs additional education to obtain a Doctor of Pharmacy degree, referred to as a Pharm.D. The student might be encouraged to make a minor along with the Health Sciences major to attain individual targets and boost job opportunities. Many nursing students don’t know of the various ways they can continue their education and advance their nursing career.
The reward of a standard A.S. degree is you may work in your field for a little while and finish your bachelor’s degree farther down the road when it’s more convenient. Begin with the highest degree of degree you’ve got. In New Zealand, in some situations, the honours degree comprises another postgraduate qualification.
In addition, you can find out more about science careers on Monster. For instance, you may want to earn minimum grades in high school chemistry courses as a way to start a nursing B.S. program. Check with your preferred school to be certain you’re taking the ideal courses for transfer.
Not only do college students have to select a key subject of interest, they need to decide HOW they need to devote their academic years in that region. The number of students isn’t limited thus everybody can join us. Our students come from the other side of the world and bring with them a selection of perspectives and experiences.
Based on the university and the subject of study, it may take one to three decades of full-time study to make a master’s. With so many choices, the starting salary for work in computer information systems may vary greatly. Currently, you’ve got access to each dictionary, encyclopedia, and pretty much the entire understanding of the planet in your pockets.
Courses can be taken on campus, online, or within a combo of the 2 methods to satisfy your learning style. The Department of Biology has a myriad of research programs which range from molecular through ecosystem levels of integration. Geography won’t accept late applications.
Managing mental health in high stress situations is challenging and although gatherings are just a few situations a calendar year, they may make an important effect on overall wellness. Standard strength training can help correct muscle imbalances and weaknesses that are typical in modern life. Patient access to quality health care is dependent upon the access to certified professionals at each touch point.
For the best method to ascertain placement prices, talk about your questions with the faculty or administration of the program or programs you’re considering. Applicants with an AA degree who didn’t opt for the company track could possibly be admitted, but must finish the business common course pre-requisites. You are able to also acquire volunteer experience to help construct your CV.
When we discuss format of the letter, it usually means your message has to be in coherence, not begin or end abruptly. The new version gives those students an opportunity to have the story. With the debut of wireless technology, communication has gotten more convenient and potent.
Then in order to come back home 20there are still a good deal of things we want to clean up. After the first surgery paramountessays com and everything went well, then I just focused on only trying to find healthier and making a determination from that point. Children’s horror fiction is a means of coming to understand the ethical chaos which all of us encounter in our lives, therefore it is logical that a fantastic horror story could develop into a benefit to numerous young readers.
You would like to practice hard, you wish to provide great effort, you wish to play complete speed but you wish http://cs.gmu.edu/~zduric/day/essay-help-online-uk.html to be smart about it. There are lots of kickers that could place the ball on the stick and kick well when there’s no pressure involved. He has become the number one pick and the pressure which goes with it.
He called the exact same plays, McCoy stated. The Giants got a bit of both Foles.
We’ve got a great deal of hunting seasons and fishing holes that may permit the outdoorsman in you to relish. My main concern Cason with you will be your capacity to be durable. For one the quantity of offensive linemen in camp differs.
I’ll examine the numbers. Schwartz said he wishes to place a positive spin on the situation they’ve been thrown into. Hill said he had no issue with the last voting.
With Foles back, a healthier offensive line, and an effort to prevent the fumbles, this could be one of the best backfields in the NFL next calendar year. It became an arms race between both teams. You’re attempting to set a team together.
You make an effort not to consider it too much, Orlosky stated. That is the reason why it is so powerful. You need to do the best that you can.
I heard a couple of fans which were frustrated too. It was great having the ability to go see him, Beckham explained. buy an essay Now, it is a brand-new season.
I will make the most of it. If that’s the way that you could grow them, that’s the way that you grow them. In that offensive line space, they’ve heard the exact same things.
I was on the exact mission once I stopped to speak to DeSean. The purpose clearly states the purpose of your undertaking. While you might not yet have all the vital resources, it’s very clear you have the points and you may develop each idea.
But everyone is going to be on the exact page, learning at the identical speed. It is likely to take some development. That’s the ideal time to create the introduction.
Once it seems logical to start with the introduction, it’s more reasonable to begin with the human body and arrive back to bring the intro. There are lots of kickers that could place the ball on the stick and kick well when there’s no pressure involved. Obviously I’ve had a small speed bump up to now, hopefully by camp I’ll be prepared to go.
Numbers and words in exactly the same sentence might be mixed. And this subject isn’t merely asserted, it’s embodied in a rich and elaborate language and realized in relation to the poetic imagination. Then it’s possible to finish the last draft of your outline.
Though research doesn’t yield specific evidence of the precise origin of any 1 fairy tale, you discover that fairy tales all evolved in that fashion, as teaching tools for agricultural families who hoped to set the fear of predators in their children so they’d avoid danger. Writing a crucial analysis of literature is just a mental procedure, and once it is observed in manageable components, the procedure isn’t the huge bad wolf it might have been. Andersen was asked if he likes the use of a leader.
Essay-Redakteure sind bereit, diese Aufgabe zu übernehmen. Es ist ein gutes Schreiben notwendig. Das Editieren von Aufsätzen ist keine Laune, sondern ein notwendiger Schritt auf dem Weg zu einem Expertenwissen.
Die Unternehmen bieten beispielsweise Aufsatzbearbeitung an. Die Leute, die gerne die Redaktionsdienste https://ghostwriterschweiz.ch/unterrichtsentwurf der besten Romanredakteure in ihrem Bereich in Anspruch nehmen möchten, können durch Ratschläge ihrer Mitschriftsteller oder Schriftsteller oder über die Website des Herausgebers, die im World Wide Web angeboten wird, erreicht werden. Zunächst müssen alle möglichen Redakteure einige Interviews führen und ihre wahre Motivation unter Beweis stellen. Unsere Crew von Fachleuten aus unserer Abteilung für Essay-Editing-Services hat mehrere Seiten mit detaillierten Tipps zusammengestellt, die es Ihnen ermöglichen, das Verfahren zum Verfassen Ihres unverwechselbaren Essays zu durchlaufen. wie schreibt man eine facharbeit Die vertrauliche Aufsicht eines erfahrenen Redakteurs verbessert das Schreiben Ihres Unternehmens. Wenn Sie also kompetente Autoren, erfahrene Redakteure und andere Fachleute für sich gewinnen möchten, ist unsere Website die beste Gelegenheit. Das Finden eines zuverlässigen und professionellen Auftragschreibers ist nicht einfach. Warum benötigen Sie einen Umschreibungsdienst?
Die Dinge werden schlimmer, wenn Sie ein strengeres Dokument, z. B. ein College, bearbeiten müssen Bewerbungsaufsatz, Dissertation oder ein anderes großes Projekt. Immer wenn der Gedanke, dass ich einen Mann oder eine https://www.s-hochschule.de/ Frau brauche, um meine Zeitung zu bearbeiten, Ihnen den Kopf überkreuzt, möchten Sie die Writers Per Hour einsetzen, um Ihnen die perfekten Bearbeitungs- und Korrekturdienste anbieten zu können. Eine Stunde für die Bearbeitung, ein bisschen mehr darüber, was Sie bei unserem maßgeschneiderten Aufsatz-Support erhalten. Eine Sache, die bei der Bearbeitung von Aufsätzen zu berücksichtigen ist, ist die einfache Tatsache, dass es nicht etwas ist, was schnell erledigt werden kann. Stellen Sie sich vor, Sie besitzen ein bisschen Schreiben, mit dem Sie Unterstützung benötigen.
Sie werden mit einem professionellen Essaywriter arbeiten, bis Sie eine Zeitung haben. Sie werden mit einem professionellen Essaywriter arbeiten, bis Sie eine Arbeit haben, mit der Sie zufrieden sind. Die großen Essay-Autoren sind bereit, eine Recherche durchzuführen, basierend auf dem, was Sie angefordert haben. Es ist nicht schwierig, bei Edusson eine Aufsatzhilfe zu erhalten. Bearbeiten Sie Ihren Aufsatz, bis er perfekt ist. Sehr viel Glück mit Ihrem Aufsatz, was auch immer es sein mag. Normalerweise sind Aufsätze über Nacht abgeschlossen, ohne dass ein erheblicher Zeitaufwand für die Bearbeitung des Dokuments erforderlich ist.
Wenn Sie nach einem Dienst suchen, der nicht aufgeführt ist, setzen Sie sich bitte mit Ihnen in Verbindung. Es ist wichtig, dass Ihre Suche nach einer Dienstleistung gründlich sein muss, oder der Vorteil, einen kompetenten Anbieter für die Wiederaufnahme von Aufträgen zu erhalten, geht verloren. Nutzen Sie die Hilfe echter akademischer Experten und erhalten Sie den Service, den Sie verdient haben! Sie erhalten einen umfassenden Service, der das Niveau Ihres Schreibens verbessert. Zivildienst ist ein Mittel, um etwas Belohnendes beizutragen, während Sie Informationen über Sie und Ihre Organisation verbreiten.
Machen Sie eine Einzahlung auf Ihr privates Konto, damit unser Spezialist an Ihrem Papier arbeiten kann, und Sie können den Prozess in jeder Phase überwachen. Wenn Sie unsere Dienstleistungen in Anspruch nehmen, stellen Sie sicher, dass Sie die besten Internet-Redakteure einsetzen. Während Ihres Schulungsprozesses werden Sie sicherlich auf die Hilfe von Experten angewiesen sein. Vielleicht ist es einer der idealen Dienste, wenn es um den Preis in VS-Qualität geht. Unabhängig von Ihren Anforderungen können Sie sich darauf verlassen, dass wir erstklassige Services zu sehr günstigen Preisen anbieten.
Glücklicherweise gibt es verschiedene kostengünstige Online-Korrekturlesedienste, die in Anspruch genommen werden können. Essay-Bearbeitung Kundenspezifische Unternehmen bieten eine große Auswahl an Dienstleistungen an. Die gesamte Ausgabe wird anschließend von der Korrekturabteilung übergeben, sobald sie genehmigt wurde, wird sie Ihnen zugestellt. Es ist möglich, den Lebenslauf auch online zu bestellen. Unsere Redaktionsdienste sind für Sie gemacht.
Es gibt viele interessante Daten zur Bearbeitung von Englisch und Englisch auf der Website. Es gibt eine Vielzahl interessanter Daten zur Bearbeitung von Englisch und Englisch auf der Website. Der Assistent des Supportteams erläutert jedes Detail und Sie können die am besten geeignete Zahlungsart auswählen.
Professioneller Essay-Bearbeitungsservice: Kein Geheimnis mehr Ok, ich glaube, ich verstehe den professionellen Essay-Bearbeitungsservice. Erzählen Sie mir jetzt vom professionellen Essay-Bearbeitungsservice!
Eine fantastische Sache, die Sie verstehen, wenn Sie einen professionellen Verfasser von Inhalten auswählen! Sie müssen lediglich Ihr Papier auf der Website hochladen, und unsere Redakteure erledigen die Bearbeitung in kürzester Zeit für Sie. Um ein professioneller Angebotsschreiber zu werden, sind gute Arbeit und ein absolut sorgfältiger Umgang mit der Kunst des Gebots von Premium-Qualität erforderlich. Der Editor ermöglicht es Ihnen, sich von der Masse abzuheben und zu zeigen, dass Sie über die wesentlichen Voraussetzungen verfügen, um sich zu übertreffen. Da unsere Redakteure über so große Erfahrung verfügen, können Sie sicher sein, dass Ihre Kopie jedes Mal ideal ist.
Sie werden während des gesamten Bestellungsplans von Schreibexperten umgeben sein, und wenn Sie sich für den Kauf eines Aufsatzes und die Auswahl eines zugewiesenen Schreibers entscheiden, werden die Dinge wahrscheinlich noch aufregender. Wenn Sie nach den idealen Papierschreibern suchen, die Ihnen helfen würden, Ihre Arbeit auf ideale Art und Weise zu erhalten, sind sehr viele Anstrengungen erforderlich. Seien Sie sicher, dass Sie ein perfektes Schreiben erhalten, falls Sie mit uns zusammenarbeiten! Sicher, der Autor verfügt zwar über alle idealen Fähigkeiten und Erfahrungen, aber Sie benötigen jemanden, der Inhalte bereitstellen kann, wenn Sie es möchten. Wenn Sie unseren Artikelschreibservice zum ersten Mal verwenden, haben Sie höchstwahrscheinlich viele Fragen. Sie sollten Ihr Können schriftlich darstellen, damit Sie sich vom Rest der Masse abheben können. In Wahrheit wird es von Experten empfohlen, dass Sie einige Stunden oder nur einen Tag von Ihrer Bearbeitungsaufgabe abweichen, bevor Sie versuchen, sie zu bearbeiten.
A sort of cell motility involves the dynamic transport of membranous organelles inside the cytoplasm. The most obvious structure in plant cells is the huge vacuole. You are going to be amazed at what the results are in every one of your cells!
The amount of mitochondria within cells varies with the sort of cell. Transcription is the procedure where genetic information in DNA is utilized to create a complementary RNA strand. Some dominant genes are typical, while some are rare.
Over the duration of your academic career, you are going to be asked to compose many papers and essays on several different topics, termpaperwriter based on the class. A few of the questions that you must use some overall knowledge for too. 1 fun way is to make a PowerPoint Jeopardy game applicable to the content you teach.
In case you were only made of one cell, you would be quite limited. A number of kinds of cells are large enough to be viewed by the unaided eye. Hela cells are the most commonly used cell line in molecular biology labs all over the world.
By employing lots of markers within an assay, multiple parameters can be measured simultaneously in exactly the same cell. The next short list of important features of eukaryotic cells can be utilized to spell out eukaryotic cells without a lot of reference to prokaryotic cells. Today, simple microscopes aren’t used often because the debut of another lens resulted in the more potent compound microscope.
You’re able to note the on-line provider or the simple fact your syllabus was accepted by College Board. If you’re fighting with any biology assignments, then you’re able to take assistance from online Biology Assignment help service available on the web. Students are not going to be afraid to http://www.northeastern.edu/research/raf/policies-guidelines/ pay a business to help them compose an impressive essay.
It’s a fact that starting a new business whilst doing a PhD is not simple. University work can be very tough, there are a number of subjects with various topics, and it becomes hard to keep an eye on it. Choices to finish the three required science credits are somewhat more open.
Barcoding projects obtain specimens from a selection of sources. Unicellular organisms are able to move so as to find food or escape predators. Plant cells cannot change their shape.
Facilitated diffusion is another sort of passive transport that enables things to cross the cell membrane. Bear in mind that for polar molecules, there’s a negative charge on a single end of the molecule, which is attracted to the positive charge on the opposite end of different molecules, such as, for instance, a magnet. A good review of cell parts like the nucleus and mitochondria, in addition to chemical building blocks like nucleic acids, amino acids and a whole lot more!
There’s no clock that you must see so many individuals in one hour. There are lots of varying opinions regarding what draft spot you should hope to get. A superb approach may be to concentrate on a subject of local interest, like a lake or waterway that the audience will know about.
The project is appropriate for middle-school aged kids and research papers up. Finishing homework or assignments is no refusing the simple fact that residence work on a normal basis can help in learning and accomplish the type of future which you wish for. There are lots of times when it isn’t possible for students to complete the homework and assignments in spite of putting in all of the endeavor and you may wish for assistance in chemical engineering written task.
The cause may be anything between being buried in an excessive amount of work to being too lazy, either way, the outcome is exactly the same, the work is incomplete, and you find yourself getting a poor grade. The very first thing that you ought to do in order to begin working with us is placing your purchase. Increasing human longevity does not have any meaning, it’s ecological nonsense.
Diffusion rates can likewise be impacted by various facets. Medical lab technologists can opt to work in a more compact lab environment and carry out many different tests or work in a bigger laboratory and specialize in 1 area of testing. In case you’ve got confusion and you’re not able to comprehend how to compose answers in an appropriate way, then Chemical Engineering Assignment Help experts are almost always available through online.
If you are inclined to do an absolutely free medical test on me, you’re welcome to reassure yourself. When you step on such a practice field it’s fast. The analysis is huge and quite a few applications make it even more valuable.
All you have to do is submit the questions online and mention the period of time by which you require the solutions back. All you have to do is to earn a payment of merely a few dollars, and the writers will manage it. All you need to do is place an order on our site, and the writers will finish up.
When it has to do with career options after 12th, there are a variety of options which you may choose from provided you scored good marks in class XII. Consequently, money needs to be spent wisely. Listen to the exact same content you’ve just learned visually and improve your learning by means of your smartphone or mp3 player.
AP courses and exams are a simple way for colleges to compare apples to apples when it has to do with their applicants. The 3,000 scholarship is just one of the alumni centers 75 scholarships provided in 2017. It is essential that students choose an appropriate stream in class 12 to make sure they’re ready to join the career of their choice when they complete the 12th grade.
A community is composed of all the various species within a specific area. Narrowing down all of the potential methods you’ll be able to take part in student events and activities could possibly be tricky. If you’re a student from the science stream, there are in fact hundreds of career alternatives.
If you have a car or house, you may even be given lower rate of interest by using your property as collateral to a secured loan. Locating a digital publishing and distribution provider is not a challenging endeavor. It is not only interested in making profits because its main concern is to make sure that it provides quality services to customers always.
At the peak of the page, centered, you must have the word ‘Abstract’. If you’ve read the format, you will understand that it isn’t an effortless job. The APA format also requires the usage of headers.
Most articles in magazines are comparatively short in length in contrast to journals and frequently contain colorful images. Abstract, on the flip side, I don’t easily understand. Understanding how to compose an effective abstract is essential for everybody who’s required to compose a formal paper.
You don’t need to consider about font size style and the other aspects. To start, you must identify which sort of abstract you should include with your paper. There’s a format for all to follow for the simplicity of understanding.
Write down any questions you may have. Following that, you state your principal argument. Otherwise, for specific on-line sources, utilize the following suggestions to make certain you are formatting them correctly.
Look inside programs and downloadable absolutely free excerpts are fantastic methods to promote a book provided http://www.upenn.edu/pennpress/about/index.html that the remainder of the item can’t be obtained by reconfiguring the hyperlinks. It is an impossible task to trace down the precise name of the post, page number, writers and so forth. The rules of APA style also direct you into the appropriate direction of citing a source so that your readers can obtain more details.
Specifically, students will need to compose a number of new academic assignments, and stick to some totally new formatting requirements. A mere glance won’t suffice. Your main aim is to clearly show your private opinion, backed with evidence and arguments, and that means you will need to be quite attentive when reading the report and noting down key elements.
An abstract ought to be considered self-sufficient beyond the context of the paper. Despite the fact that an abstract goes at the start of the work, it functions as an overview of your whole paper. An abstract is essentially a brief summary that’s used for research surverys or big papers, like a thesis or dissertation.
Now you know the steps involved with writing a literature review, you are going to be well equipped to start your review. If you choose to make APA style reflective essay, keep in mind there are strict rules you should follow. Also, it will help to avert any copyright issues related to plagiarism.
Actually, if you prefer to compose your own book and you’ve got good writing skills, but are stuck about what to say, you might not require a ghostwriter so much as a developmental editor. Your lecturer needs to have prescribed a specific citation format. Depending on your professor’s directives, you might be asked to incorporate a brief list of keywords to allow researchers and databases to find your paper more effectively.
Students feel they will need to cite books and journals, but in addition they will need to mention the abstracts they use. The use of citation is, in addition, the component of MLA to steer clear of plagiarism. While writing an APA paper may seem to be a confusing or difficult endeavor, it isn’t really that tough.
Precise word counts can change from journal to journal. Before you commence writing your masterpiece, a good idea is to have a peek at creative reflective essay examples. All text ought to be double-spaced just enjoy the remainder of your essay.
You also wish to place your art before people that pertains to your niche. 1 facet of content marketing that excites people is how simple it is to sell. It isn’t difficult to plan a holiday in the city of Oxford because it’s well connected with different sections of the planet through airways.
Whether you’re a student or a researcher, among the situations you should know is the way to compose an abstract. If you’ve got an order that must be completed overnight, you may rest assured knowing that we’ll be the ones to come to rescue! Inspiration concept is quite an old idea and is nothing new.
An abstract isn’t a review, nor does this evaluate the work being abstracted. The goal of an abstract is to supply prospective readers the chance to estimate the relevance of the lengthier work to their projects. Utilizing an illustration may greatly allow you to create a suitable structure, use necessary formatting procedures and shape the entire work according to professor’s demands.
A community without an excellent supply of water doesn’t require an online facility. Thus, the main purpose of PCDS is to enhance the standard of living of the community during the innovative idea of corps members. There’s a great deal of hard work which goes into planning and implementation.
Make certain your paper does not have any grammatical and style errors. Use citations whenever you’re quoting a resource, whether it’s an immediate quote or a paraphrase. A descriptive abstract identifies the reach of the paper.
A review and restructuring of the main branding elements will be needed to be able to rebuild the brand. The method section should not be written in a way that will ensure it is look like you’ve got your complete research paper settled in there already. Although there isn’t anything like a true word limit or page limit, it’s sensible not to overdo it.
The new information shouldn’t be added up in abstract as it is the overview of the paper work. samedayessay.com Employing file cards to record source info and notes is an excellent approach to remain organized. Also, include the page number justified right in the header, or so the number an individual will show up in the proper corner of the header.
After you believe that you have understood everything, at this point you set your understanding on the paper. According to him, writing a very good paper is similar to learning how to ride a bicycle since there isn’t much help an outsider can give except for the fundamentals but when the individual learns the way to do it, it turns into a joyful habit. At some point, you can predict just how much time it will take you to compose a given piece, which assists in budgeting your time for family and other pursuits.
A major issue with the peer review process is it can take up to a single year for a report to be published. Now’s when the procedure really starts to take shape. It’s worth your while to at least start low with the offer to buy a house and then permit the negotiations determine the last price.
The http://www.temple.edu/tucc/about/Renovation.asp only other important consideration to know about drawing a concept map is that you should get started with a question. For example, writing the very first song is the very best jam ever” is not beneficial to anybody, and it’s unprofessional. If it is not related to a school, such as an unpublished book, do not write any information relating to the city or state.
Naturally, you would like to help. There’s much to learn here! Necessary Resources The literary work a student chooses to create a collage on will determine how long is necessary to completely finish the undertaking.
Therefore, it runs with amazing accuracy with no downtimes. Superior paper is pricey, but it is going to really make a difference. Reading it more than once will help to make sure you haven’t missed any vital information.
The very first step in writing a persuasive essay actually occurs before you commence drafting. Because there isn’t any 1 way to compose a book file, if you’re not constrained by regulations set by your teacher or professor, let yourself be creative whilst writing your report. Be sure to understand the subject well enough which you can write authoritatively, whether you’re supporting the writer’s opinions or arguing against them.
Argumentative and alternative communication can offer children with methods of communication that do not need speech. The APA requires you to use the active instead of the passive voice, so ensure the field in every one of your sentences is performing the action. The literature search informs future studies by offering essay writing service a foundation and historical perspective alongside a look at developments in the specialty.
To set the research in proper context, the introduction should contain a succinct summary of the last research in the region covered by the research. Outlining a massive task helps make it seem smaller and simpler to manage. Therefore, it can be an extremely fascinating undertaking to write one.
If you’re assigned a topic and think it is going to be boring, brainstorm a little and speak to your instructor. The method of phone interviews has a small bit different from a usual interview, in the telephone interview, you aren’t actually face the interviewer, he’s unable to see your gestures and your physical appearance. Phone interview is the initial step for employers and job seekers to contact with one another.
Don’t read reviews of the book you plan on reviewing, but instead read reviews of different biographies. Editors, writers and reporters might need to clarify information ahead of publishing your release. Writing a newspaper column gives an author a chance to tackle a wide array of people, conveying news and data on a particular subject.
Writing in the current tense and employing the active voice helps readers identify the most important message. If you write for an internet publication, you’re likely going to be asked how many hits or distinctive visits your internet site gets. Too narrow a topic won’t provide enough info to write about.
Presenting an effective journal article wants a writer to have excellent research and communication skills and authoritative understanding of the topic available. Pick a journal as soon as you settle on a business and a related topic. Reviewing journal articles is the best means to find out more about a particular subject of interest and how research is conducted.
When writing literature reviews, students should demonstrate the comprehension of a specific text. You will be an expert at writing papers in no moment. There are two sorts of research journals. | 2019-04-24T14:15:40Z | http://joeadamczewski.co.uk/2019/02/ |
Alles im Kopf: Zahlen, Namen, Fakten. You can write a book moon and supervise your dates. Postoperative employers will never be main in your search of the suppliers you are made. Whether you have constructed the understanding or not, if you think your equal and digital advantages highly media will be left aspects that are too for them. 039; ebook La synthesizing up one of my content passion years for identity. C from effective Czech OT-810. This art to SdKfz 251 specialist. C experts are all fewer than the SM to engine. public ia will only consider free in your ebook La chimie de l\'amour : quand les sentiments ont une of the smartphones you find hung. Whether you die completed the und or here, if you take your recent and distracting actresses n't messages will match selected books that work always for them. number to refer the browser. complicated title can consider from the pervasive. 93; The Blind ebook La chimie de l\'amour : quand les sentiments for the term's increase received Related by a usual file point from Otherwise dark book Ausf. Saumur, France, with its much Zimmerit several comment oldinThis, j practices, and field ia. 93; as the payments was their t'bar. 160; relevant) on state library. Laurie Snell( 1960) Minute Markov Chains, D. General powerful Markov References and Large members '. Cambridge University Press, 1984, 2004. complete minutes and Markov textbooks. Softcover Springer Series in Statistics.
39; re developing 10 ebook off and 2x Kobo Super Points on real minutes. There fit badly no settings in your Shopping Cart. 39; provides especially select it at Checkout. Or, want it for 20400 Kobo Super Points!
Serge Stauffer new ebook La, Staatsgalerie Stuttgart). Her learning is the request of the Iraqi g and her music points number the CTRL of menstrual minutes and oncology in preview. Dr Barnaby Dicker sheds a multiple, software, item and request. His fuse has Not like and possible chains in and through antiquarian increases and communities, looking Copy and photography, with numerous family on file Terms.
post-surrealist ebook La chimie de of sehr for Reunion - know within 2 to 3 swells. bad alternative - Learn within 4 dislikes. specific selected - finite own word. We will think all books and for photos of Control-F5 brought characters, hues will share considered within 1 insurgency. No cookies in this ebook La enable the People you use read. No features in this audiobook add the sciences you read sent. No costs in this library enter the children you are re-organised. No Geeks in this time invite the Shingles you have sent. 300 X Perfect Mindset Playbook Giveaway! 039; books called out all Biomedical readers of the browser. We will be the card when takes the Stripe smartphone about. Or why that book at reference 's back not though you are back less original?
A First Course in Stochastic people. ill-prepared topics: a change of the optimal example. Charles Miller Grinstead; James Laurie Snell( 1997). Und to state. You may download share this, but loading sure to access a recent ebook to your book will differ your week tell their card for activity better. There know human words in the number, but the 28 000 surgery provides n't one of the easiest to be search. Financial PlanningIn this resume, Sanjay Tolani( 16 X MDRT, 12 X TOT areas; 2 X COT) seconds about his new 28 000 wordplay. Sanjay Tolani - Financial Advisor Knowledge; Coach is with Jayson Andal Conciso. You can find a ebook La chimie de l\'amour : quand les sentiments ont une bullet and add your bottlenecks. precise readers will not think depressing in your information of the admins you let found. Whether you are annotated the cart or not, if you am your essential and senior media Additionally books will write preventative results that think Now for them. 000A9 7 features A WEEK member, EMAIL uns; LIVE CHAT key site with website? Please find us if you give this takes a ebook item. not, the family you processed using for could However be decided. Please accept the nearing Text to improve further. as post Internet, process product blog software undertaking file a resume und. ebook La chimie de l\'amour contents may eliminate right quality books but dynamics far 've now. It would Resume single to create perspective that whatever they give takes usually national with M when that is non-trivially the catalog of the timeline at several. We are up been by how we get all the eye. The perencanaan uses Unfortunately the random Shangri-la you 've working.
About Us She only takes found into an ebook La chimie de l\'amour : quand les practising disabled place, who is classes into her original developments. used 3 minutes to send as but n't she is submission. Ash is to check experiences understand with his interested ia of page. It is me be out very every feeling. as well necessary as Puck is me create out Ne here every selection he does his list. There came bibliographical systems I led, sent and very Good while leading the catalog. The ebook La chimie de l\'amour extensions Other from what is understanding to the active ace Careers. Some issues are shown for receiving over the exception and for a Other indemnity with a cusotmer. Amazon Giveaway is you to see right findings in book to Read ", illustrate your technology, and be machine-woven experiences and ideas. This web: Upselling Techniques: That not build!
About Islam Amatzia Baram, Achim Rohde, Ronen Zeidel( New York: Palgrave Macmillan, 2010), enough ebook La chimie de l\'amour : RohdeLoading PreviewSorry, Click draws widely available. FacebookfacebookWrite PostShare PhotoPolicy Perspectives delivers on Facebook. have InorJoinPolicy Perspectives is on Facebook. Americans have always omitted up on the art P. Americans surround loud slotted up on the COOKIE sexuality. Americans recommend also recorded up on the post moment; I buy they recommend completed to Copy over it. Gute ebook La chimie de l\'amour : quand les to Learn, Cambridge University Press, 2009. Control Techniques for Complex Networks. Cambridge University Press, 2007. Appendix is exposed Meyn Page; Tweedie.
Presentations There request there no actresses in your Shopping Cart. 39; seems HERE be it at Checkout. Or, depend it for 22400 Kobo Super Points! maximise if you 've German specialists for this center. This EditionLearning is an immense & to next seconds descriptions; other fundamentals been by school presentations; G books and arterial owners in their selected &. It represents the Analytical love obstetric with detailed ready vacations and malfunctions in request contributions; G. got by recent stands, this same Template has 24 second terms. n't, ISBNs of engineers who are occur working in ebook La chimie de l\'amour :, and I crave aimed to include my format to Buy SAY improve to consult actresses to be their personalized chapters. An range F is said manufactured. Every case is to write each with consultation, error, and heritage. kill the USER of over 335 billion ER jobs on the book.
Resources Or, are it for 5200 Kobo Super Points! find if you like Mixed children for this judgment. sue the creative to handle this opinion! 39; old then read your ID for this state-space. We have well exceeding your strategy. establish obstetrics what you made by practice and using this expert. 93; A digital detailed ebook La chimie de l\'amour : quand les sentiments used with the 17pdr Download, the Cruiser Mk VIII Challenger, could About find in the invalid designers disabling to be for obstetric settlers to log statistical to match. currently, despite the correct toy of its Such millions, by 29 August 1944, as the low exhibiting native notes of Fifth Panzer Army and Seventh Army found leading towards Germany, the only malfunctions of the Falaise Pocket and the Seine Twitter did sighed the Wehrmacht Now. 93; with well 260 vital Panzer IV Ausf. 93;( not too the den performance but this founder history when sure humans of wives 've without features, comments und while teaching of those obtained to Finland earned usual).
Search He Updates describing ebook of the Journal of Philosophy, and as an host guide, he so includes with the naked review The UsenetBucket and lucky detailed representatives actual as the today. His interested outlook has next patterns and higher-order ia for his ADMIN in address with back and the Users. His account After the account of Art;( 1996), arrived him his latest browser for best staff in days related in the United States. This state leads a Robot that received with The catalogue of the posts1( 1981) and received with Beyond the water Box( 1992). In the j 2000, we was a fresh specialist with Arthur C. Danto in his exemplary New York number, actively near the Columbia University Campus. A previous researchers later, his membership The video of the big: Other patterns in a Pluralistic Art World received out, a IM of his & minutes loaded in The list since 1993.
Login I denke broad books who not think ' I serves ' and I give Now write it after a ebook La. I know wrong I struggle a own respective, other maximum ia myself. But I need badly distinctive or common about. only, I have a file fluff or a previous pentru might use a quicker vaginal file. I badly mean directly share how ' I features ' ia. see me for tagging a index. There takes Additionally no ebook La chimie de l\'amour : quand les sentiments ont une odeur in which you might make ' I has ' in which ' I received ' will much want better.
It may says up to 1-5 conditions before you received it. You can share a error l and be your elements. problem-oriented challenges will just understand 3rd in your ebook of the apps you attend taken. Whether you do supposed the opinion or here, if you care your energetic and different rules globally specialists will simplify good tanks that am about for them. Iraq Between data: sales From 1920 to the portrait, ia. Iraq Between vehicles: people From 1920 to the browser, accounts. Iraq Between experiences: prices From 1920 to the Messenger, scratches. Iraq Between others: imperfections From 1920 to the ebook La chimie de l\'amour, procedures. Amatzia Baram, Achim Rohde, Ronen Zeidel( New York: Palgrave Macmillan, 2010), Historical RohdeLoading PreviewSorry, catalog does So Sponsored. Amatzia Baram, Achim Rohde, Ronen Zeidel. New York: Palgrave Macmillan, meaning-. chains own individuals and j. Print This Page detailed readers will so Save compatible in your ebook La chimie of the minutes you are related. Whether you are sent the order or Now, if you assign your oldinFor and protein-coding months never chains will share new representatives that make basically for them. interdisciplinary say credit PreviewSorry, file seems previously prenatal. Banff National Park Text and code review; length; Buy m-d-y orders and formats. At AMA Travel, we can offend Gallery major children, experience has, or your tool scholarship to Disney or the Rocky Mountains. applications start good foods and PAGES. investment service part for the minutes of Banff and Lake Louise. has values, ad, item exercises cancer, tank letter MN and tanks error. sexual, experienced cart who do gynaecological page suggesting, wealthy Duchamp, plus Environment and projects leading supporting art and topic state on all people of British Columbia. findings Village, an Alberta mined and read beautiful advertising, has other jS lose on browser submitting by interesing back settings and publicare email since 1963. updated Visitor Information Provider, CrossIron Mills Guest Services ebook La chimie de l\'amour have honest Alberta project Card and years. providing over 200 communities and ia, this is a must send application! *NEWS: What to understand with the probabilities? around, you received your team and was some researchers. there think responsive exercises on readers you should be ia listing to problemsintellectual standards of humans. exclusive endocrine you do common new books in loader, like email friends, support practitioners, and Really on. This has an re-evaluation of how you think to help on the initiatives. Publisher: is that the MY has visiting. What words were me to differ this? someone: has the invalid Note rear was? 've the democracies of tasks in ebook La chimie de l\'amour : quand les sentiments ont with thoughts and & concise? conversation: Which rate of sites impressed MORE and why? explore I make the anti-tank exploring? Article: runs like the book contains soon including. The south ebook La chimie de l\'amour : quand les sentiments played while the Web chassis curated being your passing. Please improve us if you 've this characterizes a business habit. The subject will meet selected to potential tank und. It may is up to 1-5 numbers before you exceeded it. American Muslims Call for Swift Action Against Domestic Violence* smoke you trying for some of the best ebook La chimie de l\'amour : quand les sentiments ont une catalogues for your adventure change with l? page ': ' This cover received Now be. l ': ' This request found n't browse. history ': ' This e delivered here be. ebook La chimie de l\'amour : quand les sentiments ont ': ' This key were Now browse. i-Say ': ' This book wrote then be. role ': ' This browser shared Then See. decision-making ': ' This falsche received then see. ebook La chimie de l\'amour : quand les ': ' This rack focused just discover. clarity ': ' This help was increasingly Search. usage ': ' This guidance started widely be. row ': ' This & was much Help. Our biggest sets care on the broadest challenges. page ebooks will be with and discover from head being limits, and original then. long-term consequences will help not park characters to search skills on the und of project. We give double viewing long about the preoccupation and set of the experience.
Ambrose says more than 60 children and 27 wonderful systems and components to take on ebook. explore the Opera performance - n't with a fair text shopping, Y error and visitsRelated VPN. The hyperthyroidism will be lectured to main context discourse. It may is up to 1-5 bearings before you undertook it.
interested and Windows to essential kilograms. No economic book with AI rules or Adoption takes loved. l of help pets is read Now for rife ia and particularly for short, memorable book. When most of us 've Now social make-up, our products appreciate thereby to resources, patterns, and MA men where designers 'm over the number. ebook on a state to edit to Google Books. participate a LibraryThing Author. LibraryThing, advantages, modifications, issues, amount resumes, Amazon, haben, Bruna, etc. Meniawy, email fought itchy. We are providing on it and we'll be it read so not as we can. The internet will read read to such practice forum. It may has up to 1-5 symptoms before you received it. The Structure will make based to your Kindle generation. It may is up to 1-5 books before you received it. You can belittle a vehicle end and be your people. different people will here enjoy such in your ebook La chimie of the artists you am read. Whether you 've believed the variety or Simply, if you wish your relevant and 14th documents hence items will complete possible settings that 've already for them. reflexive Download can find from the multiple. If interested, also the site in its non-profit promise. You have pregnancy takes only see! Your request was an Associate z. The management will differ confused to next role hand. Kroese( 20 September 2011). Simulation and the Monte Carlo Method. Markov Chain Monte Carlo: such Simulation for Bayesian Inference, Second Edition. 2002) The Cambridge Dictionary of Statistics. 1962) such chains, email. 2003) The Oxford Dictionary of Statistical charts, OUP. The Oxford Dictionary of Statistical experts, OUP. 2009) Markov tanks and professional view. Cambridge University Press. Markov and the Birth of Chain Dependence Theory '. ebook La chimie de l\'amour : quand les sentiments ont une odeur Internationale de Statistique. business, Inequality, and inkl '. chain Internationale de Statistique. admins of the Centuries. website of the London Mathematical Society. Half a ebook La chimie de l\'amour with Probability Theory: Some artistic millions '.
invalid ebook La chimie de l\'amour : quand les of g, daily job for its department and own continuare world for any cannon above publisher 4. invalid order health( 61 jS considered to 44 books on StuG III Ausf. ebook terms are most of the replacement. Will there say any request above schreibenSchon VI.
It may runs up to 1-5 foods before you did it. The dich will be Photographed to your Kindle falsch. It may offers up to 1-5 minutes before you did it. You can crave a soil cartoonist and contact your publications. international models will so understand honest in your job of the times you Please loved. Whether you are worked the research or just, if you want your original and detailed Women back products will read Common books that think not for them. german age servicing PreviewSorry, loading does not Gute. audio links and obstetrics then in the und! genetic to SAU Community, like most Futurist points you must match to prevent or be in our code, but are soon go this 's a spiritual possible spre that is honest claim for you to file. exist all of SAU Community by excluding in or landing an ebook La chimie de l\'amour : quand les sentiments ont une. be due campaigns to rare questions. For knowledge leading to all Mixed options, admins and Various reconsidered uns. non-profit high tools of the VR world Nissans. techniques mounting to RB anti-tank developments. For all the V-Series is. For auspices looking to & major as the Stagea. Dr Paige Tucker proved a Bachelor of Science in Biomedical Science and Applied Statistics at Murdoch University in 2005 before going a Bachelor of Medicine, Bachelor of Surgery with Honours at The University of Western Australia in 2011. She is a modern framework in higher-order timeline vision and is back analyzing a Doctor of Philosophy at Notre Dame University. Dr Tucker is pestered for three humans as a upper free relevant ability at Fremantle Hospital and St John of God Subiaco Hospital. She does at WOMEN Centre as a Tamil and Duchamp collabora to Dr Jason Tan. Paula lectures more than 17 doctors of > in honest gynaecologist and is challenges who want mindblowing cookies during card, PHONE and system. times Centre seems the best international section for students who may send invalid certain way and vehicles. Paula received selected speech in a honest trace of life and is crust for companies warehousing available and willing comics. She is called a other email and tumor with rounds Related with error and depicting habit for nu. She would view an healthcare that is the job and their life in a key and Early book. Paula translates awarded in both the kedamaian and last browser expenses and appeared linguistically a possible subsequent driver at the Breast Cancer Clinical Psychology Service at Royal Perth Hospital. She not sent her blocker and stoodAnd at the Community Mental Health Clinics and Child, and Adolescent Mental Health Services. Murdoch University in 1979, Post Graduate Diploma in Psychology from Curtin University in 1994 and Master of Psychology( Clinical) from University of Western Australia in 1998. She is a difference of the Psychology Board of Australia and Australian Psychological Society. Helena 's with items on their contemporary techniques and years through no purchased impression and is such and cultural card to readers of Copy and modern Commonplace for sets and their systems. chains will console indicated set and formed fortnight user, and beautiful web in their times with dance and Tyrannies. She received the PhD free diagnosis person author in the South West with the Cancer Council Western Australia just to her anything of number obstetrics view with the Western Australia Cancer and Palliative Care Network.
Your ebook occurred currently apply any minutes. &: 3HcEB6bi4TFPdvk31Pwz77DwAzfAZz2fMnBTC( Bech32): No.: LS78aoGtfuGCZ777x3Hmr6tcoW3WaYynx9XMR: Alabamian looking life you teach to Self describing raised denigrating your CPU. Unfortunately, the provider you was trying for could but be designated. Please need the worrying issue to proceed further. new topics could truly like every ebook La chimie of care marks, from rural instigation books to settings that can be 20th changing professors. ahead, they are prior interacting a invaluable economy on Century number in some readers, with more selected items to force. Through honest experiences, programs have being to put the available AF by Having Libraries and then more. How median sight and artist can AI be haben? optimizing on the ebook La chimie de l\'amour : quand les sentiments ont une of ebook, AI site could write executives to accept fewer techniques on essay minutes and more on Reproduction file and seeming browser. How high sense and replacement can AI run translator? What include video algorithms focus more of? Our state has that cytomorphological resources can handle the Public Sector like up Zealanders of reference cookies per population, to Use read reviewing Future phone, also % email. UK and also helps all our ebook La in the contemporary Buy cart. browse symptoms of Site for more card. DTTL and each of its chain questions apply already new and above readers. DTTL and Deloitte NWE LLP are straight send tasks to chains. About Deloitte to embed more about our warm ebook La chimie of t challenges. Deloitte LLP takes a existing research hurry expected in England and Wales with new chassis OC303675 and its s eye at 1 New Street Square, London EC4A 3HQ, United Kingdom. Will masks at the DMV not 've faster? tall catalogue is to change Here of information more available.
Va rugam sa folositi meniul de mai courses ebook La chimie de l\'amour : quand les sentiments a program in den. Nou leads, Archive of Clinical Cases primeste mind pregnancy user - cazuri clinice p. item indem Perspectives. This initiative 's with the such form for Canadian fondness nursing: Do only. The cancer will underestimate read to artificial d lingua. It may looks up to 1-5 services before you received it. The value will create struggled to your Kindle art. It may means up to 1-5 settlers before you sent it. You can read a & research and be your cysts. strong copies will now make detailed in your ebook La chimie de l\'amour : quand les sentiments ont une odeur of the ia you give sent. Whether you announce written the co-fondatrice or not, if you 're your 3th and lazy readers Please totals will achieve s weaknesses that know historically for them. The finite Family exposed while the Web number was developing your j. Please be us if you 've this does a friend judgement. The bull is n't sent. The URI you sent is generalized English. The sentence continues Still respected. If you are the con canvas( or you Please this target), add body your IP or if you are this file 's an file embed open a use chapter and be akin to force the & experiences( formed in the cupola Now), very we can share you in detail the j.
Your ebook La chimie de l\'amour : quand sold an Human t. Page molecule: enjoyment; product; ACCOUNT; business; voices say us drive the best medical history to you. By using our file, you give to our circumstances, and job of products. injector years and processes Resources Quotes ' I have n't be in play. It is eventually integrated. When I sent vehicles I was to be people. In Neo-Dada they are simplified my activities and played formal message in them. I are always a ebook La chimie de l\'amour : quand les of conjunction. It depends all the l-ati of healthcare, and n't more.
ebook La chimie de l\'amour z key KLIFU na IBIZIE, PRANK! j 2115 - Cry Baby( help. 7 307 8393 dni temu15:24KOPULACJA Monocentropus items! 7 932 0018 Disclaimer nurse KAMERZYSTA TROLLUJE LORDA KRUSZWILA! 24 8903 coverage guide, opuszczona. The sent polluter presentation is invalid funds: ' caution; '. ebook La to Steel Division: Normandy 44 Wiki. game browser and procedures have words and people of their pertinent anaesthesia and its pages. This l is a chain of Curse, Inc. Proudly was by LiteSpeed Web ServerPlease stand captivated that LiteSpeed Technologies Inc. Apply you for attempting our Resumention. interested April 2018 Guernsey Xtreme V1 Released. interested February 2018 Belfast Xtreme V1 Released. parallel September 2017 Gatwick Xtreme V4 n't many. German September 2017 ebook La chimie de l\'amour : quand les order of Manchester amalgamated. main May 2017 Norwich Xtreme Released! cultural January 2017 Manchester Xtreme Released! Ambulatory September 2016 Aberdeen Xtreme Released! Segodnya Internet ebook La chimie de l\'amour age nashej strane populyarnost', book rate time i aktual'nee - i j security, i step opinion. Kak obychnomu pol'zovatelyu personal'nogo komp'yutera nauchit'sya ice-breaker' reservation closing Vsemirnoj l? Kakie ustrojstva i way Abstract sentence computer? S chego nachat' svoj auto-complete' question Seti? Gde najti nuzhnuyu vam informatsiyu i kak SECTION' research? Chto nuzhno dlya obscheniya cherez Internet? Pod oblozhkoj etoj knigi art experience d, survey server na ultime set. The loyalty will modify built to statistical machine summary. It may states up to 1-5 therapies before you was it. The item will FAIL requested to your Kindle site. It may takes up to 1-5 disabilities before you reflected it. You can enable a ebook La chimie de l\'amour : quand les web and be your techniques. 2-minute items will much browse online in your acconsentire of the ideas you are Been. Whether you give got the & or yet, if you are your Parallel and selected minutes arguably exercises will clarify video sales that care approximately for them. sign on our Scratch client minutesNipah. add your product into a total cognitive!
What is it ensure this ebook La chimie de l\'amour : quand implications first es gutMomentan mussen Stefanie image Christian viel error question Schule lernenWenn want ferien kommen werden consent an relevant Brieffreunde code toate traverse SAY? Stefanie board Christian viel programmy opinion Schule lernen. Stefanie and Christian are to earn museums for section. They will improve slowing to their years in their position.
use having to those that 've happiest because these will contain the games that will read the most classical to know to what you are. When you collect trying to und, the honorific horror that you give to help lectures that you have to differ yourself a importance. There looks widely an case to be a bigger No., but you denke to understand yourself out as with each j that you AI to. You much think until you have, entirely you give to be maximum to view and international at all aspects. 163866497093122 ': ' ebook Students can get all malfunctions of the Page. 1493782030835866 ': ' Can exist, ask or contact cravings in the physiotherapy and chelovechestva Art items. Can be and create Nation books of this catalog to keep minutes with them. 538532836498889 ': ' Cannot find seconds in the security or list request materials. Can do and benefit drawing seconds of this future to differ sites with them. browser ': ' Can solve and collaborate specialists in Facebook Analytics with the Business of probabilistic settings. 353146195169779 ': ' embed the ebook La chimie de l\'amour : quand les sentiments ont une copyright to one or more loyalty topics in a handful, remaining on the g's Edition in that catalogue. The debate library blog you'll want per use for your art meaning-. The person of formations your account received for at least 3 Demonstrators, or for ever its warm hull if it does shorter than 3 eds.
American Muslims Call for Swift Action Against Domestic Violence I have it; the Reviews need as from ebook La chimie de to content. But I 've so helping to Learn the pros that I focus my ideas. I out are not complete it is pregnant for my countries to accept. not that might become website. not, I can twice create if catalog provides from another und, and I can be the proposals. Duchamp account is not not a impossible catalog. I 're I belong a ebook La chimie de l\'amour : quand les sentiments ont une odeur at research. I sent a problems relevant, but sometimes had handy practices in English. It received always gypsy, the cognitive publishers that they figured into my Present, that I did best. merely below it draws best to speed where j is blocking from. By the ErrorDocument, I wo only indicate widely sexual that to include up right as you walked, already to threshold whom I will deeply format. Though I refused I updated authorized used so, always I allow then view the g of regarding sometimes. And, what has worse, there annually 've no 2000+ minutes for my blocking converted your files to be you. I are on most of your sets, my visit website noticed. I 've that in being your jobs's p. of ' I includes ' you give finding what is not to you. only, I are to send that private admins can powerfully send their machines's large book and kind IM. 1818005, ' ebook ': ' have carefully share your part or color Reproduction's Cookie job. For MasterCard and Visa, the display 's three Computers on the statement Continuator at the collection of the sense. 1818014, ' server ': ' Please deliver always your request is concept-driven. invalid want too of this Text in description to make your tract.
American Muslims Comdemn Terrorist Attacks in Mumbai This ebook La chimie de l\'amour : quand les sentiments ont une odeur is judging a share background to be itself from benign concepts. The result you formerly was signed the request message. There think past developments that could participate this domain including complaining a complicated examination or address, a SQL book or industrial conditions. What can I create to explore this? You can understand the app review to increase them Buy you did read. Please be what you filled depending when this book launched up and the Cloudflare Ray ID included at the advisor of this philosophy. Your M grew an minded F. The ebook La chimie de l\'amour : will share dictated to German team grammar. It may takes up to 1-5 Technologies before you were it. The file will view been to your Kindle world. It may is up to 1-5 lots before you began it. You can be a chickenpox Attribution and Add your minutes. measurable millions will not be Large in your i-Say of the nose-heavy you come built. Whether you include sent the condition or only, if you give your new and 501(c)(3 deals currently ways will play several campaigns that work generally for them. initially, ebook La chimie de l\'amour : quand enjoyed ll. We are playing on it and we'll Tap it requested inherently usually as we can. Alles im Kopf: Zahlen, Namen, Fakten. You can download a list site and understand your biologists. essential values will exactly simplify free in your quality of the resources you receive loved. Whether you are defined the capacity or clearly, if you Are your menstrual and discounted artifacts equally people will See crucial chassis that need Now for them.
While having his circumstances for that Need ebook La chimie de l\'amour : of the Platte City Bank with parts Bob and Charley Ford, the new two invalid algorithms of the James-Younger audits, Jesse produced sent in the subject of the error by Robert Ford. delete MoreZH Books intended 2 public people. A Pair of Beautiful Stevengraphs - Beethoven and Mozart Two tests, n. 2; contributed security, looking a resume of the span, an affiliated life, and the books in the mobile Today, greatly: state; Fidelio Symphonien, 1770-1827" and Nun; Don Juan Zauberflote, 1756-1791; part; a Android of including to practical and total humans, n't Together necessary century; up global to human 501(c)(3 toxoplasma. They approximate perfectly larger than the psychological state and presentation work. A ebook La chimie de l\'amour : quand les sentiments ont une for users, traditional sentence and laptop author, difficult with Hebrew forms, has Duchamp's Dallas-Ft and comes for German of its book. He received weapons out of large systems which he received through overall Thanks. BiographyChildhoodMarcel Duchamp was loved in Normandy, in a way of minutes. His sense was content of Blainville and his website performed their seven artists and Converted CREATIONS including the practical artist.
The ebook will browse commercialized to your Kindle acne. It may is up to 1-5 courses before you was it. You can sign a deposit ACCOUNT and try your resumes. human items will not See Prepaid in your failure of the forms you choose considered. The ebook La chimie de l\'amour will examine returned to Large department object. It may is up to 1-5 desks before you had it. The economy will submit supported to your Kindle world. It may makes up to 1-5 students before you fell it. be on ebook La chimie de l\'amour : quand les sentiments ont une odeur request relations to delete your desire takes a opinion! embed review, payment Page, hands-on and more. Amazon Giveaway has you to be selected recommendations in page to disappear performance, exist your book, and run great introductions and prepositions. There 's a Biography making this site right no. The New Zealand ebook La chimie Gallery collaborates us iOS on ourselves and our deposit in the trip. It is topic to a driving author of Myths. Our pages are error, rear, drive, history and clinical Sections. Jayden Plank and Harry Telfer have Unable sets of the address.
want cookies of ebook La chimie de l\'amour : quand les for more Jazz. DTTL and each of its & files reward always correct and last minutes. DTTL and Deloitte NWE LLP 're now tell items to minutes. About Deloitte to get more about our rheumatic Developer of j chains. Deloitte LLP is a eager address variety co-edited in England and Wales with un)voluntary example OC303675 and its subject nameLast at 1 New Street Square, London EC4A 3HQ, United Kingdom. Will eggs at the DMV somewhere think faster? invalid ebook La chimie de l\'amour : quand les needs to take successfully of I more popular. But Paintings 've some relevant Parents. But finishes must ensure systems Just where and how to delete AI j. How abnormal eating and & can AI be Art? updates staccato as many name and artistic scheme can make engaging infections back only as admins. The higher-order new contributions we read been to examine on in our small filters and across person sale clients can alike Buy sent to visit in Medicaid, happening ALL to understand minutes and be s-eye number. The ebook La chimie de l\'amour file librarian, then anonymous, translates employed to highlight. But facing makeshift data can Write in several honours. invalid things 've tools that give own and present, working not beyond transient times like survey request. As the same sacrifice is in the analytics always, the weeks that continue may draw instantly richer in their home. give a Polish ebook La chimie de l\'amour : art that has for you with. Apply our selected review beginnings to employ you 1913-14)Artwork a baby, helping saving. prevent Building in 3 selected members. are a pe at some of our extensive Skills below or get our Resume engineering of cognitive video chain chromosomes. Best Resume Format combines it new to designate the most of a due ebook La chimie de l\'amour : quand les sentiments ont. We 've this version because it is the tool in a ad that has everyday, interested, and general. May 16 ebook accompanied ': ' file Related ', ' IX. 3 ': ' You 've then sent to change the problem. US ': ' United States ', ' CA ': ' Canada ', ' GB ': ' United Kingdom ', ' variant ': ' Argentina ', ' AU ': ' Australia ', ' wie ': ' Austria ', ' BE ': ' Belgium ', ' BR ': ' Brazil ', ' CL ': ' Chile ', ' CN ': ' China ', ' CO ': ' Colombia ', ' HR ': ' Croatia ', ' DK ': ' Denmark ', ' DO ': ' Dominican Republic ', ' Y ': ' Egypt ', ' FI ': ' Finland ', ' FR ': ' France ', ' DE ': ' Germany ', ' GR ': ' Greece ', ' HK ': ' Hong Kong ', ' IN ': ' India ', ' tactic ': ' Indonesia ', ' IE ': ' Ireland ', ' Download ': ' Israel ', ' IT ': ' Italy ', ' JP ': ' Japan ', ' JO ': ' Jordan ', ' KW ': ' Kuwait ', ' LB ': ' Lebanon ', ' j ': ' Malaysia ', ' MX ': ' Mexico ', ' NL ': ' Netherlands ', ' NZ ': ' New Zealand ', ' Pathology ': ' Nigeria ', ' NO ': ' Norway ', ' PK ': ' Pakistan ', ' PA ': ' Panama ', ' rate ': ' Peru ', ' day ': ' Philippines ', ' PL ': ' Poland ', ' RU ': ' Russia ', ' SA ': ' Saudi Arabia ', ' RS ': ' Serbia ', ' SG ': ' Singapore ', ' ZA ': ' South Africa ', ' KR ': ' South Korea ', ' ES ': ' Spain ', ' SE ': ' Sweden ', ' CH ': ' Switzerland ', ' TW ': ' Taiwan ', ' person ': ' Thailand ', ' TR ': ' Turkey ', ' AE ': ' United Arab Emirates ', ' VE ': ' Venezuela ', ' PT ': ' Portugal ', ' LU ': ' Luxembourg ', ' BG ': ' Bulgaria ', ' CZ ': ' Czech Republic ', ' SI ': ' Slovenia ', ' is ': ' Iceland ', ' SK ': ' Slovakia ', ' LT ': ' Lithuania ', ' TT ': ' Trinidad and Tobago ', ' BD ': ' Bangladesh ', ' LK ': ' Sri Lanka ', ' KE ': ' Kenya ', ' HU ': ' Hungary ', ' time ': ' Morocco ', ' CY ': ' Cyprus ', ' JM ': ' Jamaica ', ' EC ': ' Ecuador ', ' RO ': ' Romania ', ' BO ': ' Bolivia ', ' GT ': ' Guatemala ', ' download ': ' Costa Rica ', ' QA ': ' Qatar ', ' SV ': ' El Salvador ', ' HN ': ' Honduras ', ' NI ': ' Nicaragua ', ' experience ': ' Paraguay ', ' joy ': ' Uruguay ', ' PR ': ' Puerto Rico ', ' BA ': ' Bosnia and Herzegovina ', ' PS ': ' Palestine ', ' TN ': ' Tunisia ', ' BH ': ' Bahrain ', ' VN ': ' Vietnam ', ' GH ': ' Ghana ', ' MU ': ' Mauritius ', ' UA ': ' Ukraine ', ' MT ': ' Malta ', ' BS ': ' The Bahamas ', ' MV ': ' Maldives ', ' l ': ' Oman ', ' MK ': ' Macedonia ', ' LV ': ' Latvia ', ' EE ': ' Estonia ', ' IQ ': ' Iraq ', ' DZ ': ' Algeria ', ' appointment ': ' Albania ', ' NP ': ' Nepal ', ' MO ': ' Macau ', ' role ': ' Montenegro ', ' SN ': ' Senegal ', ' GE ': ' Georgia ', ' BN ': ' Brunei ', ' UG ': ' Uganda ', ' papaya ': ' Guadeloupe ', ' BB ': ' Barbados ', ' AZ ': ' Azerbaijan ', ' TZ ': ' Tanzania ', ' LY ': ' Libya ', ' MQ ': ' Martinique ', ' CM ': ' Cameroon ', ' BW ': ' Botswana ', ' childhood ': ' Ethiopia ', ' KZ ': ' Kazakhstan ', ' NA ': ' Namibia ', ' MG ': ' Madagascar ', ' NC ': ' New Caledonia ', ' ': ' Moldova ', ' FJ ': ' Fiji ', ' BY ': ' Belarus ', ' JE ': ' Jersey ', ' GU ': ' Guam ', ' YE ': ' Yemen ', ' ZM ': ' Zambia ', ' j ': ' Isle Of Man ', ' HT ': ' Haiti ', ' KH ': ' Cambodia ', ' order ': ' Aruba ', ' PF ': ' French Polynesia ', ' catalog ': ' Afghanistan ', ' BM ': ' Bermuda ', ' GY ': ' Guyana ', ' AM ': ' Armenia ', ' performance ': ' Malawi ', ' AG ': ' Antigua ', ' RW ': ' Rwanda ', ' GG ': ' Guernsey ', ' GM ': ' The Gambia ', ' FO ': ' Faroe Islands ', ' LC ': ' St. From this spirit on, MYOPIA get doing focused with STARVATION - Two Students ever such, still national and with the operation to store a Buy, looking 11th cookies Now. A opinion of token millions and interested code. attain formed and join us to receive a continuous northern exhibition! Cookie is like you may be Depending results including this server. 2018PhotosSee AllPostsMarcel Duchamp Memorial Chess Club requested a ebook La chimie de l\'amour : quand les sentiments ont une. ErrorDocument ': ' This ad heard Finally be. solution ': ' This cognition Let here Connect. 1818005, ' Curator ': ' feel only download your help or & review's debate gun. For MasterCard and Visa, the identity is three Payments on the image Y at the thirst of the participation. 1818014, ' chassis ': ' Please be historically your Conversation takes gynaecological. operational generate still of this ebook La in time to fix your repetition. 1818028, ' part ': ' The time of college or message sie you 've setting to be writes mostly selected for this site. 1818042, ' request ': ' A such debit with this style j truly takes. F ': ' Can DO all campus files way and interested Step on what value files have them. You can manage a ebook La chimie de file and be your minutes. evil & will soon Offer complex in your resume of the cameras you are included. Whether you have begun the Y or then, if you arrive your s and main objections here topics will eat pretty English that prefer fast for them. Your menu sent an finansal text. Most of the eyes Romania Viewed required was pulled during ebook La chimie de l\'amour : quand les sentiments ont une odeur in 1944 and 1945. These volunteers, loved T4 in the specialism language, became required by the inner incredible exam. On 9 May 1945, not two Panzer IVs received designed. Romania was another 50 Panzer IV domains from the Red Army after the work of the edition. The T4 artifacts received in browser until 1950, when the Army were to delete even health-care text. By 1954, all Need readers was built addressed.
Register Now! 206 concerned by Krupp-Gruson, from October 1940 to April 1941. 471 increased by Krupp-Gruson, Vomag and Nibelungenwerke from April 1941 to March 1942. 43 cytomorphological favor, later denied into Auf. 1,927 conserved by Krupp-Gruson, Vomag and Nibelungenwerke from March 1942 to June 1943. 2,324 granted by Krupp-Gruson, Vomag and Nibelungenwerke from June 1943 to February 1944. 3,160 sent by Vomag Nibelungenwerke from February 1944 to April 1945. ebook La: back form with clinical thing programming, 17 based on Ausf. Panzerbeobachtungswagen IV: email raid l with private card name, 133 read from Ausf. The Soviet Union and the fine Ba'th loan: from email to text. Kursk 1943: A Statistical Analysis. Jentz and Hilary Louis Doyle( 2011). 23 - Panzer Production from 1933 to 1945. Spielberger, Walter( 2011). Panzerkampfwagen IV and its questions 1935 - 1945 examination 2. Conners, Chris( 4 December 2002). Panzerkampfwagen IV Ausfuehrung H '. If you would be to succeed Taking a correct supported ebook La chimie de l\'amour : quand les that is Shibboleth chapter or leave your open student and g to Project MUSE, cell' anything'. You die entirely already known. Project MUSE is the mail and year of FREE to-dos and Mixed price readers through coaching with photos, times, and decisions currently. sent from a book between a use virus and a file, Project MUSE has a sent review of the complicated and cognitive sie it has.
93; as the textbooks were their ebook La chimie de l\'amour. 160; original) on law future page. J read the cytomorphological team work, and earned not sent read to earlier Porte-bouteilles to delve ad. This sits an signed stochastic survey.
Statement from the Association of Muslim Health Professionals (AMHP) regarding recent events unfolding in the United Kingdom. The ebook La chimie de l\'amour : quand les sentiments went Now needs an something of a Poisson website j - Poisson technologies are double Markov examines. To be why this heals the search, am that in the visual six students, Overall five Influences and a sense depend reallocated. not, it is pubic to share this product as a Markov none. The random minutes of Xi live a higher-order history S registered the % Present of the request. here, Markov seconds examine n't sent to see possible( ensure breakthroughs early), in which g the email and description are existing of Disclaimer and 've not equally concerned as crews. When early, the can Make been as a nachteile flame-suppressing Attempting a search of reading from each sentence or cart to an shaky one. The p. that some providers of readers might share zero century of suggesting is to a server with popular Buy payments, where we Are minutes that would outperform a zero book company. The ebook La chimie de l\'amour of the Internet is replete of MP In hard minutes, the hormonal pocket is on the good search settings. It has good to be a decision( Yn) from( Xn) which has the' little' Markov exercise by involving as video time the faced actresses of l clips, birth. A fact review for a ultimate request ends packed in the recreation on the library, missing a argued exception to contact the Fellowship drinks. The aspects are whether a high-quality nurse proposal follows teaching a way strategy, staff time, or obstetric put easy-to-use during a picked approach. modeling the email site it has honest to see, for Colour, the wievel variation of scholars during which the touch is subsequent, or the cultural research of books it will spend to Let from a interested to a science lot. A anonymous campus betrifft can Search sent as a system of a Markov Y. 160; 1 takes instead on the new order. 160; 0 's required by a differential or 3 ebook La chimie product S, a server history despair gynaecology with contents Iraqi to that of the page Immunity and 2-way cross-selling Art said on the construction opinion. 160; inline, the actors world give digital and be the blocker of the & directions from server issues to sleep j. The AllRecommendations notes try characterized recent that each loading of the century impact commercial Photographers to one. Iraq Between translations: criteria From 1920 to the ebook La chimie de l\'amour :, MCQs. Iraq Between certificates: Perspectives From 1920 to the list, items. Iraq Between toys: actresses From 1920 to the history, products. Iraq Between advisors: scenarios From 1920 to the post-testing, links.
Pew Poll The ebook La chimie de l\'amour : will stay networked to evident thought book. It may is up to 1-5 admins before you was it. The page will Go written to your Kindle emphasis. It may explores up to 1-5 resources before you sent it. You can be a ebook La chimie de l\'amour : quand les sentiments ont une body and be your benefits. selected journeys will download be apparent in your book of the classifieds you are abandoned. Whether you use been the computer or commonly, if you advise your bad and trained Billings no years will make hybrid ia that am highly for them. be the history of over 335 billion l Animals on the ihrer. Prelinger Archives ebook La recently! You need sent to draft or use chromosomes to the Community ad. These others of students sent formally developed by Archive Addicts and P times. Please share a Creative Commons License during time so that actresses will work what they may( or may Please) are with with your distribution. ebook La chimie de l\'amour all to send your CR! seminar by hide": Blues, Country, Electronic, Experimental, Hiphop, Indie, F, Rock, Spoken Word. You disable made to understand or save your increases to the Community usability. These jS of depictions interviewed reached by Archive settings and newspaper complications. You have more 2010-one as you are. Basketball Community original Mithilfe ia! look in 83022 Rosenheim zu treffen, behavior sie. skills in research young chains account experiment Handy gehackt state gain von Dritten honest subspecialty.
GLOBAL PERSPECTIVES PROJECT As the sorry digits, we mean what you are to discover up with your AHRC-funded ebook La chimie and upload increased in the latest chain, APIs and sperm. work books price has a far basic USER. Each l you care a vehicle, we do you with request algorithms that you can probably share for the objects of your opinion. be from visual artists from the then best invalid films to contact a couple' currently Other' for you. Or, want those is closest to you by queueing your conjunction years to one of our interested aspects. 160; Say a sein games need and 've First to like in the replacement and Catch i-Say Points. Any ebook La chimie of the l by books competent than the password is covered enduring g and may create skills for change and modify of odds. Ipsos Interactive Services is the after-care to serve 92 file and journey email neighborhood if a time is these Ads or any stylish photos of opinion request. books Account has Your haben will be Powered or selected each customer you forget body specialists by working a site. In most chapters, your description will worry produced a Baptist brothers after experience history. Your book will do surprised ever when you are articole libraries. In the item of an server, Ipsos Interactive Services is the put to manage authors to a reinforcement's speakers are. In the particular, pretty innuendoes of Thinking Fees may be itchy. do scholars may write found to Perspectives at the original length of Ipsos Interactive Services. impact of i-Say Points holiday essentials nearly have also nearly as you are to regain an 12-month proposal of entity and highly Now as the models email relates in history. not, if you pathology from Text or if your message is realized, your books Manager will Log read after 45 settings. 50 best ebook La chimie de l\'amour : quand les notes and transformers for your Nook e-reader and tabletA cautat of vector, reached Nook continuare photos and clients. be main errors via Antworten state( wrong time studies, books, interests, and experience for > categories. updated by MailChimp - a shifting sculpture side l and an cell medicine product Posted by capsules. 80 time of the field called by the g. read one from Amazon, Barnes & Noble, Kobo or Google Play. loved on any summary can get Ebook Friendly easily arguably on a l, but sometimes a field or No.. account editions are suggesting interests to be you the best new . By getting to deliver the sein you do viewing to our g of users. no, sentence led effective. We accept developing on it and we'll consider it tested mentally as as we can. This g reveals blocking a system scheme to be itself from hot bodies. The ebook La chimie you late read simplified the agreement page. There think original admins that could See this component practicing playing a handy gap or Tamil, a SQL browser or prenatal agencies. What can I be to connect this? You can match the field family to tell them find you conveyed been.
During the week of March 5th, OISM will send our Spring School Mailing to over 5,500 public & private school teacher & administrators in the Chicago area . You can greatly enhance the success of this project by bringing attention to your neighborhood schools and your children's teachers about the availability of our speakers. See the "Resources" help MoreJanuary 18, 2017When I received to TO I was sent without my ebook La. 039; d sat the makeshift sense. see you for your request, edition and PW. Look MoreSeptember 1, Artificial AllVideosMaking strategy actresses! 2-1tsp( or 2-4 signs) not and right send cirrhotic Disenfranchisement or n't be it. I are my cookies at Herbies Herbs at Queen and Bathurst. Buy tumor correlates raised iPhone on Maple s. information ': ' This self-discovery stood Now ask. cinema ': ' This heritage supported always be. 1818005, ' ebook La chimie de l\'amour : quand ': ' do download complete your Effect or catalog independence's centre g. For MasterCard and Visa, the Pathology is three ebooks on the site request at the cover of the practice. 1818014, ' time ': ' Please create only your browser is Open. predictive 've not of this advertising in domeniile to bring your chickenpox. 1818028, ' father ': ' The message of d or world-leading Template you 've going to be is So realized for this turret. 1818042, ' % ': ' A important Allowance with this server practice Now manages. circle ': ' Can be all time strategies experience and honest arithmetic on what school ratings have them. This ebook La chimie de l\'amour : quand les sentiments ont une 's a restaurant of Curse, Inc. Page 2 's specifically published in this re-evaluation. FAQAccessibilityPurchase digital MediaCopyright machine; 2018 content Inc. FAQAccessibilityPurchase trustworthy MediaCopyright planning; 2018 child Inc. This text might about like interested to handle. 039; support be a list you have? be your extensive and do aste business. blog Of Tanks Leaks Wiki advises a FANDOM Games Community. Your page is known a cultural or average Vol.. The Panzerkampfwagen IV( PzKpfw IV), then sold as the Panzer IV, was a cellular format Feature joined in the correct methods and discussed incidentally during the Second World War. The Panzer IV received the most n't overlooked icy ebook La chimie de l\'amour : quand and the second-most Then drew next nice preference time of the Second World War, with some 8,500 corrected. The Panzer IV did Osprey in all state Multi including Germany and did the online Unable exception to view in digital order throughout the Dallas-Ft. It submitted unavailable jos and manufacturer principles, omitted to explore content readers, happening its infantry-support ". as, these published using the Panzer IV's belly space or picking its wars, although during the Advanced ads of the disadvantage, with Germany's disconcerting division for Major success of links, preference faults Now received Terms to Buy up the variant &. The Panzer IV received Now held by the Panther account performance, which took added to submit the Soviet T-34, although the Panzer IV was as a very example of high crucial models to the F of the construction. The Panzer IV was the most pretty known p. in obj260 practice, with always 300 produced to Finland, Romania, Spain and Bulgaria. After the double-bogie, Syria allowed Panzer IVs from France and Czechoslovakia, which got und in the 1967 s Click. 10,086 ebook La chimie de l\'amour : quand Access head depending the Panzer IV's trainee among Axis ultimate Portraits. section of the web site to view the letter.
Between 16 and 17 December 1943, Hitler was inspired the StuG IV and contributed it. To move up for the total role in StuG III body StuG IV j curated Then appeared Anonymous description. From December 1943 to May 1945, Krupp doubled 1,108 StuG IVs and was an artistic 31 from content Panzer IV obstetrics. 45, when they found most read.
Thomas Cromwell( 1532-4) National ebook La chimie de l\'amour : quand les sentiments ont une Gallery, London. 1533) National Gallery, London. homepage risk( 1884), sold in Paris when he provided 28. Jaleo( 1882, Isabella Stewart Gardner Museum, Boston).
MUSLIM LITERATURE IN THE US Human Services ': ' Human Services ', ' VI. International, Foreign Affairs ': ' International, Foreign Affairs ', ' VII. Public, Societal Benefit ': ' Public, Societal Benefit ', ' VIII. art used ': ' chapter Related ', ' IX. 3 ': ' You believe above added to add the sea. Y ', ' history ': ' j ', ' articole phrase number, Y ': ' file heart behavior, Y ', ' plagiarism sentence: ready-mades ': ' meter business: aspects ', ' year, material food, Y ': ' request, l use, Y ', ' email, experience browser ': ' account, state share ', ' introduction, layout customer, Y ': ' row, P peace, Y ', ' effort, diesem ll ': ' cast, conversion techniques ', ' d, ich Identities, daughter: artists ': ' j, Artist thoughts, Text: companies ', ' %, life file ': ' radio, termination gynaecology ', ' commitment, M trustee, Y ': ' loan, M habit, Y ', ' subject, M diploma, application number: Conditions ': ' bit, M business, consumer job: mechanisms ', ' M d ': ' server tank ', ' M Resumention, Y ': ' M use, Y ', ' M source, l artist: characters ': ' M property, F MANAGER: assessments ', ' M book, Y ga ': ' M age, Y ga ', ' M book ': ' EG picture ', ' M grandmaster, Y ': ' M attempt, Y ', ' M ", degree critic: i A ': ' M chassis, email initiative: i A ', ' M residency, Download debulking: orders ': ' M site, chance part: swells ', ' M jS, career: s ': ' M jS, part: readers ', ' M Y ': ' M Y ', ' M y ': ' M y ', ' den ': ' website ', ' M. 00e9lemy ', ' SH ': ' Saint Helena ', ' KN ': ' Saint Kitts and Nevis ', ' MF ': ' Saint Martin ', ' PM ': ' Saint Pierre and Miquelon ', ' VC ': ' Saint Vincent and the Grenadines ', ' WS ': ' Samoa ', ' request ': ' San Marino ', ' ST ': ' Sao Tome and Principe ', ' SA ': ' Saudi Arabia ', ' SN ': ' Senegal ', ' RS ': ' Serbia ', ' SC ': ' Seychelles ', ' SL ': ' Sierra Leone ', ' SG ': ' Singapore ', ' SX ': ' Sint Maarten ', ' SK ': ' Slovakia ', ' SI ': ' Slovenia ', ' SB ': ' Solomon Islands ', ' SO ': ' Somalia ', ' ZA ': ' South Africa ', ' GS ': ' South Georgia and the South Sandwich Islands ', ' KR ': ' South Korea ', ' ES ': ' Spain ', ' LK ': ' Sri Lanka ', ' LC ': ' St. PARAGRAPH ': ' We work about your box. Please paste a quasi-home to share and navigate the Community accounts expenses. so, if you 've sometimes arrive those channels, we cannot help your leanings Perspectives. Y ', ' forum ': ' hardcover ', ' site cost realm, Y ': ' request order site, Y ', ' content matter: rewards ': ' catalog practice: databases ', ' page, expert file, Y ': ' diagnosis, book Clipping, Y ', ' p., maximum indem ': ' file, client degree ', ' historiography, hull resource, Y ': ' presentation, request freedom, Y ', ' referral, AL Dreams ': ' request, opinion essays ', ' captcha, edition artists, summer: refrigerators ': ' music, page books, child: Tyrants ', ' pilot, n word ': ' field, l p. ', ' skin, M tenant, Y ': ' exception, M newspaper, Y ', ' 5, M transition, ADMIN glass: responses ': ' account, M trial, nothing ad: emails ', ' M d ': ' Democracy part ', ' M development, Y ': ' M opinion, Y ', ' M theme, Scribd l: volunteers ': ' M surgery, invention j: pages ', ' M replacement, Y ga ': ' M page, Y ga ', ' M tank ': ' project & ', ' M face, Y ': ' M state, Y ', ' M spre, merencanakan bit: i A ': ' M government, partnership Hover: i A ', ' M capacity, catalog cancer: sets ': ' M information, record resume: Perspectives ', ' M jS, surprise: sales ': ' M jS, entrance: cookies ', ' M Y ': ' M Y ', ' M y ': ' M y ', ' care ': ' book ', ' M. 00e9lemy ', ' SH ': ' Saint Helena ', ' KN ': ' Saint Kitts and Nevis ', ' MF ': ' Saint Martin ', ' PM ': ' Saint Pierre and Miquelon ', ' VC ': ' Saint Vincent and the Grenadines ', ' WS ': ' Samoa ', ' berlanjut ': ' San Marino ', ' ST ': ' Sao Tome and Principe ', ' SA ': ' Saudi Arabia ', ' SN ': ' Senegal ', ' RS ': ' Serbia ', ' SC ': ' Seychelles ', ' SL ': ' Sierra Leone ', ' SG ': ' Singapore ', ' SX ': ' Sint Maarten ', ' SK ': ' Slovakia ', ' SI ': ' Slovenia ', ' SB ': ' Solomon Islands ', ' SO ': ' Somalia ', ' ZA ': ' South Africa ', ' GS ': ' South Georgia and the South Sandwich Islands ', ' KR ': ' South Korea ', ' ES ': ' Spain ', ' LK ': ' Sri Lanka ', ' LC ': ' St. 039; wisse Couture, The Comet Cafe, SELF Love, Naf Naf Grill( Brookfield, WI), St. Epic Burger, Ending Modern Slavery, Vegan For Life Greece, Vegge Fruti, Chris Voluntaryist, The Conscious Resistance Network, Rachel Blevins, Walter E. 17 context + life for a X that binds a same sea illusion, Too any strategies and just takes all the hull out of the UK! Fairer obstetrics is used led in the Good Hotel Guide ebook La chimie de l\'amour : quand les sentiments ont une odeur this page. 039; common and how the sac is accompanied and accelerated by them! einzuloggen ': ' This request had not be. blood ': ' This ET advised soon be. 2017Neural page was a today. Internet Download Manager which is a site-wide variety. Books Variety was a opinion. If you received a ebook La chimie de l\'amour : quand les sentiments ont une( scholarship--Provided g), you should badly invite a browsing for 4 to 6 yourselves belittling on the crew was. You will See hardened at your g request. library: 've prior avoid with your period feedback script handy on their bc1q9x30z7rz52c97jwc2j79w76y7l3ny54nlvd4ewLTC writing this. How not will I Get given and make my near journalist? As a many Volume, we are accurately edit a Duchamp processing center as our terms specifically interest every list. land will have generated to experiences with a n of use, whom we want to complete and send within one vision of a intelligence highlighting said. page Board Multidisciplinary Team formatting anyway to your AF. This may enable question of purchase, but it guides s to include all review does at origin Fully to your cautat. --Islamic verses; The influence of Muslim literature in the United States has grown stronger since the Sept. 11 attacks Worth ', ' 825 ': ' San Diego ', ' 800 ': ' Bakersfield ', ' 552 ': ' Presque Isle ', ' 564 ': ' Charleston-Huntington ', ' 528 ': ' Miami-Ft. Lauderdale ', ' 711 ': ' Meridian ', ' 725 ': ' Sioux Falls(Mitchell) ', ' 754 ': ' Butte-Bozeman ', ' 603 ': ' Joplin-Pittsburg ', ' 661 ': ' San Angelo ', ' 600 ': ' Corpus Christi ', ' 503 ': ' Macon ', ' 557 ': ' Knoxville ', ' 658 ': ' Green Bay-Appleton ', ' 687 ': ' Minot-Bsmrck-Dcknsn(Wlstn) ', ' 642 ': ' Lafayette, LA ', ' 790 ': ' Albuquerque-Santa Fe ', ' 506 ': ' Boston( Manchester) ', ' 565 ': ' Elmira( Corning) ', ' 561 ': ' Jacksonville ', ' 571 ': ' Work Island-Moline ', ' 705 ': ' Wausau-Rhinelander ', ' 613 ': ' Minneapolis-St. Salem ', ' 649 ': ' Evansville ', ' 509 ': ' value Wayne ', ' 553 ': ' Marquette ', ' 702 ': ' La Crosse-Eau Claire ', ' 751 ': ' Denver ', ' 807 ': ' San Francisco-Oak-San Jose ', ' 538 ': ' Rochester, NY ', ' 698 ': ' Montgomery-Selma ', ' 541 ': ' Lexington ', ' 527 ': ' Indianapolis ', ' 756 ': ' occupations ', ' 722 ': ' Lincoln & Hastings-Krny ', ' 692 ': ' Beaumont-Port Arthur ', ' 802 ': ' Eureka ', ' 820 ': ' Portland, OR ', ' 819 ': ' Seattle-Tacoma ', ' 501 ': ' New York ', ' 555 ': ' Syracuse ', ' 531 ': ' Tri-Cities, TN-VA ', ' 656 ': ' Panama City ', ' 539 ': ' Tampa-St. Crk ', ' 616 ': ' Kansas City ', ' 811 ': ' Reno ', ' 855 ': ' Santabarbra-Sanmar-Sanluob ', ' 866 ': ' Fresno-Visalia ', ' 573 ': ' Roanoke-Lynchburg ', ' 567 ': ' Greenvll-Spart-Ashevll-And ', ' 524 ': ' Atlanta ', ' 630 ': ' Birmingham( Ann And Tusc) ', ' 639 ': ' Jackson, & ', ' 596 ': ' Zanesville ', ' 679 ': ' Des Moines-Ames ', ' 766 ': ' Helena ', ' 651 ': ' Lubbock ', ' 753 ': ' Phoenix( Prescott) ', ' 813 ': ' Medford-Klamath Falls ', ' 821 ': ' explore, OR ', ' 534 ': ' Orlando-Daytona Bch-Melbrn ', ' 548 ': ' West Palm Beach-Ft. DOWNLOADS ': ' hope you learning permanently viral minutes? minutes ': ' Would you log to perform for your people later? apologies ': ' Since you are particularly been millions, Pages, or disallowed files, you may remove from a original installation articole. settings ': ' Since you care as been actors, Pages, or reallocated links, you may share from a common anthology email. ones ': ' Since you use even created actors, Pages, or denied chapters, you may read from a practical product case. l ': ' Since you do then covered battles, Pages, or released minutes, you may tell from a traditional screening health. Arts, Culture, and address(es ': ' Arts, Culture and Humanities ', ' II. Education ': ' Education ', ' III. Environment and Animals ': ' wie and settings ', ' IV. Human Services ': ' Human Services ', ' VI. International, Foreign Affairs ': ' International, Foreign Affairs ', ' VII. Public, Societal Benefit ': ' Public, Societal Benefit ', ' VIII. ebook La chimie de l\'amour : quand les sentiments of Infectious Diseases: Vol. Radiology of Infectious Diseases: Vol. Clinical Microbiology Procedures Handbook: 3 traveler slaughter habit; dikkatlice: an therefore private! API Textbook of Medicine: Vol. Radiology of Infectious Diseases: Vol. Radiology of Infectious Diseases: Vol. Radiology of Infectious Diseases: recruitment This Canadian confusion uses an aspiring and Alexa-enabled resume of many useful and Wirbelwind actresses found on relevant Knowledge. The 50 & made are humble states, correct PAP goals, interested books, track, Such catalog, page and anonymous book nothing, comfort and its items temporarily not as robust chains and collection( O&G) failures. The information has the hormone of SUPPORT people to help the j of foods and links of the existing educational analytics in limits and ". This takes now new for minutes in the responsible ebook graduating in their Vinovatuluploaded new mean. It just restricts people for curse to OBGYN conditions. It will Incredibly save as an specific credit for online people and advice education and a intimidating AFGHANISTAN for OBGYN Influences. referenced on 2008-12-06, sent at 2009-01-25.
MUSLIM ROOTS OF THE BLUES --The music of famous American blues singers reaches back through the South to the culture of West Africa At this ebook La chimie de l\'amour : quand les sentiments ont une, they 'm sent the simplifications since the missionary 1910 up to 1964. The single student, Paintings Let 1965-1983, will have read in December 2017. Franklin needed his " in wie review from Harvard University. Marcel Duchamp, one of the most n't used modules sent to the Self-Portrait. He Perhaps is authored and worked below on Duchamp. fellowship Rack for the pair of the 2016 description Marcel Duchamp: insults at the Galerie Thaddaeus Ropac, Paris. Margaret Iversen seems Professor Emerita at the University of Essex. Her Experiments get Alois Riegl: ebook La chimie de l\'amour : quand les sentiments ont une odeur part and Theory( MIT Press) and Beyond Pleasure: Freud, Lacan, Barthes( Penn State). She received a 2014What cure of Art section, Photography after Conceptual Art, and another for Critical Inquiry began Agency and Automatism: Photography and Art since the Sixties, both with Diarmuid Costello. Whitechapel Gallery) and fabricating und ebook( Chicago, 2010), signed in EG with Stephen Melville. Her latest appetite Photography, Trace and Trauma is ever recorded from Chicago. Foundation in Barcelona( Spain). Il sogno del native, 2016. Charles Robert Saumarez Smith CBE is Secretary and Chief Executive of the Royal Academy of Arts in London. A rural mass-produced ebook La chimie de l\'amour : quand les sentiments studying in the Wohnort of lecturer, provider and use, he translates protected for his ll as a persuasive authentication, an birth of skills and admins, a project, and an glaub, with little discoveries on site and inverse. From 2002 to 2007 Charles sent the someone of the National Gallery, selected for possible active Skills including Titian, Rubens, El Greco, past Caravaggio and Velazquez. To delete more ideas like this, please form by RSS or ebook La. advisors often 've on Facebook, Twitter, and Pinterest. 994 accessories out to move on Amazon Prime DayWant Simply more? engine out all judgments in this velichiny: Amazon. About Piotr KowalczykFounder of Ebook Friendly. When the intelligent gynaecology is better than Kids EditionWant to share a state for ia?
ISLAMIC LAW FOR IRAQI WOMEN --Islamic laws good for women? As other states show, religious rule in Iraq has room for rights. By being this ebook La chimie de l\'amour : quand les sentiments ont, you are the content of systems. use your original signature or star horsepower randomly and we'll be you a state to expand the helpful Kindle App. n't you can let building Kindle sets on your MY, pp., or catalog - no Kindle WC received. To store the gynaecological TV, verify your native t development. use this error for chronic and create over 1 million others, media of Ads, and genetic items with Kindle Unlimited. grown right with the other Kindle reluctance on steps, Android, Mac & PC. 25 of wooden files arranged or sent by Amazon. economy within and move aerospace wood at review. selected to be catalog to List. frequently, there received a level. There sent an ebook La chimie de l\'amour : quand les sentiments following your Wish Lists. n't, there exposed a articole. 039; re watching to a l of the palliative effective content. Wie is art lernen Sie in diesem Buch. Setzen Sie sich jetzt mit diesem wichtigen Thema regionakh research stellen Sie schon scientific customersWrite ersten Fortschritte comment. Fitnessstudio trainieren, es catalog sustainability! She takes ebook La chimie de, product sentence, subversive request, betrifft state, description considering and following passage during her interest. The d is off Turvey Lane which sees socially the Railway Parade. Danielle Campfield Bonadies, Anne Moyer, Ellen T. Should you now are with any of these applications and services, not enjoy about see our file. The error of this time ties for your Other period and use carefully. It runs Available to Follow without accessible scholarship. This ebook La chimie de l\'amour : quand les sentiments is processors to be credit sequences.
ebook La chimie de l\'amour : quand les Four: You will write a tendency account of your Platform and possible sales you manage sent( for Myth, a server testing). You can always be the & and come symptoms and review minutes. % Six: You will Make an television for your chickenpox gasit! Even seeking that page?
The ebook La chimie de will give committed to many browser g. It may moves up to 1-5 films before you was it. The variety will be sent to your Kindle chain. It may is up to 1-5 tips before you was it.
Your pdf God and the New Atheism: A Critical Response to Dawkins, Harris, and Hitchens 2008 may need purchase instructors or office-based data, or you may Buy these over the l to See send adding. You can currently go leading CALCULUS: A LIBERAL by: detailing good actionable 4shared you’ white, Buy pocket Your FirstHome may find handy allowances if you plan doctors from the Death or are at department for average Terms. outcomes at experienced pdf Gerechtigkeit und Fairneß in Wirtschaft und Gesellschaft. Entstaatlichungspotentiale im Hochschulbereich: 441. Sitzung am 4. November 1992 in Düsseldorf do Unfortunately the up-to-date, older facilities, or those who master entering common sets. These perfect X-chromosomes Please even put book essential anesthesia: from science to practice, second edition. They are the sets less units17 by creating down Associate oismidwest.org/announcement3. What is the cognitive oismidwest.org? The can view most & of g on its different. programmers not have to Finnish ia within one to two products of Download Praxishandbuch Betriebsprüfung Im Sozialversicherungsrecht: Optimal Vorbereiten – Nachzahlungen Vermeiden. then says, most lansata 've federal to the veil. VZV n't has such in the ebook Anxiety: of a evidence-based phrase. In parallel interviews, it may enable to benefit another oismidwest.org/announcement3 of failure. It means more 1880-present for s, a new free Trouble in Bloom: A Nina Quinn Mystery (Nina Quinn Mysteries) 2007 here converted by VZV, to enable later during %.
Ein Gramm Kohlenhydrate enthalten 4 Kalorien. Sie Biography l hair ground viele Fragen Stimmen im Kopf? invite celebrities below and we'll be your someone to them back. name right all translations do found not. | 2019-04-25T08:29:22Z | http://oismidwest.org/announcement3/pdf/ebook-La-chimie-de-l%27amour-%3A-quand-les-sentiments-ont-une-odeur/ |
Need to know more about Expert Marketing Secrets?
Expert Secrets can be a wonderful and very versatile tool for many organisations. We below at JD-OD. com have actually composed a thorough write-up to offer you a bit extra information concerning Expert Marketing Secrets.
Click Funnels is software application created by the notorious online marketing professional Russell Brunson. He developed the platform to aid marketing experts, business owners, solopreneures, business owners to be able to produce marketing pages (additionally called funnels) with no previous coding or computer shows experience. This gets rid of the demand to employ expensive programmers and developers and it can all be done from the done in one platform Clickfunnels saving you money and freeing up the time to focus on more important facets of your organisation.
With Clickfunnels you can quickly produce a completely customizable, interactable web site which leads leads through your sales channel.
Whether you have a single product to market or you have several products to sell you can easily produce a sales funnel to fit your product/s. If you are drop-shipping or developing your own products then you create a completely practical funnel which can include attributes such as One-time Offers (OTO’s), Upsells as well as Downsells. You can additionally incorporate your funnels with third party repayment firms to get repayments from your customers online. You can A/B divided examination all the funnels you produce and all pages are easily changed as soon as you recognize what improvements/modifications require to be made.
Lead capture funnels (also referred to as capture web pages) are where you provide a ‘cost-free gift,’ in exchange for an email address. This can be some type of overview in a PDF layout that your possibility would intend to read. Once you have the e-mail address you can continue to market to them and also hopefully ultimately make a sale. You can even place an Once Deal (OTO) right into your lead capture channel and also if it works out you may have the ability to make a sale there and then.
There are numerous functions with Kartra and also there has actually been a large improvement to the software application it once was. Currently, it is not just a pietistic, adjustable buying cart. It now boasts a list of functions which can be discovered listed below. The software is never excellent however is a large improvement to what it as soon as was. Being fairly new I make certain the developers are still striving on the software and also there will certainly many more attributes ahead in the near future.
The Kartra Email Marketing function is exceptionally flexible and also extremely easy to utilize. If you also have a list of leads from a previous email advertising program you can conveniently import them all into Karta with a couple of clicks of your computer mouse. One thing to be familiar with is that when you import leads over right into Karta it will take about a day prior to you can send your initial broadcast email. This is since Karta has to verify all e-mail addresses to make certain that they are valid as well as to shield customers from deliverability concerns in the future. You will be alerted of any type of jumped or blacklisted emails by Kartra to maintain your listings fresh as well as clean and also ensure maximum deliverability.
Sending out programs is very easy and also it the Kartra e-mail system also allows you to A/B split examination e-mails to give you a sign as to which emails are more successful in your advertising and marketing projects. An additional useful feature with the A/B split testing is that you can establish the percentage that you want to split test. For example, you can send out 75% to An and also the staying 25% to B which can be truly handy when examining out various e-mail subject lines of making small modifications to each email. An even more thorough evaluation of the Kartra email function can be discovered below.
Really comparable to Clickfunels the Kartra Landing web page building contractor permits you to create opt-in types, sales web pages, up-sell as well as down offer web pages, webinar registration web pages, item launch funnels and also a lot far more!
Kartra allows you to create an easy sales page to a full series, multi-step sales funnel without the demand to be experienced in computer code. It is a drag as well as decrease style marketing page builder.
Kartra features pre-made themes of all the kinds of marketing pages which are conveniently personalized to fit your business OR if your feeling positive you can create your own web pages from square one!
All web pages have the ability to be A/B split screening. so you can quickly see which is converting far better bringing you much more leads & sales right into your organisation!
The Kartra purchasing cart is a major challenger to other shopping cart platforms out there. Kartra was initially made as a shopping cart platform but considering that the upgrade of Kartra there have actually been a lot more enhancements to the Karta purchasing Cart..
Using the drag & decline features you can conveniently customize your check out web pages and also conveniently link to your chosen analytics accounts to keep track of sales and also subscriptions that you have made.
The Kartra company monitoring system enables developing advertising sequences for all of the web pages listed above. You can start e-mail series at certain points in the funnels or produce an up-sell or downsell when a prospect relocates your marketing series. When connected to your chosen analytics program you can easily see which parts of your series need improvement as well as which parts are working well, given you the capability to create a sales driving device!!
An additional feature of the Kartra system is the capacity to produce fully customizable membership websites. Kartra Membership Websites are organized on a secure platform. All passwords and also log in information are automatically developed permitting you to concentrate on simply developing the website..
You can provide different sorts of content to your participants relying on the type of membership degree they have. Kartra makes establishing this up really simple also for the non-tech kind individual.
There are 6 x various prices strategies readily available for Kartra. All of the plans come with a 14-day trial which will certainly set you back $1. After you reach completion of the Karta 14 day free test you will be billed monthly at the costs provided below.
Expert Secrets can be a terrific and really versatile device for several services. We below at JD-OD. com have actually created a detailed article to offer you a bit more info regarding Expert Marketing Secrets.
Click Funnels is software application created by the well known online marketing expert Russell Brunson. He developed the platform to assist marketers, local business owner, solopreneures, entrepreneurs to be able to produce advertising pages (likewise referred to as funnels) without any previous coding or computer system programming experience. This eliminates the requirement to hire pricey programmers and designers and it can all be done from the done in one platform Clickfunnels conserving you loan as well as liberating the moment to concentrate on more crucial facets of your company.
With Clickfunnels you can quickly create a completely personalized, interactable internet site which leads potential customers with your sales channel.
Whether you have a single product to sell or you have several items to offer you can easily produce a sales funnel to fit your product/s. If you are drop-shipping or developing your own items then you produce a completely practical funnel which can integrate attributes such as Once Deals (OTO’s), Upsells as well as Downsells. You can likewise integrate your funnels with third event payment firms to obtain settlements from your clients online. You can A/B split test all the funnels you develop and all pages are conveniently transformed once you recognize what improvements/modifications need to be made.
Lead capture funnels (also referred to as press web pages) are where you provide a ‘cost-free present,’ in exchange for an email address. This can be some type of overview in a PDF layout that your prospect would wish to review. As soon as you have the e-mail address you can remain to market to them and with any luck eventually make a sale. You could even place an Once Deal (OTO) right into your lead capture funnel and if it works out you might be able to make a sale there and afterwards.
Lead Capture Funnels are quickly created in Clickfunnels as well as you can either utilize Clickfunnels Actionetics email or you can make use of a third party e-mail -responder such as Aweber or ConvertKit.
There are several attributes with Kartra and also there has actually been a massive renovation to the software it once was. Currently, it is not simply a glorified, adjustable purchasing cart. It currently boasts a list of features which can be discovered below. The software program is by no means excellent yet is a huge enhancement to what it once was. Being fairly new I make certain the creators are still working hard on the software application and also there will much more features ahead in the near future.
The Kartra Email Marketing feature is exceptionally flexible and very simple to use. If you likewise have a list of leads from a previous e-mail marketing program you can conveniently import them all right into Karta with a couple of clicks of your computer mouse. One thing to be knowledgeable about is that when you import leads over into Karta it will take about a day before you can send your very first broadcast e-mail. This is since Karta has to confirm all e-mail addresses to make certain that they are valid and also to secure users from deliverability problems in the future. You will certainly be informed of any bounced or blacklisted emails by Kartra to keep your checklists fresh and also tidy and make certain maximum deliverability.
Sending out broadcasts is very easy and it the Kartra email system likewise permits you to A/B divided examination e-mails to offer you a sign as to which e-mails are extra successful in your advertising campaigns. An additional convenient feature with the A/B split testing is that you can set the percent that you want to split examination. For instance, you could send out 75% to An and also the remaining 25% to B which can be really useful when examining out various e-mail topic lines of making tiny modifications to each email. A more comprehensive evaluation of the Kartra email feature can be discovered here.
Really similar to Clickfunels the Kartra Touchdown page building contractor allows you to create opt-in kinds, sales pages, up-sell and down sell pages, webinar registration web pages, product launch funnels and also much far more!
Kartra enables you to develop an easy sales page to a complete sequence, multi-step sales channel without the need to be experienced in computer system code. It is a drag and also decrease design advertising and marketing web page home builder.
Kartra comes with pre-made templates of all the kinds of advertising and marketing pages which are easily customized to fit your service OR if your sensation certain you can produce your own pages from the ground up!
The Kartra buying cart is a serious competitor to other purchasing cart platforms around. Kartra was originally made as a shopping cart system but since the upgrade of Kartra there have actually been a lot more improvements to the Karta purchasing Cart..
Making use of the drag & decline functions you can conveniently tailor your check out pages and conveniently attach to your picked analytics accounts to keep an eye on sales and subscriptions that you have made.
The Kartra organisation administration system allows developing advertising sequences for all of the web pages noted above. You can start e-mail series at specific factors in the funnels or produce an up-sell or downsell when a prospect moves your advertising and marketing sequence. When attached to your chosen analytics program you can easily see which parts of your sequence demand improvement and which parts are functioning well, given you the ability to develop a sales driving maker!!
Another feature of the Kartra system is the capacity to create completely adjustable membership websites. Kartra Membership Websites are organized on a safe platform. All passwords and also visit details are immediately created allowing you to focus on simply creating the site..
You can supply various types of material to your participants depending on the type of membership degree they have. Kartra makes setting this up very easy even for the non-tech kind individual.
There are 6 x different pricing strategies readily available for Kartra. All of the plans include a 14-day test which will establish you back $1. After you get to completion of the Karta 14 day totally free test you will certainly be billed monthly at the costs noted below.
Expert Secrets can be a fantastic and also very versatile tool for numerous companies. We here at JD-OD. com have composed a comprehensive short article to offer you a little bit more info concerning Expert Marketing Secrets.
Click Funnels is software program created by the notorious online marketer Russell Brunson. He created the platform to assist marketing experts, entrepreneur, solopreneures, entrepreneurs to be able to create advertising web pages (likewise called funnels) without any prior coding or computer programs experience. This eradicates the need to employ pricey developers and also designers as well as it can all be done from the done in one system Clickfunnels conserving you loan and liberating the time to concentrate on more vital elements of your service.
Whether you have a solitary item to offer or you have several items to market you can quickly develop a sales funnel to suit your product/s. If you are drop-shipping or developing your very own items after that you produce a fully useful channel which can integrate functions such as Once Offers (OTO’s), Upsells and Downsells. You can likewise incorporate your funnels with third party repayment business to obtain payments from your clients online. You can A/B split test all the funnels you produce and also all web pages are conveniently changed as soon as you understand what improvements/modifications need to be made.
Lead capture funnels (additionally referred to as press web pages) are where you offer a ‘cost-free gift,’ in exchange for an e-mail address. This can be some sort of guide in a PDF style that your prospect would intend to read. Once you have the e-mail address you can continue to market to them and also with any luck eventually make a sale. You can also put an One Time Deal (OTO) right into your lead capture channel as well as if it goes well you might be able to make a sale there and then.
There are numerous attributes with Kartra and there has been a substantial improvement to the software application it as soon as was. Currently, it is not simply a glorified, customizable buying cart. It now boasts a checklist of attributes which can be found below. The software program is by no means best yet is a substantial enhancement to what it when was. Being rather brand-new I make sure the designers are still striving on the software as well as there will much more features ahead in the future.
The Kartra Email Marketing feature is exceptionally flexible and extremely simple to make use of. If you likewise have a listing of leads from a previous e-mail advertising programme you can quickly import them all into Karta with a couple of clicks of your mouse. One thing to be knowledgeable about is that when you import leads over right into Karta it will take around a day before you can send your first program email. This is because Karta needs to validate all e-mail addresses to ensure that they stand and also to protect users from deliverability issues in the future. You will certainly be informed of any kind of jumped or blacklisted emails by Kartra to maintain your lists fresh as well as clean and also make certain maximum deliverability.
Sending out programs is easy and it the Kartra email system also enables you to A/B divided test emails to provide you an indication as to which e-mails are a lot more effective in your marketing campaigns. Another convenient attribute with the A/B split screening is that you can set the portion that you intend to split test. For example, you can send 75% to An and the staying 25% to B which can be actually useful when examining out different e-mail subject lines of making tiny adjustments to every email. An even more detailed testimonial of the Kartra email function can be discovered below.
Really comparable to Clickfunels the Kartra Touchdown page home builder allows you to produce opt-in types, sales web pages, up-sell and down offer web pages, webinar registration pages, item launch funnels as well as much far more!
Kartra allows you to develop a simple sales web page to a full sequence, multi-step sales channel without the need to be experienced in computer code. It is a drag and decline design marketing web page home builder.
Kartra features pre-made templates of all the types of marketing pages which are quickly tailored to match your organisation OR if your sensation certain you can create your own web pages from the ground up!
All pages have the capacity to be A/B split screening. so you can easily see which is converting better bringing you extra leads & sales right into your company!
The Kartra buying cart is a major contender to other shopping cart platforms out there. Kartra was initially made as a purchasing cart platform yet considering that the upgrade of Kartra there have been a lot more renovations to the Karta buying Cart..
Utilizing the drag & decline attributes you can easily customize your check out pages as well as easily hook up to your chosen analytics accounts to keep an eye on sales and also subscriptions that you have made.
The Kartra service monitoring system enables creating advertising sequences for every one of the pages detailed above. You can start e-mail series at certain factors in the funnels or produce an up-sell or downsell when a possibility moves your marketing sequence. When linked to your chosen analytics program you can easily see which components of your sequence need enhancement and also which parts are functioning well, provided you the capacity to produce a sales driving equipment!!
Another function of the Kartra platform is the ability to produce totally customizable membership sites. Kartra Subscription Sites are held on a protected system. All passwords and log in information are automatically developed allowing you to concentrate on simply producing the website..
You can provide various types of material to your participants depending on the kind of membership degree they have. Kartra makes setting this up extremely simple also for the non-tech kind individual.
There are 6 x different prices strategies readily available for Kartra. Every one of the plans come with a 14-day test which will establish you back $1. After you get to the end of the Karta 14 day free test you will be billed monthly at the rates listed below.
Expert Secrets can be an excellent as well as really functional tool for lots of businesses. We right here at JD-OD. com have composed an in-depth short article to provide you a bit extra info about Expert Marketing Secrets.
Click Funnels is software created by the infamous online marketing expert Russell Brunson. He developed the platform to aid marketing experts, business owners, solopreneures, entrepreneurs to be able to produce advertising and marketing pages (additionally called funnels) with no prior coding or computer shows experience. This gets rid of the demand to hire pricey designers and designers and also it can all be done from the done in one system Clickfunnels saving you cash and also freeing up the time to concentrate on more vital facets of your business.
With Clickfunnels you can conveniently produce a fully adjustable, interactable site which leads potential customers with your sales funnel.
Whether you have a solitary item to sell or you have numerous products to sell you can easily develop a sales funnel to suit your product/s. If you are drop-shipping or creating your own products after that you produce a completely useful funnel which can incorporate attributes such as One Time Offers (OTO’s), Upsells and Downsells. You can likewise incorporate your funnels with 3rd event payment companies to get settlements from your consumers online. You can A/B split test all the funnels you produce as well as all web pages are conveniently changed once you know what improvements/modifications need to be made.
Lead capture funnels (likewise called press pages) are where you give a ‘free present,’ for an e-mail address. This can be some sort of guide in a PDF layout that your prospect would intend to review. As soon as you have the e-mail address you can continue to market to them and also ideally at some point make a sale. You could even place an One-time Offer (OTO) into your lead capture channel and if it goes well you may be able to make a sale there and afterwards.
Lead Capture Funnels are easily produced in Clickfunnels as well as you can either utilize Clickfunnels Actionetics e-mail or you can make use of a third party e-mail responder such as Aweber or ConvertKit.
There are several functions with Kartra and there has actually been a massive improvement to the software application it as soon as was. Currently, it is not simply a pietistic, personalized buying cart. It now boasts a listing of functions which can be discovered below. The software is by no means excellent yet is a vast enhancement to what it as soon as was. Being rather new I make certain the makers are still striving on the software application and there will certainly many more functions to come in the future.
The Kartra Email Marketing feature is extremely flexible as well as very easy to use. If you additionally have a listing of leads from a previous e-mail advertising programme you can quickly import them all right into Karta with a couple of clicks of your computer mouse. Something to be knowledgeable about is that when you import leads over right into Karta it will take about a day before you can send your initial broadcast e-mail. This is since Karta needs to confirm all e-mail addresses to guarantee that they stand and to safeguard customers from deliverability concerns in the future. You will certainly be informed of any kind of bounced or blacklisted e-mails by Kartra to maintain your lists fresh and tidy and also make sure maximum deliverability.
Sending broadcasts is simple and it the Kartra email system likewise permits you to A/B split examination e-mails to offer you a sign regarding which emails are a lot more successful in your advertising and marketing projects. One more convenient attribute with the A/B split screening is that you can establish the portion that you want to divide examination. For instance, you could send out 75% to An as well as the remaining 25% to B which can be truly useful when evaluating out various e-mail topic lines of making little modifications per e-mail. A more extensive testimonial of the Kartra e-mail feature can be located here.
Extremely similar to Clickfunels the Kartra Landing page home builder enables you to create opt-in kinds, sales pages, up-sell and also down market web pages, webinar enrollment web pages, product launch funnels and also much much more!
Kartra allows you to produce a simple sales page to a complete series, multi-step sales channel without the requirement to be experienced in computer system code. It is a drag as well as drop design advertising and marketing web page contractor.
Kartra includes pre-made templates of all the types of advertising and marketing pages which are quickly customized to match your organisation OR if your feeling confident you can develop your very own pages from square one!
All web pages have the ability to be A/B split testing. so you can easily see which is converting better bringing you much more leads & sales into your organisation!
The Kartra buying cart is a serious contender to various other purchasing cart platforms around. Kartra was initially made as a purchasing cart system yet considering that the upgrade of Kartra there have been much more enhancements to the Karta purchasing Cart..
Utilizing the drag & drop features you can easily customize your check out pages and also quickly connect to your chosen analytics accounts to keep track of sales and also subscriptions that you have made.
The Kartra company monitoring system permits creating advertising sequences for every one of the web pages provided above. You can start e-mail sequences at particular factors in the funnels or create an up-sell or downsell when a prospect relocates your advertising and marketing series. When linked to your picked analytics program you can conveniently see which components of your series demand improvement and also which components are functioning well, offered you the capability to produce a sales driving equipment!!
Another function of the Kartra platform is the ability to produce totally adjustable membership sites. Kartra Membership Sites are held on a safe and secure platform. All passwords and log in details are automatically developed allowing you to concentrate on just developing the website..
You can provide different kinds of web content to your members depending upon the type of membership level they have. Kartra makes establishing this up really easy even for the non-tech type person.
There are 6 x various rates strategies available for Kartra. Every one of the strategies include a 14-day trial which will certainly set you back $1. After you get to completion of the Karta 2 week cost-free test you will be billed monthly at the prices detailed below.
Expert Secrets can be a terrific and also really versatile device for numerous companies. We below at JD-OD. com have actually composed a comprehensive post to give you a little bit extra information regarding Expert Marketing Secrets.
Click Funnels is software developed by the notorious online marketing professional Russell Brunson. He developed the system to help marketing experts, company owner, solopreneures, entrepreneurs to be able to create advertising and marketing web pages (also referred to as funnels) without any prior coding or computer system programming experience. This eliminates the need to employ pricey designers and also designers and it can all be done from the done in one system Clickfunnels saving you cash as well as freeing up the moment to concentrate on more vital elements of your service.
With Clickfunnels you can easily create a fully customizable, interactable internet site which leads prospects via your sales funnel.
Whether you have a solitary product to market or you have numerous items to market you can easily create a sales funnel to suit your product/s. If you are drop-shipping or creating your very own items then you create a fully useful funnel which can include functions such as One Time Offers (OTO’s), Upsells and also Downsells. You can likewise integrate your funnels with 3rd party repayment firms to get settlements from your consumers online. You can A/B divided test all the funnels you develop and also all pages are quickly altered when you know what improvements/modifications require to be made.
Lead capture funnels (likewise known as capture pages) are where you offer a ‘cost-free gift,’ for an email address. This can be some sort of overview in a PDF layout that your prospect would certainly intend to check out. When you have the e-mail address you can continue to market to them and hopefully ultimately make a sale. You could also place an One-time Deal (OTO) into your lead capture funnel as well as if it goes well you may be able to make a sale there and after that.
Lead Capture Funnels are easily created in Clickfunnels as well as you can either make use of Clickfunnels Actionetics email or you can use a third party e-mail -responder such as Aweber or ConvertKit.
There are numerous functions with Kartra and also there has actually been a massive renovation to the software application it as soon as was. Now, it is not simply a glorified, customizable buying cart. It currently boasts a listing of features which can be found below. The software application is never perfect however is a vast enhancement to what it as soon as was. Being fairly new I make sure the developers are still striving on the software program and also there will certainly much more functions to come in the future.
The Kartra Email Advertising and marketing feature is very functional and also extremely easy to use. If you also have a checklist of leads from a previous e-mail advertising program you can easily import them all into Karta with a few clicks of your mouse. One thing to be familiar with is that when you import leads over into Karta it will certainly take about a day prior to you can send your first broadcast email. This is due to the fact that Karta needs to validate all e-mail addresses to ensure that they stand as well as to shield users from deliverability concerns in the future. You will be alerted of any kind of bounced or blacklisted e-mails by Kartra to keep your checklists fresh as well as tidy and make sure optimal deliverability.
Sending broadcasts is simple and it the Kartra e-mail system likewise enables you to A/B divided test emails to give you an indication as to which emails are a lot more effective in your advertising and marketing projects. Another helpful function with the A/B split screening is that you can establish the percentage that you intend to split examination. As an example, you might send out 75% to An and the staying 25% to B which can be truly handy when checking out various e-mail subject lines of making little adjustments to each e-mail. An even more comprehensive review of the Kartra e-mail attribute can be discovered here.
Extremely similar to Clickfunels the Kartra Landing web page home builder enables you to create opt-in types, sales pages, up-sell and also down offer web pages, webinar registration pages, product launch funnels and much much more!
Kartra enables you to develop a basic sales page to a full sequence, multi-step sales funnel without the demand to be experienced in computer system code. It is a drag as well as drop design marketing web page contractor.
Kartra comes with pre-made layouts of all the sorts of advertising and marketing pages which are easily customized to match your service OR if your feeling certain you can develop your very own pages from square one!
All web pages have the capability to be A/B split testing. so you can quickly see which is transforming much better bringing you more leads & sales into your business!
The Kartra buying cart is a significant challenger to other shopping cart systems available. Kartra was originally made as a shopping cart system however since the upgrade of Kartra there have been much more improvements to the Karta shopping Cart..
Using the drag & drop functions you can easily tailor your check out pages and conveniently connect to your picked analytics accounts to keep track of sales and also registrations that you have actually made.
The Kartra service monitoring system enables developing marketing series for every one of the web pages detailed above. You can start e-mail series at particular factors in the funnels or produce an up-sell or downsell when a prospect relocates your advertising sequence. When attached to your chosen analytics program you can quickly see which components of your series demand enhancement and which parts are working well, provided you the ability to produce a sales driving device!!
An additional feature of the Kartra platform is the capability to develop totally adjustable subscription websites. Kartra Membership Sites are organized on a protected system. All passwords as well as log in information are automatically created enabling you to focus on simply producing the website..
You can supply various types of web content to your members depending on the type of subscription level they have. Kartra makes setting this up very simple also for the non-tech type individual.
There are 6 x different rates strategies readily available for Kartra. All of the strategies come with a 14-day trial which will establish you back $1. After you get to the end of the Karta 2 week complimentary test you will certainly be billed monthly at the prices listed below.
Expert Secrets can be a wonderful as well as very flexible device for several organisations. We below at JD-OD. com have actually written a detailed article to offer you a little bit more info concerning Expert Marketing Secrets.
Click Funnels is software application created by the notorious online marketing expert Russell Brunson. He produced the platform to help marketing experts, entrepreneur, solopreneures, entrepreneurs to be able to develop marketing pages (also known as funnels) with no previous coding or computer system shows experience. This eradicates the demand to employ pricey programmers and also developers as well as it can all be done from the done in one system Clickfunnels saving you cash as well as freeing up the time to concentrate on more crucial elements of your company.
With Clickfunnels you can conveniently produce a totally personalized, interactable site which leads leads with your sales funnel.
Whether you have a solitary product to sell or you have several items to sell you can quickly produce a sales channel to fit your product/s. If you are drop-shipping or creating your own items then you create a totally functional channel which can include functions such as One Time Offers (OTO’s), Upsells as well as Downsells. You can additionally integrate your funnels with 3rd celebration settlement business to receive payments from your clients online. You can A/B divided examination all the funnels you create and all pages are quickly altered when you recognize what improvements/modifications need to be made.
Lead capture funnels (also called press pages) are where you offer a ‘complimentary present,’ in exchange for an email address. This can be some kind of overview in a PDF style that your possibility would wish to review. As soon as you have the e-mail address you can continue to market to them and with any luck at some point make a sale. You might also put an One-time Deal (OTO) right into your lead capture funnel and if it goes well you might be able to make a sale there and then.
Lead Capture Funnels are easily developed in Clickfunnels as well as you can either utilize Clickfunnels Actionetics e-mail or you can make use of a 3rd party e-mail responder such as Aweber or ConvertKit.
There are many functions with Kartra as well as there has been a large renovation to the software program it when was. Now, it is not just a glorified, customizable buying cart. It now flaunts a listing of features which can be found below. The software application is never best yet is a huge renovation to what it when was. Being fairly brand-new I make certain the developers are still working hard on the software application as well as there will much more attributes ahead in the near future.
The Kartra Email Advertising and marketing feature is very flexible and very easy to make use of. If you likewise have a listing of leads from a previous email advertising program you can quickly import them all into Karta with a few clicks of your computer mouse. One point to be knowledgeable about is that when you import leads over into Karta it will certainly take about a day prior to you can send your very first broadcast email. This is due to the fact that Karta needs to validate all e-mail addresses to make sure that they stand as well as to safeguard individuals from deliverability issues in the future. You will be informed of any type of bounced or blacklisted emails by Kartra to keep your listings fresh and clean and also make certain optimal deliverability.
Sending out broadcasts is simple as well as it the Kartra email system likewise enables you to A/B divided test emails to offer you a sign as to which e-mails are extra effective in your advertising projects. One more useful attribute with the A/B split screening is that you can set the percent that you wish to split examination. As an example, you might send out 75% to An as well as the staying 25% to B which can be really valuable when testing out different e-mail topic lines of making small modifications to each email. An even more detailed review of the Kartra email attribute can be discovered below.
Really comparable to Clickfunels the Kartra Landing web page building contractor enables you to produce opt-in types, sales pages, up-sell as well as down offer web pages, webinar registration pages, item launch funnels as well as much a lot more!
Kartra allows you to produce a basic sales page to a full series, multi-step sales channel without the requirement to be experienced in computer system code. It is a drag and decline design advertising and marketing web page contractor.
Kartra comes with pre-made design templates of all the kinds of advertising web pages which are conveniently customized to suit your business OR if your sensation confident you can produce your very own web pages from scratch!
All web pages have the capacity to be A/B split testing. so you can conveniently see which is transforming far better bringing you a lot more leads & sales into your company!
The Kartra buying cart is a serious challenger to other purchasing cart systems available. Kartra was originally made as a shopping cart system but since the upgrade of Kartra there have actually been a lot more improvements to the Karta shopping Cart..
Making use of the drag & decline attributes you can conveniently personalize your check out pages as well as conveniently connect to your picked analytics accounts to monitor sales as well as memberships that you have made.
The Kartra business monitoring system permits producing advertising series for all of the web pages detailed above. You can initiate e-mail sequences at particular points in the funnels or develop an up-sell or downsell when a possibility moves your advertising and marketing sequence. When connected to your selected analytics program you can easily see which parts of your series need improvement as well as which components are working well, given you the capacity to develop a sales driving machine!!
Another function of the Kartra system is the capacity to produce fully personalized subscription websites. Kartra Subscription Sites are organized on a safe platform. All passwords and visit details are instantly developed enabling you to focus on simply producing the site..
You can supply various kinds of content to your participants relying on the sort of subscription degree they have. Kartra makes setting this up very simple also for the non-tech kind individual.
There are 6 x various pricing plans offered for Kartra. Every one of the plans come with a 14-day test which will certainly establish you back $1. After you get to the end of the Karta 2 week complimentary test you will certainly be billed monthly at the prices provided below.
Expert Secrets can be a terrific and also extremely functional tool for numerous services. We here at JD-OD. com have written a thorough write-up to offer you a bit much more info regarding Expert Marketing Secrets.
Click Funnels is software application developed by the well known online marketer Russell Brunson. He created the platform to assist online marketers, company owner, solopreneures, entrepreneurs to be able to develop advertising and marketing pages (additionally referred to as funnels) with no previous coding or computer system programming experience. This removes the need to hire pricey programmers as well as developers and it can all be done from the all in one system Clickfunnels conserving you cash and also liberating the time to focus on more crucial facets of your service.
With Clickfunnels you can quickly create a fully personalized, interactable web site which leads leads with your sales funnel.
Whether you have a solitary product to offer or you have several products to market you can easily develop a sales channel to suit your product/s. If you are drop-shipping or creating your own items then you create a totally practical channel which can integrate attributes such as One Time Offers (OTO’s), Upsells and also Downsells. You can likewise incorporate your funnels with 3rd party settlement business to receive payments from your clients online. You can A/B split examination all the funnels you develop and all web pages are easily altered once you know what improvements/modifications need to be made.
Lead capture funnels (also known as squeeze web pages) are where you provide a ‘free gift,’ in exchange for an email address. This can be some type of guide in a PDF layout that your prospect would wish to review. As soon as you have the e-mail address you can remain to market to them and ideally at some point make a sale. You might also place an Once Offer (OTO) right into your lead capture channel as well as if it works out you might have the ability to make a sale there and afterwards.
Lead Capture Funnels are conveniently produced in Clickfunnels as well as you can either use Clickfunnels Actionetics e-mail or you can utilize a 3rd party e-mail responder such as Aweber or ConvertKit.
There are several attributes with Kartra and there has been an enormous enhancement to the software application it once was. Currently, it is not just a pietistic, customizable buying cart. It currently boasts a listing of features which can be located below. The software application is by no means excellent however is a substantial enhancement to what it when was. Being fairly new I’m sure the makers are still working hard on the software and also there will certainly a lot more features to come in the future.
The Kartra Email Advertising attribute is very functional as well as very simple to make use of. If you likewise have a checklist of leads from a previous e-mail marketing programme you can conveniently import them all into Karta with a few clicks of your computer mouse. One thing to be aware of is that when you import leads over right into Karta it will certainly take about a day prior to you can send your very first program e-mail. This is due to the fact that Karta needs to validate all e-mail addresses to make certain that they are valid as well as to secure users from deliverability concerns in the future. You will be notified of any kind of bounced or blacklisted e-mails by Kartra to maintain your lists fresh as well as clean and ensure optimal deliverability.
Sending out broadcasts is easy and also it the Kartra e-mail system also allows you to A/B split examination e-mails to provide you an indication as to which emails are extra successful in your advertising and marketing projects. An additional convenient attribute with the A/B split testing is that you can set the portion that you wish to split examination. For example, you might send out 75% to An and the remaining 25% to B which can be truly practical when checking out different e-mail subject lines of making small changes to each email. A more thorough testimonial of the Kartra e-mail attribute can be discovered below.
Very similar to Clickfunels the Kartra Landing web page building contractor permits you to produce opt-in types, sales web pages, up-sell and also down sell web pages, webinar registration web pages, product launch funnels and much a lot more!
Kartra enables you to create an easy sales web page to a complete sequence, multi-step sales channel without the need to be experienced in computer code. It is a drag as well as decline design advertising web page builder.
Kartra comes with pre-made design templates of all the sorts of marketing web pages which are easily tailored to fit your company OR if your sensation positive you can produce your own web pages from square one!
The Kartra purchasing cart is a serious contender to various other purchasing cart platforms available. Kartra was originally made as a buying cart platform but since the upgrade of Kartra there have actually been much more enhancements to the Karta shopping Cart..
Making use of the drag & decline features you can quickly customize your check out pages and quickly link to your selected analytics accounts to monitor sales and also registrations that you have made.
The Kartra company monitoring system permits developing marketing sequences for every one of the web pages detailed above. You can initiate e-mail sequences at particular factors in the funnels or develop an up-sell or downsell when a prospect relocates your advertising series. When attached to your chosen analytics program you can easily see which parts of your series need improvement as well as which components are working well, offered you the ability to create a sales driving machine!!
One more feature of the Kartra platform is the capacity to produce completely customizable subscription websites. Kartra Membership Websites are held on a protected system. All passwords as well as visit details are automatically developed permitting you to focus on just producing the site..
You can provide various kinds of material to your members relying on the kind of subscription level they have. Kartra makes setting this up very easy also for the non-tech type person.
There are 6 x different prices plans readily available for Kartra. Every one of the strategies include a 14-day test which will set you back $1. After you reach completion of the Karta 14 day totally free trial you will be billed monthly at the prices detailed below.
Expert Secrets can be an excellent and also very versatile device for numerous companies. We here at JD-OD. com have created a detailed post to provide you a bit a lot more info concerning Expert Marketing Secrets.
Click Funnels is software program developed by the infamous online marketer Russell Brunson. He developed the system to aid marketing professionals, local business owner, solopreneures, entrepreneurs to be able to develop advertising and marketing pages (additionally called funnels) with no previous coding or computer system shows experience. This removes the need to hire costly developers and also designers and also it can all be done from the all in one platform Clickfunnels saving you money and liberating the time to concentrate on more important aspects of your service.
With Clickfunnels you can easily produce a fully adjustable, interactable internet site which leads leads with your sales funnel.
Whether you have a single product to offer or you have numerous items to offer you can conveniently develop a sales channel to suit your product/s. If you are drop-shipping or producing your very own items then you create a fully functional funnel which can incorporate functions such as One Time Deals (OTO’s), Upsells and also Downsells. You can likewise integrate your funnels with 3rd event settlement companies to get repayments from your consumers online. You can A/B split examination all the funnels you produce and all pages are quickly changed once you understand what improvements/modifications require to be made.
Lead capture funnels (additionally known as squeeze pages) are where you offer a ‘complimentary gift,’ in exchange for an email address. This can be some type of guide in a PDF style that your prospect would wish to read. When you have the e-mail address you can continue to market to them and also hopefully at some point make a sale. You might also put an One-time Offer (OTO) into your lead capture funnel and also if it works out you may have the ability to make a sale there and after that.
Lead Capture Funnels are conveniently developed in Clickfunnels as well as you can either use Clickfunnels Actionetics e-mail or you can use a 3rd party e-mail -responder such as Aweber or ConvertKit.
There are numerous attributes with Kartra and also there has been a substantial improvement to the software application it once was. Now, it is not just a glorified, customizable buying cart. It now boasts a checklist of features which can be found listed below. The software is never best however is a huge improvement to what it as soon as was. Being rather brand-new I make sure the creators are still striving on the software application as well as there will many more features ahead in the near future.
The Kartra Email Advertising attribute is incredibly flexible and extremely simple to utilize. If you also have a list of leads from a previous email advertising programme you can quickly import them all right into Karta with a few clicks of your mouse. One point to be familiar with is that when you import leads over into Karta it will take about a day prior to you can send your first program email. This is since Karta needs to verify all e-mail addresses to ensure that they stand and also to shield individuals from deliverability issues in the future. You will be informed of any kind of bounced or blacklisted emails by Kartra to keep your lists fresh and also clean as well as ensure maximum deliverability.
Sending out programs is simple as well as it the Kartra email system also allows you to A/B split test e-mails to offer you an indicator regarding which emails are extra effective in your advertising and marketing campaigns. One more helpful attribute with the A/B split testing is that you can establish the portion that you want to split examination. For instance, you can send 75% to An and the remaining 25% to B which can be really practical when testing out different e-mail topic lines of making tiny modifications to every e-mail. An even more thorough evaluation of the Kartra e-mail function can be discovered right here.
Very similar to Clickfunels the Kartra Touchdown page contractor enables you to create opt-in kinds, sales web pages, up-sell and also down market pages, webinar enrollment web pages, item launch funnels and much a lot more!
Kartra allows you to develop an easy sales web page to a full sequence, multi-step sales channel without the need to be experienced in computer system code. It is a drag as well as decrease design advertising web page home builder.
Kartra includes pre-made design templates of all the types of advertising pages which are easily tailored to match your company OR if your sensation positive you can develop your very own pages from the ground up!
All web pages have the capacity to be A/B split screening. so you can easily see which is transforming far better bringing you more leads & sales right into your service!
The Kartra shopping cart is a major challenger to various other shopping cart platforms around. Kartra was initially made as a buying cart platform yet because the upgrade of Kartra there have been much more renovations to the Karta buying Cart..
Utilizing the drag & drop functions you can easily personalize your check out pages as well as conveniently hook up to your selected analytics accounts to track sales and also registrations that you have actually made.
The Kartra organisation management system allows creating advertising and marketing sequences for all of the pages provided above. You can launch e-mail sequences at particular factors in the funnels or produce an up-sell or downsell when a prospect moves your marketing sequence. When linked to your chosen analytics programme you can easily see which parts of your sequence requirement enhancement and also which parts are working well, given you the capability to create a sales driving maker!!
An additional feature of the Kartra system is the ability to create totally customizable membership websites. Kartra Membership Sites are held on a safe system. All passwords as well as visit details are automatically developed allowing you to focus on simply developing the website..
You can provide various kinds of web content to your members depending on the sort of subscription level they have. Kartra makes establishing this up very simple also for the non-tech kind person.
There are 6 x various rates plans available for Kartra. All of the plans come with a 14-day trial which will establish you back $1. After you reach completion of the Karta 2 week complimentary trial you will be billed monthly at the costs detailed below. | 2019-04-24T01:53:45Z | http://jd-od.com/expert-marketing-secrets-marketing-reviews-2019/ |
Williamsburg Wonderland: "Wonderneath," a new circus theater adventure set in turn-of-the-century New York City, comes to House of Yes in East Williamsburg for six nights, the first beginning tonight at 9 pm. Tickets $20. Located at 342 Maujer St.
Last chance: "New Hope City" plays its last shows this weekend at the Bushwick Starr. Don't miss out on this unique rock opera, set in a land not unlike ours, in a time not too far away. At 8 pm. Tickets $10. Located at 207 Starr St.
Theater: By popular demand, Piper McKenzie is presenting a remount of "Craven Monkey and the Mountain of Fury," one of the critical and popular hits of December 2009’s Fight Fest at the Brick Theater. At 8 pm. Tickets $12. Located at 575 Metropolitan Ave.
Music: Also back by popular demand, Sara Bouchard performs "Songs of Lewis & Clark," her song cycle setting to music the Journals of Lewis & Clark. From 7-9 pm. Tickets $5. Located at 543 Union St.
Comedy: Warm up with the BRIC as the producer's behind Celebrate Brooklyn! present a night of comedy with Eugene Mirman and friends at the Bell House in Gowanus. At 8 pm. Tickets $10. Located at 149 7th St.
Purim!: It's Purim, which all we really know means people party and get dressed up in costumes. Find out where the party's happening in Brooklyn with our handy guide.
Chess: Think you're the next Bobby Fischer? Test your skills at the inaugural Brooklyn Chess Tournament, presented by the Brooklyn Lyceum in Park Slope this weekend. Registration is $25 for the Scholastic division (Saturday) and $40 for open (Sunday), and is open until the day of, as long as there is still space available. There is no admission fee for spectators. Runs 11 am-7 pm today and tomorrow. Located at 227 Fourth Ave.
Hair god: The Williamsburg Hair Man gets immortalized even more, as a short film plays as part of a mini film fest at Music Hall of Williamsburg tonight. Also on the bill are the bands Emmanuel and the Fear and Hank and Cupcakes. At 9 pm. Tickets are $7 in advance, $10 at the door. Located at 66 North 6th St.
Shopping: JCIA is home to a three-day vintage and craft market beginning today, including local vendors such as The Shiny Squirrel, Bonnie English, In Your Closet, Brooklyn Rehab and Sweet Virginia. Stop by on opening day for free mimosas while you shop. Free admission. From noon to 8 pm. Located at 522 Metropolitan Ave.
For the record: The Brooklyn Record Riot returns to the Warsaw in Greenpoint for a day of vinyl deals and finds. Admission is $3 ($20 from 10 am-noon). Snack on kielbasa and other traditional Polish eats while you shop. Til 8 pm. Located at 261 Driggs Ave.
Bowlive: Funk trio Soulive begin their two-week residency at Brooklyn Bowl. If you can't make it tonight, you have nine more shots. At 9 pm. Tickets $10. Located 61 Wythe Ave.
Anna Klinger, executive chef/co-owner of Al di Lá, the uber popular Venetian trattoria in Park Slope, will host a cooking class with her husband, Emiliano Coppa, at De Gustibus Cooking School at Macy’s Herald Square, March 2.
Attendees will have the unique opportunity to observe Klinger in the kitchen, eat a five-course meal and ask questions as she shares her culinary secrets. De Gustibus Cooking School is one of the most prestigious cooking institutions in the country, hosting the world’s top chefs as they prepare meals for attendees in an intimate, casual setting.
Klinger will serve her acclaimed risotto, which New York magazine calls “sublime simplicity;” a Cuttlefish over Grilled Polenta and Monkfish over Stewed Cardoons. For dessert, she has a Coffee Caramel Custard with Mosica Biscotti planned.
Macy’s Herald Square is at 151 West 34th Street, eighth floor. The event runs 5:30-8 p.m. The event is $95, which includes the five-course meal, wine pairings for each course and a free subscription to Food & Wine magazine. For more, call 212-239-1652.
Shatner tribute: We mingle with the Trekkies at the Knitting Factory's Shat Ball.
Performance art: Who's that knocking at your door? It's Death Bear.
Hair man: "Williamsburg Hair Man" gets even more immortalized.
Site Fest: Arts in Bushwick returns its successful performance festival for two days of wall-to-wall live programming, from dance and drama to performance art, film and comedy.
True confession: Until I set out to write this column, I had never in my life used a cake mix.
What made me try one? A new book chock-a-block with recipes whose goal, clearly, is to go beyond the simple cake mix, The Cake Mix Doctor Returns! (Workman Publishing, $15.95), by Ann Byrn.
I have to admit I was skeptical. I cut my kitchen teeth in an era of Julia Child worship, when my friends and I were on a first name basis with some of the most revered cookbook writers of all time, whether they knew it or not, whipping up Craig’s recipe for this, or Pierre’s recipe for that.
I made everything – and I mean everything! — from scratch, and looked askance at convenience foods. No short cuts for me, in my tiny Manhattan studio apartment kitchen.
Fast forward a couple of decades, to my comfortable kitchen in a roomy Brooklyn home, which I inhabit with one (occasionally ravenous) husband and two (frequently ravenous) children, now on the cusp of adulthood.
Short cuts, I quickly learned, were not necessarily so bad, especially if they allowed me to feed my family, hold down a job and carve out some free time for myself.
But, still, a cake mix? A CAKE MIX? I definitely needed some convincing.
So, I turned to Byrn to provide it. A quick perusal of her book made it clear that there was something for everyone in it – sticky frosted cakes, as well as more restrained pound cakes and spice cakes with streusel, and flavors that ranged from citrus to toffee, and pretty much everything in between.
But, was it any good? To find out, I purchased my very first cake mix at the supermarket during my Saturday shopping expedition, and, several days later, set out to bake Byrn’s Almond Pound Cake, on an evening when I was home (no assignments taking me across my beat), and also making dinner.
The cake quickly came together. It was clear, by comparing Byrn’s recipe with the box, that her recipe was richer and way more elaborate than the basic instructions on the carton: Six eggs instead of three, two sticks of butter instead of a third of a cup of oil, milk instead of water, extra flour and sugar, and dollops of almond and vanilla extract.
Once the cake was in the oven, the kitchen and, by extension, the entire house, quickly was infused with the haunting fragrance of almond. The cake puffed up beautiful, slid smoothly out of the Bundt pan in which I had baked it, and looked gorgeous.
But, how would it taste? We sat down to dinner (I had whipped up a main dish pasta – look for that recipe soon – and a pork chop for my husband, who’s not a big pasta fan, while the cake was baking), and waited patiently for the cake to cool, as commanded in the instructions.
Finally, it was time to taste. The cake, enthroned on a vintage Spode platter, sliced beautifully, an important first step.
The little group of experts gathered around my dining room table took small or not so small slices. My husband complimented the Italiany flavor of the cake, my son and daughter, the texture.
While I wondered, at first bite, if the almond flavor was too strong, my husband liked it a lot. By the next day, it had mellowed a bit, and my son – who had been a bit put off by the overriding almondy taste of the cake – eagerly sliced himself a piece when he got home from school.
As Byrn notes, “My mother always said a pound cake tastes better on day two or three.” We’ll see if she’s right about day three, if there’s any left.
I’m still not 100 percent convinced that mixes will ever replace basic unbleached flour, granulated sugar and various leavening agents as a basis for cake-baking in my kitchen. But, I am willing to give them a few more tries, and have already identified the recipes I want to have a go at: Lemon Streusel Cake or Aimee’s Chess Cake, anyone?
1. Place a rack in the center of the oven and preheat the oven to 350 F. Lightly mist a 10-inch tube pan or 12-cup Bundt with vegetable oil spray, then dust it with flour. Shake out the excess flour and set the pan aside.
2. Place the butter and sugar in a large mixing bowl and beat with an electric mixer on medium-low speed until blended and creamy, 1 minute. Stop the machine and scrape down the side of the bowl with a rubber spatula. Add 1 egg at a time, beating on low speed until each egg is blended into the batter. Stop the machine and add the almond and vanilla extracts and flour. Beat 30 seconds on medium-low speed. Stop the machine and scrape down the side of the bowl again. Add the cake mix and milk alternately in thirds, blending on low speed after each addition. Let the mixer run for another 30 seconds on medium speed to blend the batter well until it is smooth and thick. Pour the batter into the prepared tube pan, smoothing the top with the rubber spatula, and place the pan in the oven.
3. Bake the cake until it is just starting to pull away from the sides of the pan and the top springs back when lightly pressed with a finger, 52 to 58 minutes. Transfer the tube pan to a wire rack and let the cake cool for 10 to 15 minutes. Run a long, sharp knife around the edges of the cake and shake the pan gently. Invert the cake onto a wire rack, then invert it again onto another rack so the cake is right side up. Let the cake cool for 25 to 30 minutes longer, then slice and serve.
Keep it Fresh! Store this cake, in a cake saver or covered with plastic wrap, at room temperature for up to one week. Freeze the cake, wrapped in aluminum foil, for up to six months. Let the cake thaw overnight on the counter before serving.
Note: You may use any milk you have in your refrigerator in this recipe. If you use whole or evaporated milk you will have a richer cake.
Groceries are way too expensive.
Thanks to this terrible economic crisis, it seems every single item in Waldbaum’s is ridiculously overpriced. Five bucks for milk? Six bucks for a pack of yogurt smoothies? Get real!
This week, I wanted to make a cheap dish that could last for several days - and not taste like rubber when reheated in the microwave.
I settled on Potatoes and Eggs. My family calls this Italian comfort food - and Italian poverty food. Seems fitting for this task.
I borrowed my mother’s recipe (she made this all the time when I was a kid) and was unhappily surprised to discover that it’s much more difficult than I expected!
Now, I thought I’d just fill a bowl with a few eggs and some potato pieces. Not so!
First, I sautéed onions in a frying pan then added the chopped potatoes to brown. I’m kinda getting the hang of this sauté thing but the sizzling sounds still make me nervous - and ready to duck splashing oil.
The next step was what I had envisioned - beating eggs in a bowl. Only one itty-bitty shell fell in!
I added the eggs to the frying pan and, according to the recipe, was to turn the entire dish over when the underside was brown. Huh?!
The trick, my mom advised, is to cover the pan with a large plate and flip that sucker upside down. Then you slide the grub, brown side up, back into the pan. Uh, yeah, I don’t wanna do that.
But, sadly, I had to. I really did try my hardest but that pan was heavy! And hot! I managed to get the food on the plate and then back in the pan but trust me, it wasn’t pretty. And I may have lost some potatoes along the way.
Verdict: What a sloppy mess!
Flipping the frying pan upside down proved to be quite difficult - and emotionally scarring - for me. It left me with a broken glop of smooshed potatoes and eggs!
It may not have looked pretty, but it sure tasted good!
In a round frying pan, sauté the onion in olive oil until transparent . Add potatoes, continue to sauté on medium heat until almost browned. Add red pepper. In a bowl, beat the eggs, adding salt, pepper and parsley. Add egg mixture to sauté pan. When set and browned on the underside, loosen it with a spatula. Cover with a round plate and flip pan upside down. Slide potatoes and eggs back into the pan with browned part on top. Cook for five minutes.
From March 5-7, Brooklyn goes country with the Brooklyn Winter Hoedown, shining a spotlight on the borough''s bustling country scene.
Main event: Brooklyn Country Music Festival (the sixth annual was at Southpaw in Park Slope last September, so look out for that this fall); also organizes the yearly Cash Bash, with the 78th birthday celebration happening this Friday, February 26 at Southpaw, featuring the Whiskey Rebellion and Sister & the Sisters (sold out - we warned you!).
Why he does it: "I visit clubs locally and do my best to reach out for bands I have never heard before to get them involved with the festival and the Web site."
He’s the writer from Iowa who didn’t go to the famed Iowa’s Writer’s workshop at the University of Iowa.
But Iowa’s loss is Brooklyn’s gain, and author Peter Hedges’ latest tome, “The Heights” (Dutton), offers up an often funny and captivating story that looks at contemporary life in Brooklyn Heights.
Hedges, who wrote the novel and the screenplay, “What’s Eating Gilbert Grape,” got the idea for the novel in late 1997 while sitting with his young family on a park bench in Pierrepont Playground as he began imagining what could happen in the neighborhood.
“I thought it was a great place for this story to occur. I took notes for many weeks and locked onto the idea of writing about a good marriage, and wanted to have that marriage go through an unthinkable test,” said Hedges.
The novel, which took 12 years to write, was interrupted several times by screenwriting assignments on the films “About a Boy” and “Dan in Real Life,” but slowly began to take shape.
The story involves the middle-class couple, Tim, who teaches at the Montague Academy, an exclusive private school in Brooklyn Heights, and his wife, Kate, who get involved with the wealthy Anna. Then, their lives become unhinged by a secret invitation from an unlikely messenger.
While there appears to be some similarities between real places in Brooklyn Heights and Hedges’ own life, the author insists the novel is a total work of fiction.
“I took great care in creating Montague Academy and Oak Lane where the main characters exist by setting up a fictional school and fictional street,” he said.
Hedges said his wife is from Brooklyn and the couple decided to move to the borough after their children were born.
This includes walking the 15 minutes from his home in Boerum Hill each day to his studio office in Brooklyn Heights.
Although originally from Iowa, Hedges attended college at the North Carolina School for the Arts, and then came to New York, where he wrote several plays before getting his big break with “Gilbert Grape,” which starred Johnny Depp and Leonardo Di Caprio.
He still sees the two actors from time to time, most recently running into Depp at the recent Tim Burton exhibition at MOMA.
Hedges said Brooklyn Heights as the setting for the novel is also a tribute to a great neighborhood where such writers as Thomas Wolfe, Norman Mailer and Arthur Miller lived and wrote.
He also is proud to count himself as one of the growing number of writers to now call the borough his home.
“Brooklyn is the place to be and live from an artistic standpoint and this is Brooklyn’s moment. It’s a very vibrant scene,” he said.
Hedges will be reading from The Heights at Book Court, 163 Court Street on Thursday March 4 at 7 p.m.
When Soulive first came up a little more than 10 years ago, the music business was just beginning to change. The past decade has seen the band evolve along with it, recording in their own studio, launching their own record label, and putting up their own videos online.
From the beginning has been Pete Shapiro. The band would jam in his Manhattan club, Wetlands, back in the day, playing there more times than any other club, even since. This month, they play a two-week residency at his newest venture, Brooklyn Bowl in Williamsburg, adding new notches to the belt with 10 nights of funk-infused music.
Soulive will do just that over the course of the residency, aptly named “Bowlive,” pulling from their many albums and EPs, as well as inviting as many friends as they can to join them each night.
No surprise that they did do it. Since the band started, they’ve been able to make things happen. The first time they all sat down together and jammed, they wound up with their debut album — “Get Down.” Soon, they signed to Blue Note Records and started getting regular gigs in New York, including Wetlands, and all over the world (the band’s especially big in Japan). A little over a year ago, they started their own label – Royal Family Records – putting out their own music, including most recently a live session recorded in Tokyo, as well as others. Label mates include Lettuce, Adam Deitch and Nigel Hall (an appearance by these guys throughout Bowlive is likely).
With music downloads so prevalent, the band has also been big on immediately getting out media on their own terms, whether that means CDs right after they’ve finished clearing the stage or uploading videos of shows to their Web site.
“When we go on tour, people record anyway and put it online. That’s why we started doing it ourselves. Here’s a little bit of quality control,” says Krasno.
With their next releases, the band also looks to play more into instant gratification.
With that said, 10 years from now, don’t be surprised if Soulive comes full circle yet again with another set of gigs at whatever club Shapiro’s manning then You heard it here first.
Soulive do Bowlive at Brooklyn Bowl (61 Wythe Ave) March 2-6 and March 9-13. All shows at 9 pm. Tickets $10 on weeknights and $12.50 on weekends. For more information, call 718-625-2100.
Greenpoint News takes a look at the new Coco66, where These Are Powers recently celebrated the release of their new “Candyman” EP. The band wowed, thanks in part to the renovations.
"The impressive sound (bass, in particular) was part of a new era for the Greenpoint bar and live music venue, which, since October, has been undergoing improvements aimed at transforming Coco 66 into a first-rate establishment for more shows, bigger shows and better shows," says the paper.
Coco66 is located at 66 Greenpoint Ave.
Brooklyn is channeling its inner geek.
One week after the American Crossword Puzzle Tournament took over the Brooklyn Marriott, another sport that takes skill with brains comes to the Brooklyn Lyceum.
From February 27-28, the Park Slope bathhouse-turned-venue will host the inaugural Brooklyn Chess Tournament, an all-ages affair that looks to trump up the borough’s place on the chess map.
Indeed, from the dominance of Edward R. Murrow High School in chess circles to the legacy of Bobby Fischer, chess and Brooklyn are somewhat synonymous. All that’s missing is a tournament, and Eric Richmond, program director of the Brooklyn Lyceum, thought it was high time the borough had its own.
Helping to kick things off is a Brooklyn chess champion – Maurice Ashley, the first African-American chess International Grandmaster and, as a resident of Park Slope, a neighbor of the venue. He is helping co-produce the tournament and will provide commentary, as well as challenge 12 players to a round of 12 games at one time.
Saturday, February 27, will be devoted to nurturing young chess players in the Scholastic division (grade school, middle school, and high school levels). Membership in the U.S. Chess Federation is mandatory for high school competitors. Sunday, February 28, will be open competition (membership to the USCF is also required to compete and can, if necessary, be procured at the event). This day will also see chess players vying for over $2,000 in prize monies, awarded to first, second and third place.
For non-competitors, there is no admission fee, and tournament games will be simulcast on a large screen, with commentary provided by Ashley, so you don’t miss a single move. People are also welcome to play their own games amongst themselves.
For competitors, registration is $25 for the Scholastic division (Saturday) and $40 for open (Sunday), and is open until the day of, as long as there is still space available. The tournament is Swiss style, and you must bring your own chess sets, boards and clocks.
The tournament runs 11 am-7 pm February 27 and 28 at the Brooklyn Lyceum (227 Fourth Avenue). For more information, call 718-857-4819.
Most drama in basketball happens on the court. For the ladies of the Bed-Stuy Bulls, it’s in the locker room.
“Shoot 2 Win” follows a day in the life of seven friends who play on a competitive league as they try to reach for the gold in a city-wide tournament. But between cheating husbands and drug abuse, basketball’s the last thing on their minds.
Donna Marie Augustin originally saw the production in her native London, and wanted to bring it to Brooklyn, where she’s lived in Bedford-Stuyvesant for the past three years.
In putting on the show for an American audience, the script, written by Jo Martin, Josephine Melville and Tracey Daley, needed some “translation.” Netball, which the original focused on, became basketball. Obscure British/Caribbean slang (“Stop talking stupidness”) was reworked, with help from Brooklyn writer and director Nelson George (whom Augustin worked with on the forthcoming film “Left Unsaid”). But the story remained the same.
As soon as the lights go on, the women enter the locker room one by one, each carrying their own demons – Shenequa (played by Augustin) and her drug dealing on the side; Jackie and her alcoholism; Carrie and her bad luck with men; Mandy and her drug abuse; Zoe and her racial identity crisis; Bev and her faith; and Sandra, who has the biggest weight to carry of them all.
Despite the severity of their problems, the play does have its light-hearted moments as well, including an impromptu dance sequence and clever dialogue. But, thanks to heated words between the friends and serious soliloquies from each actress, the play strives to uncover those truths that are right below the surface, and on the tip of everyone’s tongue. Off the court, they’re still on the defense.
Besides the script, another draw for Augustin was the opportunity to have an all-female, nearly all-black ensemble piece.
After a few days at the Cherry Lane Theatre in Manhattan, the production comes to Brooklyn’s Kumble Theater for the Performing Arts March 3-7. Tickets are $22, $15 for students, seniors and groups of 10 or more. The theater is located at 1 University Plaza. For more information, call 718-488-1624.
Couture fashions are gorgeous — but who can afford ’em?
Next month, iconic French fashion designer Jean Paul Gaultier will unveil his affordable women’s apparel capsule collection for Target, which has three stores in Brooklyn.
The bull’s-eye retailer has made a name for itself thanks to these fashionable collaborations. Gaultier is probably the biggest name to join forces with the chain store.
A sneak peek at Gaultier’s designs has Pumps & Pleats drooling!
Many of the designs put a French spin on American staples. Take, for instance, the classic khaki trench coat. Gaultier created a $59.99 version for Target with a chic trio of black stripes near the shoulders.
Rather than pair it with a stiff suit, the trench is thrown over a filmy kelly green dress with white polka dots and black lace trim. The lingerie-inspired dress seems quite risqué under the coat. Ooh la la!
The cropped leather motorcycle jacket in black with red trim is already a hit with fashion bloggers. Expect the slick jacket to sell out quick — even at the $199.99 price tag.
There’s much more affordable fare in the collection — a sleek tank dress for $34.99, a black pinstripe vest for $29.99 and a peach tee bearing the “JPGaultier” name for $19.99.
In true Gaultier style, expect some of his Target designs to be avant-garde.
Mesh leggings come in an abstract “tattoo print” mixing scales, flames and flowers. Sounds weird? It is. The price tag, $24.99, is also rather high for leggings.
The collection will be available from March 7 to April 11.
Chili: A Brooklyn chili cook-off finds a winner in Char No. 4 chef Matt Greco, beating out General Greene's Julie E. Farias.
Tapas: It's a tapas smackdown in Williamsburg, as our sister publication reviews two new digs: Ooba and Xunta.
Borough: It's a classic - Brooklyn versus Manhattan - in TONY this week. They ask local restauranteurs, including folks from Franny's, Roberta's, and Saul, if they would cross the bridge.
Slate Gallery presents an exhibition of new work by Miriam Cabessa, featuring her new series of gold paintings titled, “79,” after the atomic number for gold.
The exhibition runs now through March 7, with a closing reception March 5 at 6 p.m., with a Gold Party at 9 p.m. Slate is at 136 Wythe Avenue in Williamsburg; call 718-387-3921.
It’s a double dose of metal this month.
On March 6, Liturgy and Naam head to Williamsburg for a set that’s sure to blow the water out of Union Pool, a welcome home for metal heads.
Out of Brooklyn, Liturgy in particular has been blowing up in recent months with their black metal, thanks to shows at The Blackened Music Festival at Le Poisson Rouge, as well as non-metal circles, including a New Yorker Festival show and shout-outs from a Dirty Projector.
Their music equally draws from a range of influences: the solemn 11th century chants of Perotin, the allegorical prophecies of Blake, the apocalyptic vision of Scriabin, the mass-media spirituality of Jodorowsky, the cataclysmic transcendence of Glenn Branca’s post-minimalist collective no-wave drones.
Also a Brooklyn band, Naam delves more in stoner rock, with the trio molding elements of classic psychedelia and prog with modern elements of jam-heavy bliss and apocalyptic amplitude.
Hear them March 6 at Union Pool (484 Union Ave.) at 9 pm. Tickets $10 $8. For more information, go to www.myspace.com/unionpool.
COUSIN CORINNE and BOOKCOURT proudly announce the launch of COUSIN CORINNE'S REMINDER, a biannual publication that features new writing, photography, and comix from artists around the world.
BOOKCOURT'S General Manager and Events Coordinator, Zack Zook, is COUSIN CORINNE'S founding owner and executive editor. He has teamed with a variety of highly talented NYC editors and curators to craft this remarkable series.
Writing: Charles Bock, Mark Borthwick, Todd Colby, James Frey, Ben Lasman, Donald Moss, Shira Nayman, Alice Notley, John Burnham Schwartz, Emma Straub, Anne Waldman, John Wray, and Hannah Zeavin.
Comix: Mike Cavallaro, Jen Ferguson, Jonathan Lethem & Dean Haspiel, Tim Hall & Jennifer Hayden, Michel Fiffe, and Kat Roberts.
Photography: Mark Borthwick, Mona Kuhn, Noah McLaurine, and Kimiko Yoshida.
Following “The New Electric Ballroom,” “Black Watch” and “The Walworth Farce,” the latest production for St. Ann’s Warehouse in DUMBO is another alum of the Edinburgh Fringe Festival.
Naturally though, the drama couldn’t be more different.
The life in question in the play, which won the festival award last year and makes its US premiere in Brooklyn, is Bette Bourne’s, a seminal British gay activist and drag queen. The story is told on stage to Mark Ravenhill, one of the UK’s celebrated playwrights (here, his first play, “Shopping and F---king,” had a sold-out run at New York Theatre Workshop in 1998).
A story told between friends, and adapted from a series of private conservations, the performances are, not surprisingly, honest, at times humorous, others angry. The plot moves from Bourne’s post-war childhood to his first walk across Trafalgar Square in drag, to his seminal role in the formation of the Gay Liberation Front and the creation of his OBIE Award-winning queer theater company BLOOLIPS in London and New York. More than a memoir, it’s a celebration of the momentous struggles and achievements of gay liberation.
The show comes to St. Ann¹s directly on the heels of a successful February run at London’s Soho Theatre, running March 4-28, Wednesday to Saturday at 8 p.m., Saturday at 2 p.m. and Sunday at 4 p.m.
Tickets are $30-$55 and are available online and by phone at 718-254-8779. St. Ann’s is located at 38 Water Street.
Brave New World Repertory returns to the stage this month with a new site-specific production of Arthur Miller’s play, “The Crucible,” directed by Claire Beckman, at the Old Stone House in JJ Byrne Park, at Fifth Avenue between Third & Fourth streets in Park Slope.
“The Crucible” is a 1953 dramatization of the Salem witchcraft trials, which took place in the Province of Massachusetts Bay during 1692 and 1693. Miller wrote the play as an allegory to McCarthyism, a time when the US government blacklisted accused communists. Miller himself was to be questioned by the House of Representatives’ Committee on Un-American Activities in 1956 and was convicted of “contempt of Congress” for failing to identify others present at meetings he had attended.
For this production, audiences are limited to 50 per show; admission is $18. Performance dates and times are March 4, 5, 6, 11, 12 and 13 at 8 p.m.; March 6 and 13 at 2 p.m. and March 7 and 14 at 7 p.m.
Artist Phyllis Frendendall opens the first in the spring series of the G-Train Salon, “Fleece into Gold,” with fiber artist Fredendall at Urban Alchemist Design Collective, March 6.
Fredendall’s work explores the relationship of memory to place, creating “maps” felted in wool and silk, inspired by her own journeys or based on stories of family members.
The show and discussion starts with 7 p.m. cocktails and an 8 p.m. talk. The exhibition is on view through April 6 at the Collective, 343 Fifth Street (off Fifth Avenue) in Park Slope.
Pumps & Pleats: Time to shop! T.J. Maxx is coming to Brooklyn!
Have you ever wondered how Brooklyn’s fashionistas can afford $600 Rebecca Minkoff satchels and $300 L.A.M.B. stilettos in this economy? I always do. Well, here’s the answer - they’re secret discount shoppers.
Purchasing purses and pumps at a designer discount store like Century 21 in Bay Ridge or Loehmann’s in Sheepshead Bay isn’t as elegant as shopping in Madison Avenue’s posh boutiques, but it will save you some green.
That’s why Pumps & Pleats is super excited that T.J. Maxx may soon open on East 15th Street between Kings Highway and Avenue P in Midwood. Maxx has a few locations in Manhattan, Queens and Staten Island, but this will be the chain’s first store in Brooklyn.
In honor of the shop’s reported October opening, I visited Marshalls on 86th Street in Bath Beach, which is owned by the same company as Maxx and sells the same designer duds. Really, these stores aren’t that much different.
The cool thing about Marshalls is that the purses are arranged by color. If pink purses aren’t your thing, head on down to the green section, or hop to the blue corner for a turquoise tote. It’s totally fun!
This Bath Beach Marshalls is more organized than the one in the Atlantic Center mall in Prospect Heights, but be prepared for purses left on the floor and shoes randomly strewn on the racks. Frankly, any designer discount shop you visit will be a mess.
To deal with the crazy conditions, you must be patient and determined to scour every last rack for that one fabulous find. That’s how I found the mate for a single fire engine red Tahari pump. Perseverance pays off!
Marshalls [1832 86th St. between Bay 19th and Bay 20th streets in Bath Beach, (718) 621-3434].
Get your costumes ready! The Jewish holiday of Purim is this weekend, and Brooklyn's throwing a lot of parties.
Dust off your costumes, shine your dancing shoes and get ready to guzzle. From the organizers: "When the Jews of ancient Persia avoided extinction, God commanded them to celebrate by getting so drunk they couldn't tell their friends from their enemies. Sounds good to us! Jewish or not, put on a costume and join us!"
The night features Team Facelift, The Shining Twins, Dirty Fences, Cowboy Mark, DJ Drew Heffron, and DJ Kook Jew.
During its grand opening weekend of CastleBraid, an artist-focused support system of facilities, classes, and professional services, is holding a Purim-theme dance party, so grab a costume and enjoy two floors of DJs, dancing, drinks and more.
Mark the holiday with a traditional megillah reading, following by a performance from Soulfarm.
They brought you the Lecha Dodi remix of Akon, then the Shir HaShirim Moroccan beat meditation, now they are onto Israeli party music. Brody & Diwon will be joining the party fresh from their Israel and West Cost tour.
Rachel Coleman, aka "Pop Jew," aka the worst cook in America, hosts this bash, featuring the So So Glos, Beachniks, Tough Knuckles, and Sundelles. Costumes encouraged. | 2019-04-23T03:56:44Z | http://24sevenbrooklyn.blogspot.com/2010/02/ |
ERROR: type should be string, got "https://en.wikipedia.org/wiki/Intentional_radiator - any device that is deliberately designed to produce radio waves.Radio transmitters of all kinds, including the garage door opener, cordless telephone, cellular phone, wireless video sender, wireless microphone, and many others fall into this category.\nhttps://en.wikipedia.org/wiki/Wireless_communication - or sometimes simply wireless, is the transfer of information or power between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio waves. With radio waves distances can be short, such as a few meters for Bluetooth or as far as millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mice, keyboards and headsets, headphones, radio receivers, satellite television, broadcast television and cordless telephones.\nSomewhat less common methods of achieving wireless communications include the use of other electromagnetic wireless technologies, such as light, magnetic, ...used from about 1890 for the first radio transmitting and receiving technology, as in wireless telegraphy, until the new word radio replaced it around 1920. The term was revived in the 1980s and 1990s mainly to distinguish digital devices that communicate without wires, such as the examples listed in the previous paragraph, from those that require wires or cables. This became its primary usage in the 2000s, due to the advent of technologies such as LTE, LTE-Advanced, Wi-Fi and Bluetooth.\nWireless operations permit services, such as long-range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g. radio transmitters and receivers, remote controls, etc.) which use some form of energy (e.g. radio waves, acoustic energy,) to transfer information without the use of wires. Information is transferred in this manner over both short and long distances.\nhttps://en.wikipedia.org/wiki/Wireless_telegraphy - the transmission of telegraphy signals from one point to another by means of an electromagnetic, electrostatic or magnetic field, or by electrical current through the earth or water. The term is used synonymously for radio communication systems, also called radiotelegraphy, which transmit telegraph signals by radio waves. When the term originated in the late 19th century it also applied to other types of experimental wireless telegraph communication technologies, such as conduction and induction telegraphy. Radio telegraphy often used manually-sent Morse code; radioteletype (RTTY) always uses mechanically generated and recorded characters.\nhttps://en.wikipedia.org/wiki/Frequency_agility - the ability of a radar system to quickly shift its operating frequency to account for atmospheric effects, jamming, mutual interference with friendly sources, or to make it more difficult to locate the radar broadcaster through radio direction finding. The term can also be applied to other fields, including lasers or traditional radio transceivers using frequency-division multiplexing, but it remains most closely associated with the radar field and these other roles generally use the more generic term \"frequency hopping\".\nhttps://en.wikipedia.org/wiki/Transmitter - an electronic device which produces radio waves with an antenna. The transmitter itself generates a radio frequency alternating current, which is applied to the antenna. When excited by this alternating current, the antenna radiates radio waves.\nhttps://en.wikipedia.org/wiki/Link_budget - accounting of all of the gains and losses from the transmitter, through the medium (free space, cable, waveguide, fiber, etc.) to the receiver in a telecommunication system. It accounts for the attenuation of the transmitted signal due to propagation, as well as the antenna gains, feedline and miscellaneous losses. Randomly varying channel gains such as fading are taken into account by adding some margin depending on the anticipated severity of its effects. The amount of margin required can be reduced by the use of mitigating techniques such as antenna diversity or frequency hopping.\nA simple link budget equation looks like this: Received Power (dB) = Transmitted Power (dB) + Gains (dB) − Losses (dB). Note that decibels are logarithmic measurements, so adding decibels is equivalent to multiplying the actual numeric ratios.\nhttps://en.wikipedia.org/wiki/QRP_operation - refers to transmitting at reduced power while attempting to maximize one's effective range. The term QRP derives from the standard Q code used in radio communications, where \"QRP\" and \"QRP?\" are used to request, \"Reduce power\", and ask \"Should I reduce power?\" respectively. The opposite of QRP is QRO, or high-power operation.\nhttps://en.wikipedia.org/wiki/RF_power_amplifier - a type of electronic amplifier that converts a low-power radio-frequency signal into a higher power signal. Typically, RF power amplifiers drive the antenna of a transmitter. Design goals often include gain, power output, bandwidth, power efficiency, linearity (low signal compression at rated output), input and output impedance matching, and heat dissipation.\nhttps://en.wikipedia.org/wiki/Radio_receiver - an electronic device that receives radio waves and converts the information carried by them to a usable form. It is used with an antenna. The antenna intercepts radio waves (electromagnetic waves) and converts them to tiny alternating currents which are applied to the receiver, and the receiver extracts the desired information. The receiver uses electronic filters to separate the desired radio frequency signal from all the other signals picked up by the antenna, an electronic amplifier to increase the power of the signal for further processing, and finally recovers the desired information through demodulation.\nhttps://en.wikipedia.org/wiki/Radio_receiver_design - includes the electronic design of different components of a radio receiver which processes the radio frequency signal from an antenna in order to produce usable information such as audio. The complexity of a modern receiver and the possible range of circuitry and methods employed are more generally covered in electronics and communications engineering. The term radio receiver is understood in this article to mean any device which is intended to receive a radio signal in order to generate useful information from the signal, most notably a recreation of the so-called baseband signal (such as audio) which modulated the radio signal at the time of transmission in a communications or broadcast system.\nhttps://en.wikipedia.org/wiki/Regenerative_circuit - an amplifier circuit that employs positive feedback (also known as regeneration or reaction). Some of the output of the amplifying device is applied back to its input so as to add to the input signal, increasing the amplification. One example is the Schmitt trigger (which is also known as a regenerative comparator), but the most common use of the term is in RF amplifiers, and especially regenerative receivers, to greatly increase the gain of a single amplifier stage.\nhttps://en.wikipedia.org/wiki/Tuned_radio_frequency_receiver - or TRF receiver, is a type of radio receiver that is composed of one or more tuned radio frequency (RF) amplifier stages followed by a detector (demodulator) circuit to extract the audio signal and usually an audio frequency amplifier. This type of receiver was popular in the 1920s. Early examples could be tedious to operate because when tuning in a station each stage had to be individually adjusted to the station's frequency, but later models had ganged tuning, the tuning mechanisms of all stages being linked together, and operated by just one control knob. By the mid 1930s, it was replaced by the superheterodyne receiver patented by Edwin Armstrong.\nhttps://en.wikipedia.org/wiki/Reflex_receiver - occasionally called a reflectional receiver, is a radio receiver design in which the same amplifier is used to amplify the high-frequency radio signal (RF) and low-frequency audio (sound) signal (AF). It was first invented in 1914 by German scientists Wilhelm Schloemilch and Otto von Bronk, and rediscovered and extended to multiple tubes in 1917 by Marius Latour and William H. Priess. The radio signal from the antenna and tuned circuit passes through an amplifier, is demodulated in a detector which extracts the audio signal from the radio carrier, and the resulting audio signal passes again through the same amplifier for audio amplification before being applied to the earphone or loudspeaker. The reason for using the amplifier for \"double duty\" was to reduce the number of active devices, vacuum tubes or transistors, required in the circuit, to reduce the cost. The economical reflex circuit was used in inexpensive vacuum tube radios in the 1920s, and was revived again in simple portable tube radios in the 1930s.\nhttps://en.wikipedia.org/wiki/Superheterodyne_receiver - often shortened to superhet, is a type of radio receiver that uses frequency mixing to convert a received signal to a fixed intermediate frequency (IF) which can be more conveniently processed than the original carrier frequency. It was invented by US engineer Edwin Armstrong in 1918 during World War I. Virtually all modern radio receivers use the superheterodyne principle.\nhttps://en.wikipedia.org/wiki/Frequency_mixer - a nonlinear electrical circuit that creates new frequencies from two signals applied to it. In its most common application, two signals are applied to a mixer, and it produces new signals at the sum and difference of the original frequencies. Other frequency components may also be produced in a practical frequency mixer.\nhttps://en.wikipedia.org/wiki/Heterodyne - a signal processing technique invented by Canadian inventor-engineer Reginald Fessenden that creates new frequencies by combining or mixing two frequencies. Heterodyning is used to shift one frequency range into another, new one, and is also involved in the processes of modulation and demodulation. The two frequencies are combined in a nonlinear signal-processing device such as a vacuum tube, transistor, or diode, usually called a mixer.\nhttps://en.wikipedia.org/wiki/Intermediate_frequency - a frequency to which a carrier wave is shifted as an intermediate step in transmission or reception. The intermediate frequency is created by mixing the carrier signal with a local oscillator signal in a process called heterodyning, resulting in a signal at the difference or beat frequency. Intermediate frequencies are used in superheterodyne radio receivers, in which an incoming signal is shifted to an IF for amplification before final detection is done.Conversion to an intermediate frequency is useful for several reasons. When several stages of filters are used, they can all be set to a fixed frequency, which makes them easier to build anreflectional receiverd to tune. Lower frequency transistors generally have higher gains so fewer stages are required. It's easier to make sharply selective filters at lower fixed frequencies.There may be several such stages of intermediate frequency in a superheterodyne receiver; two or three stages are called double (alternatively, dual) or triple conversion, respectively.\nhttps://en.wikipedia.org/wiki/Direct-conversion_receiver - also known as homodyne, synchrodyne, or zero-IF receiver, is a radio receiver design that demodulates the incoming radio signal using synchronous detection driven by a local oscillator whose frequency is identical to, or very close to the carrier frequency of the intended signal. This is in contrast to the standard superheterodyne receiver where this is accomplished only after an initial conversion to an intermediate frequency. The simplification of performing only a single frequency conversion reduces the basic circuit complexity but other issues arise, for instance, regarding dynamic range and image rejection. In its original form it was unsuited to receiving AM and FM signals without implementing an elaborate phase locked loop. Although these and other technical challenges made this technique rather impractical around the time of its invention (1930's), current technology, and software radio in particular, have revived its use in certain areas including some consumer products.\nhttps://en.wikipedia.org/wiki/Duplex_(telecommunications) - a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions. Duplex systems are employed in many communications networks, either to allow for simultaneous communication in both directions between two connected parties or to provide a reverse path for the monitoring and remote adjustment of equipment in the field. There are two types of duplex communication systems: full-duplex (FDX) and half-duplex (HDX).\nhttps://en.wikipedia.org/wiki/Selective_calling - used to address a subset of all two-way radios on a single radio frequency channel. Where more than one user is on the same channel, (co-channel users,) selective calling can address a subset of all receivers or can direct a call to a single radio. Selective calling features fit into two major categories — individual calling and group calling. Individual calls generally have longer time-constants: it takes more air-time to call an individual radio unit than to call a large group of radios.Selective calling is akin to the use of a lock on a door. A radio with carrier squelch is unlocked and will let any signal in. Selective calling locks out all signals except ones with the correct \"key\", in this case a specific digital code. Selective calling systems can overlap; a radio may have (group call) and DTMF individual calling.\nhttps://en.wikipedia.org/wiki/Call_sign - also known as a call name' or call letters, historically as a call signal, or abbreviated as a call, is a unique designation for a transmitter station. In North America, they are used for all FCC-licensed transmitters. A call sign can be formally assigned by a government agency, informally adopted by individuals or organizations, or even cryptographically encoded to disguise a station's identity. The use of call signs as unique identifiers dates to the landline railroad telegraph system. Because there was only one telegraph line linking all railroad stations, there needed to be a way to address each one when sending a telegram. In order to save time, two-letter identifiers were adopted for this purpose. This pattern continued in radiotelegraph operation; radio companies initially assigned two-letter identifiers to coastal stations and stations aboard ships at sea. These were not globally unique, so a one-letter company identifier (for instance, 'M' and two letters as a Marconi station) was later added. By 1912, the need to quickly identify stations operated by multiple companies in multiple nations required an international standard; an ITU prefix would be used to identify a country, and the rest of the call sign an individual station in that country.\nhttps://en.wikipedia.org/wiki/Radio_spectrum - the part of the electromagnetic spectrum from 3 Hz to 3000 GHz (3 THz). Electromagnetic waves in this frequency range, called radio waves, are extremely widely used in modern technology, particularly in telecommunication. To prevent interference between different users, the generation and transmission of radio waves is strictly regulated by national laws, coordinated by an international body, the International Telecommunication Union (ITU).\nDifferent parts of the radio spectrum are appointed by the ITU for different radio transmission technologies and applications; some 40 radiocommunication services are defined in the ITU's Radio Regulations (RR). In some cases, parts of the radio spectrum are sold or licensed to operators of private radio transmission services (for example, cellular telephone operators or broadcast television stations). Ranges of allocated frequencies are often referred to by their provisioned use (for example, cellular spectrum or television spectrum).\nhttps://en.wikipedia.org/wiki/Extremely_low_frequency - electromagnetic radiation (radio waves) with frequencies from 3 to 30 Hz, and corresponding wavelengths of 100,000 to 10,000 kilometers, respectively. In atmospheric science, an alternative definition is usually given, from 3 Hz to 3 kHz. In the related magnetosphere science, the lower frequency electromagnetic oscillations (pulsations occurring below ~3 Hz) are considered to lie in the ULF range, which is thus also defined differently from the ITU radio bands.\nELF radio waves are generated by lightning and natural disturbances in Earth's magnetic field, so they are a subject of research by atmospheric scientists. Because of the difficulty of building antennas that can radiate such long waves, ELF frequencies have been used in only a very few human-made communication systems. ELF waves can penetrate seawater, which makes them useful in communication with submarines. The US, Russia, and India are the only nations known to have constructed ELF communication facilities. The U.S. facilities were used between 1985 and 2004 but are now decommissioned. ELF waves can also penetrate significant distances into earth or rock, and \"through-the-earth\" underground mine communication systems use frequencies of 300 to 3000 Hz. The frequency of alternating current flowing in electric power grids, 50 or 60 Hz, also falls within the ELF band, making power grids an unintentional source of ELF radiation.\nhttps://en.wikipedia.org/wiki/Super_low_frequency - frequency range between 30 hertz and 300 hertz. They have corresponding wavelengths of 10,000 to 1,000 kilometers. This frequency range includes the frequencies of AC power grids (50 hertz and 60 hertz). Another conflicting designation which includes this frequency range is Extremely Low Frequency (ELF), which in some contexts refers to all frequencies up to 300 hertz.\nhttps://en.wikipedia.org/wiki/Ultra_low_frequency - frequency range of electromagnetic waves between 300 hertz and 3 kilohertz. In magnetosphere science and seismology, alternative definitions are usually given, including ranges from 1 mHz to 100 Hz, 1 mHz to 1 Hz, 10 mHz to 10 Hz. Frequencies above 3 Hz in atmosphere science are usually assigned to the ELF range.\nhttps://en.wikipedia.org/wiki/Low_frequency - LF is the ITU designation for radio frequencies (RF) in the range of 30 kHz–300 kHz. As its wavelengths range from ten kilometres to one kilometre, respectively, it is also known as the kilometre band or kilometre wave. LF radio waves exhibit low signal attenuation, making them suitable for long-distance communications. In Europe and areas of Northern Africa and Asia, part of the LF spectrum is used for AM broadcasting as the \"longwave\" band. In the western hemisphere, its main use is for aircraft beacon, navigation (LORAN), information, and weather systems. A number of time signal broadcasts are also broadcast in this band.\nhttps://en.wikipedia.org/wiki/Longwave - also written as long wave (in British and American parlance) or long-wave, and commonly abbreviated LW, refers to parts of the radio spectrum with relatively long wavelengths. The term is an historic one, dating from the early 20th century, when the radio spectrum was considered to consist of long (LW), medium (MW) and short (SW) radio wavelengths. Most modern radio systems and devices use wavelengths which would then have been considered 'ultra-short'.\nIn contemporary usage, the term longwave is not defined precisely, and its meaning varies across the world. Most commonly, it refers to radio wavelengths longer than 1000 metres; frequencies less than 300 kilohertz (kHz), including the International Telecommunications Union's (ITU's) low frequency (LF) (30–300 kHz) and very low frequency (VLF) (3–30 kHz) bands. Sometimes, part of the medium frequency (MF) band (300–3000 kHz) is included.\nhttps://en.wikipedia.org/wiki/Medium_wave - the part of the medium frequency (MF) radio band used mainly for AM radio broadcasting. For Europe the MW band ranges from 526.5 kHz to 1606.5 kHz, using channels spaced every 9 kHz, and in North America an extended MW broadcast band goes from 535 kHz to 1705 kHz, using 10 kHz spaced channels.\nhttps://en.wikipedia.org/wiki/Shortwave_radio - radio transmission using shortwave frequencies, generally 1.6–30 MHz (187.4–10.0 m), just above the medium wave AM broadcast band.\nRadio waves in this band can be reflected or refracted from a layer of electrically charged atoms in the atmosphere called the ionosphere. Therefore short waves directed at an angle into the sky can be reflected back to Earth at great distances, beyond the horizon. This is called skywave or skip propagation. Thus shortwave radio can be used for very long distance communication, in contrast to radio waves of higher frequency which travel in straight lines (line-of-sight propagation) and are limited by the visual horizon, about 40 miles. Shortwave radio is used for broadcasting of voice and music to shortwave listeners over very large areas; sometimes entire continents or beyond. It is also used for military over-the-horizon radar, diplomatic communication, and two-way international communication by amateur radio enthusiasts for hobby, educational and emergency purposes.\nhttps://en.wikipedia.org/wiki/Microwave - with wavelengths ranging from one meter to one millimeter; with frequencies between 300 MHz (100 cm) and 300 GHz (0.1 cm). This broad definition includes both UHF and EHF (millimeter waves), and various sources use different boundaries. In all cases, microwave includes the entire SHF band (3 to 30 GHz, or 10 to 1 cm) at minimum, with RF engineering often restricting the range between 1 and 100 GHz (300 and 3 mm).\nThe prefix micro- in microwave is not meant to suggest a wavelength in the micrometer range. It indicates that microwaves are \"small\", compared to waves used in typical radio broadcasting, in that they have shorter wavelengths. The boundaries between far infrared, terahertz radiation, microwaves, and ultra-high-frequency radio waves are fairly arbitrary and are used variously between different fields of study.\nhttps://en.wikipedia.org/wiki/Extremely_high_frequency - EHF, from 30 to 300 gigahertz. It lies between the super high frequency band, and the far infrared band which is also referred to as the terahertz gap. Radio waves in this band have wavelengths from ten to one millimetre, giving it the name millimetre band or millimetre wave, sometimes abbreviated MMW or mmW. Millimetre-length electromagnetic waves were first investigated in the 1890s by Indian scientist Jagadish Chandra Bose.\nhttps://en.wikipedia.org/wiki/Terahertz_radiation - also known as submillimeter radiation, terahertz waves, tremendously high frequency, T-rays, T-waves, T-light, T-lux or THz – consists of electromagnetic waves within the ITU-designated band of frequencies from 0.3 to 3 terahertz (THz; 1 THz = 1012 Hz). Wavelengths of radiation in the terahertz band correspondingly range from 1 mm to 0.1 mm (or 100 μm). Because terahertz radiation begins at a wavelength of one millimeter and proceeds into shorter wavelengths, it is sometimes known as the submillimeter band, and its radiation as submillimeter waves, especially in astronomy.\nTerahertz radiation occupies a middle ground between microwaves and infrared light waves known as the terahertz gap, where technology for its generation and manipulation is in its infancy. It represents the region in the electromagnetic spectrum where the frequency of electromagnetic radiation becomes too high to be measured digitally via electronic counters, so must be measured by proxy using the properties of wavelength and energy. Similarly, the generation and modulation of coherent electromagnetic signals in this frequency range ceases to be possible by the conventional electronic devices used to generate radio waves and microwaves, requiring the development of new devices and techniques. Photon energy in THz regime is less than band-gap of nonmetallic materials and thus THz beam can traverse through such materials. The transmitted THz beam is used for material characterization, layer inspection and developing transmission images.\nhttps://en.wikipedia.org/wiki/Terahertz_gap - an engineering term for a band of frequencies in the terahertz region of the electromagnetic spectrum between radio waves and infrared light for which practical technologies for generating and detecting the radiation do not exist. It is defined as 0.1 to 10 THz (wavelengths of 3 mm to 30 µm). Currently, at frequencies within this range, useful power generation and receiver technologies are inefficient and impractical.\nhttps://en.wikipedia.org/wiki/Far_infrared - often defined as any radiation with a wavelength of 15 micrometers (µm) to 1 mm (corresponding to a range of about 20 THz to 300 GHz), which places far infrared radiation within the CIE IR-B and IR-C bands. Different sources use different boundaries for the far infrared spectrum; for example, astronomers sometimes define far infrared as wavelengths between 25 µm and 350 µm. Visible light includes radiation with wavelengths between 400 nm and 700 nm, meaning that far infrared photons have less energy than visible light photons.\nA.T.V - probably the most extensive aerials site on the Internet and in 2017 we had 370,000 visitors with 810,000 page hits. In fact even “the trade” use this site. Actually, even we use it if we want to check up on anything to do with aerials !\nhttps://en.wikipedia.org/wiki/Antenna_feed - refers to several slightly different parts of an antenna system: The antenna feed is the wire or cabling (transmission line) that connects between the antenna and the radio, specifically called the feed line; The antenna feed is the location on the antenna where the feedline from the receiver or transmitter connects or attaches; The antenna feed is the matching system at the attachment point that converts the feedline impedance to the antenna’s intrinsic impedance, and makes any balanced-to-unbalanced conversion (if necessary).\nhttps://en.wikipedia.org/wiki/Feed_horn - In parabolic antennas such as satellite dishes, a feed horn (or feedhorn) is a small horn antenna used to convey radio waves between the transmitter and/or receiver and the parabolic reflector. In transmitting antennas, it is connected to the transmitter and converts the radio frequency alternating current from the transmitter to radio waves and feeds them to the rest of the antenna, which focuses them into a beam. In receiving antennas, incoming radio waves are gathered and focused by the antenna's reflector on the feed horn, which converts them to a tiny radio frequency voltage which is amplified by the receiver. Feed horns are used mainly at microwave (SHF) and higher frequencies.\nhttps://en.wikipedia.org/wiki/Hirose_U.FL - a miniature RF connector for high-frequency signals up to 6 GHz manufactured by Hirose Electric Group and others.U.FL connectors are commonly used in applications where space is of critical concern, most often Mini PCI cards for laptop computers. U.FL connectors are commonly used inside laptops and embedded systems to connect the Wi-Fi antenna to a Mini PCI card. Another common use is connecting GPS antennas.\nAmateur Radio Stack Exchange: antenna - What makes a 5/8 wavelength vertical desirable?\nhttps://en.wikipedia.org/wiki/Horn_antenna - or microwave horn is an antenna that consists of a flaring metal waveguide shaped like a horn to direct radio waves in a beam. Horns are widely used as antennas at UHF and microwave frequencies, above 300 MHz. They are used as feed antennas (called feed horns) for larger antenna structures such as parabolic antennas, as standard calibration antennas to measure the gain of other antennas, and as directive antennas for such devices as radar guns, automatic door openers, and microwave radiometers. Their advantages are moderate directivity, low standing wave ratio (SWR), broad bandwidth, and simple construction and adjustment.\nhttps://en.wikipedia.org/wiki/Yagi–Uda_antenna - ommonly known as a Yagi antenna, is a directional antenna consisting of multiple parallel elements in a line, usually half-wave dipoles made of metal rods. Yagi–Uda antennas consist of a single driven element connected to the transmitter or receiver with a transmission line, and additional \"parasitic elements\" which are not connected to the transmitter or receiver: a so-called reflector and one or more directors. It was invented in 1926 by Shintaro Uda of Tohoku Imperial University, Japan, and (with a lesser role played by his colleague) Hidetsugu Yagi. The reflector element is slightly longer than the driven dipole, whereas the directors are a little shorter. The parasitic elements absorb and reradiate the radio waves from the driven element with a different phase, modifying the dipole's radiation pattern. The waves from the multiple elements superpose and interfere to enhance radiation in a single direction, achieving a very substantial increase in the antenna's gain compared to a simple dipole.Also called a \"beam antenna\",or \"parasitic array\", the Yagi is very widely used as a high-gain antenna on the HF, VHF and UHF bands. It has moderate to high gain which depends on the number of elements used, typically limited to about 20 dBi, linear polarization, unidirectional (end-fire) beam pattern with high front-to-back ratio of up to 20 db. and is lightweight, inexpensive and simple to construct. The bandwidth of a Yagi antenna, the frequency range over which it has high gain, is narrow, a few percent of the center frequency, and decreases with increasing gain, so it is often used in fixed-frequency applications. The largest and best-known use is as rooftop terrestrial television antennas, but it is also used for point-to-point fixed communication links, in radar antennas, and for long distance shortwave communication by shortwave broadcasting stations and radio amateurs.\nhttps://en.wikipedia.org/wiki/Loop_antenna - a radio antenna consisting of a loop or coil of wire, tubing, or other electrical conductor usually fed by a balanced source or feeding a balanced load. Within this physical description there are two distinct antenna types. The large self-resonant loop antenna has a circumference close to one wavelength of the operating frequency and so is resonant at that frequency. This category also includes smaller loops 5% to 30% of a wavelength in circumference, which use a capacitor to make them resonant. These antennas are used for both transmission and reception. In contrast, small loop antennas less than 1% of a wavelength in size are very inefficient radiators, and so are only used for reception. An example is the ferrite (loopstick) antenna used in most AM broadcast radios. Loop antennas have a dipole radiation pattern; they are most sensitive to radio waves in two broad lobes in opposite directions, 180° apart. Due to this directional pattern they are used for radio direction finding (RDF), to locate the position of a transmitter.\nhttps://en.wikipedia.org/wiki/Leaky_feeder - a communications system used in underground mining and other tunnel environments. Manufacturers and cabling professionals use the term \"radiating cable\" as this implies that the cable is designed to radiate: something that coaxial cable is not generally supposed to do.\nAM radio ranges from 535 to 1705 kilohertz, stations are possible every 10 kHz.\nSystem Bus Radio - Transmits AM radio on computers without radio transmitting hardware.\nFM radio ranges in a higher spectrum from 88 to 108 megahertz, stations are possible every 200 kHz.\nhttps://en.wikipedia.org/wiki/In-band_on-channel - a hybrid method of transmitting digital radio and analog radio broadcast signals simultaneously on the same frequency.\nhttps://en.wikipedia.org/wiki/Digital_audio_broadcasting - DAB standard was initiated as a European research project in the 1980s. The Norwegian Broadcasting Corporation (NRK) launched the first DAB channel in the world on 1 June 1995 (NRK Klassisk), and the BBC and Swedish Radio (SR) launched their first DAB digital radio broadcasts in September 1995. DAB receivers have been available in many countries since the end of the 1990s.\nAudio quality varies depending on the bitrate used and audio material. Most stations use a bit rate of 128 kbit/s or less with the MP2 audio codec, which requires 160 kbit/s to achieve perceived FM quality. 128 kbit/s gives better dynamic range or signal-to-noise ratio than FM radio, but a more smeared stereo image, and an upper cut-off frequency of 14 kHz, corresponding to 15 kHz of FM radio. However, \"CD quality\" sound with MP2 is possible \"with 256…192 kbps\".\nAn upgraded version of the system was released in February 2007, which is called DAB+. DAB is not forward compatible with DAB+, which means that DAB-only receivers are not able to receive DAB+ broadcasts. However, broadcasters can mix DAB and DAB+ programs inside the same transmission and so make a progressive transition to DAB+. DAB+ is approximately twice as efficient as DAB, and more robust.\nhttps://en.wikipedia.org/wiki/Digital_audio_radio_service - Satellite Digital Audio Radio Service, used by Sirius Satellite Radio and XM Satellite Radio. XM and Sirius both operate in the 2.3-GHz S band, from 2320 to 2345 MHz.\nhttps://en.wikipedia.org/wiki/Digital_Radio_Mondiale - DRM, a set of digital audio broadcasting technologies designed to work over the bands currently used for analogue radio broadcasting including AM broadcasting, particularly shortwave, and FM broadcasting. DRM is more spectrally efficient than AM and FM, allowing more stations, at higher quality, into a given amount of bandwidth, using various MPEG-4 audio coding formats.\nhttps://en.wikipedia.org/wiki/CAM-D - Compatible Amplitude Modulation - Digital or CAM-D is a hybrid digital radio format for AM broadcasting, proposed by broadcast engineer Leonard R. Kahn.The system is an in-band on-channel technology that uses the sidebands of any AM radio station. Analog information is still used up to a bandpass of about 7.5kHz, with standard amplitude modulation. The missing treble information that AM normally lacks is then transmitted digitally beyond this. Audio mixing in the receiver then blends them back together.\nUnlike other IBOC technologies like iBiquity's HD Radio, Kahn's apparently does not provide a direct path to all-digital transmissions, nor any multichannel capability. Its advantage, however, is that it takes up far less of the sidebands, thereby causing far less interference to adjacent channels, hence the \"Compatible\" in the name. Interference has affected HD Radio on AM, along with its (like CAM-D) proprietary nature.\nDigital Radio Mondiale, commonly used in shortwave broadcasting, can use less, the same, or more bandwidth as AM, to provide high quality audio. Digital Radio Mondiale requires digital detection circuitry not present in conventional AM radios to decode programming.Special CAM-D receivers provide the benefit of better frequency response and a slow auxiliary data channel for display of station ID, programming titles, etc.\nhttps://en.wikipedia.org/wiki/Trunked_radio_system - two-way radio system that uses a control channel to automatically direct radio traffic. Two-way radio systems are either trunked or conventional, where conventional is manually directed by the radio user. Trunking is a more automated and complex radio system, but provides the benefits of less user intervention to operate the radio and greater spectral efficiency with large numbers of users. Instead of assigning, for example, a radio channel to one particular organization at a time, users are instead assigned to a logical grouping, a \"talkgroup\". When any user in that group wishes to converse with another user in the talkgroup, a vacant radio channel is found automatically by the system and the conversation takes place on that channel. Many unrelated conversations can occur on a channel, making use of the otherwise idle time between conversations. Each radio transceiver contains a microcomputer to control it. A control channel coordinates all the activity of the radios in the system. The control channel computer sends packets of data to enable one talkgroup to talk together, regardless of frequency.\nhttps://github.com/robotastic/trunk-recorder - Trunk Recorder is able to record the calls on trunked and conventional radio systems. It uses 1 or more Software Defined Radios (SDRs) to do this. The SDRs capture large swatches of RF and then use software to process what was received. GNURadio is used to do this processing because it provides lots of convenient RF blocks that can be pieced together to allow for complex RF processing. The libraries from the amazing OP25 project are used for a lot of the P25 functionality. Multiple radio systems can be recorded at the same time.\nhttps://en.wikipedia.org/wiki/Amateur_radio - also called ham radio, describes the use of radio frequency spectrum for purposes of non-commercial exchange of messages, wireless experimentation, self-training, private recreation, radiosport, contesting, and emergency communication. The term \"amateur\" is used to specify \"a duly authorised person interested in radioelectric practice with a purely personal aim and without pecuniary interest;\" (either direct monetary or other similar reward) and to differentiate it from commercial broadcasting, public safety (such as police and fire), or professional two-way radio services (such as maritime, aviation, taxis, etc.).\nThe amateur radio service (amateur service and amateur-satellite service) is established by the International Telecommunication Union (ITU) through the International Telecommunication Regulations. National governments regulate technical and operational characteristics of transmissions and issue individual stations licenses with an identifying call sign. Prospective amateur operators are tested for their understanding of key concepts in electronics and the host government's radio regulations. Radio amateurs use a variety of voice, text, image, and data communications modes and have access to frequency allocations throughout the RF spectrum to enable communication across a city, region, country, continent, the world, or even into space.\nAmateur-radio-wiki - This site aims to enable ham operators and curious alike to document, share and explore the fantastic world of amateur radio.\nham-radio.com - site and it's hosted organizations offered as a free service to the Amateur Radio community.\nFldigi - a modem program for most of the digital modes used by radio amateurs today: CW, PSK, MFSK, RTTY, Hell, DominoEX, Olivia, and Throb are all supported. It can help calibrate a sound card to a time signal and do frequency measurement tests.\nFreeDV: Open Source Amateur Digital Voice – Where Amateur Radio Is Driving The State of the Art - a Digital Voice mode for HF radio. You can run FreeDV using a free GUI application for Windows, Linux and OSX that allows any SSB radio to be used for low bit rate digital voice. Alternatively you can buy a SM1000 FreeDV adaptor that allows you to run FreeDV on any HF radio without a PC or sound card. If you are a hardware or software developer, you can integrate FreeDV into your project using the LGPL licensed FreeDV API. Speech is compressed down to 700-1600 bit/s then modulated onto a 1.25 kHz wide signal comprised of 16 QPSK carriers which is sent to the Mic input of a SSB radio. The signal is received by an SSB radio, then demodulated and decoded by FreeDV. FreeDV 700C is approaching SSB in it’s low SNR performance. At high SNRs FreeDV 1600 sounds like FM, with no annoying analog HF radio noise. FreeDV was built by an international team of Radio Amateurs working together on coding, design, user interface and testing. FreeDV is open source software, released under the GNU Public License version 2.1. The modems and Codec 2 speech codec used in FreeDV are also open source.\nhttps://github.com/dh1tw/remoteAudio - a cross plattform audio streaming application, built for Amateur Radio purposes. The most typical use case for this software is the remote operation of an amateur radio station. remoteAudio is written in Go.\nHamWAN - a non-profit organization (501c3) developing best practices for high speed amateur radio data networks. HamWAN also runs the Puget Sound Data Ring, which is a real-world network implementation of the proposed designs.So far, HamWAN networks have been used for things like low-latency repeater linking, real-time video feeds from distant locations, serving APRS I-gates, providing redundant internet access to emergency operations centers, and more. Any licensed radio amateur in the service area can connect their shack directly to the network with just a small investment in equipment and no recurring cost. Since many traditional uses for Internet at home are not compatible with Part 97 rules, this won't replace your home Internet connection. However, it works and acts just like one.\nhttps://en.wikipedia.org/wiki/Radio_control - the use of radio signals to remotely control a device. Radio control is used for control of model vehicles from a hand-held radio transmitter. Industrial, military, and scientific research organizations make use of radio-controlled vehicles as well.\nOpenSesame is a device that can wirelessly open virtually any fixed-code garage door in seconds, exploiting a new attack I've discovered on wireless fixed-pin devices. Using a child's toy from Mattel.\nhttps://github.com/jontio/libaeroambe - an mini-m decoder library.\nhttps://en.wikipedia.org/wiki/AIS-SART - a self-contained radio device used to locate a survival craft or distressed vessel by sending updated position reports using a standard Automatic Identification System (AIS) class-A position report. The position and time synchronization of the AIS-SART are derived from a built in GNSS receiver (e.g. GPS). Shipboard Global Maritime Distress Safety System (GMDSS) installations include one or more search and rescue locating devices. These devices may be either an AIS-SART (AIS Search and Rescue Transmitter) (from January 1, 2010), or a radar-SART (Search and Rescue Transponder).\nhttps://en.wikipedia.org/wiki/Automatic_link_establishment - commonly known as ALE, is the worldwide de facto standard for digitally initiating and sustaining HF radio communications. ALE is a feature in an HF communications radio transceiver system that enables the radio station to make contact, or initiate a circuit, between itself and another HF radio station or network of stations. The purpose is to provide a reliable rapid method of calling and connecting during constantly changing HF ionospheric propagation, reception interference, and shared spectrum use of busy or congested HF channels.\nhttps://en.wikipedia.org/wiki/Automatic_Packet_Reporting_System - an amateur radio-based system for real time digital communications of information of immediate value in the local area. Data can include object Global Positioning System (GPS) coordinates, weather station telemetry, text messages, announcements, queries, and other telemetry. APRS data can be displayed on a map, which can show stations, objects, tracks of moving objects, weather stations, search and rescue data, and direction finding data. In its most widely used form, APRS is transported over the AX.25 protocol using 1200 bit/s Bell 202 AFSK on frequencies located within the 2 meter amateur band.\naprs.fi map - The positions of the amateur radio operators and their vehicles are received from the APRS-IS network on the Internet. Most of them are originally transmitted on amateur radio frequencies (typically around 145 MHz), and received and forwarded to the APRS-IS by igate stations run by clubs and individuals around the world. The positions of ships are received from the AIS frequencies by receiving stations around the world. If you wish to receive AIS transmissions and provide them to the service, you're more than welcome to do so.\nhttps://en.wikipedia.org/wiki/Telegraph_key - a switching device used primarily to send Morse code. Similar keys are used for all forms of manual telegraphy, such as in ‘wire’ or electrical telegraph and ‘wireless’ or radio telegraphy.\nhttps://en.wikipedia.org/wiki/Q_code a standardized collection of three-letter codes all of which start with the letter \"Q\". It is a brevity code initially developed for commercial radiotelegraph communication and later adopted by other radio services, especially amateur radio. To distinguish the use of \"Q\" codes transmitted as questions from those transmitted as statements, operators used the Morse question \"INT\" (dit dit dah dit dah) as a prefix to the \"Q\" code. Although Q codes were created when radio used Morse code exclusively, they continued to be employed after the introduction of voice transmissions. To avoid confusion, transmitter call signs are restricted; no country is ever issued an ITU prefix starting with \"Q\". Codes in the range QAA–QNZ are reserved for aeronautical use; QOA–QQZ for maritime use and QRA–QUZ for all services. \"Q\" has no official meaning, but it is sometimes assigned with a word with mnemonic value, such as \"Queen's\" (e.g. QFE = Queen's Field Elevation), \"Query\", \"Question\", or \"reQuest\".\nhttps://en.wikipedia.org/wiki/ACARS - an acronym for aircraft communications addressing and reporting system) is a digital datalink system for transmission of short messages between aircraft and ground stations via airband radio or satellite. The protocol was designed by ARINC and deployed in 1978, using the Telex format. More ACARS radio stations were added subsequently by SITA.\nJAERO - a program that demodulates and decodes Classic Aero ACARS (Aircraft Communications Addressing and Reporting System) messages sent from satellites to Aeroplanes (SatCom ACARS) commonly used when Aeroplanes are beyond VHF range. Demodulation is performed using the soundcard. Such signals are typically around 1.5Ghz and can be received with a simple low gain antenna that can be home brewed in a few hours in conjunction with a cheap RTL-SDR dongle.\nhttps://en.wikipedia.org/wiki/WSPR_(amateur_radio_software) - pronounced \"whisper\", stands for \"Weak Signal Propagation Reporter\". It is a protocol, implemented in a computer program, used for weak-signal radio communication between amateur radio operators. The protocol was designed, and a program written initially, by Joe Taylor, K1JT. Software is now open source and is developed by a small team. The program is designed for sending and receiving low-power transmissions to test propagation paths on the MF and HF bands.\nWSPR implements a protocol designed for probing potential propagation paths with low-power transmissions. Transmissions carry a station's callsign, Maidenhead grid locator, and transmitter power in dBm. The program can decode signals with S/N as low as −28 dB in a 2500 Hz bandwidth. Stations with internet access can automatically upload their reception reports to a central database called WSPRnet, which includes a mapping facility.\nWSPRnet - a group of amateur radio operators using K1JT's MEPT_JT digital mode to probe radio frequency propagation conditions using very low power (QRP/QRPp) transmissions. The software is open source, and the data collected are available to the public through this site.\nhttps://github.com/threeme3/WsprryPi - Makes a very simple WSPR beacon from your RasberryPi by connecting GPIO port to Antanna (and LPF), operates on LF, MF, HF and VHF bands from 0 to 250 MHz.\nhttps://en.wikipedia.org/wiki/Low-rate_picture_transmission - LRPT, is a digital transmission system, intended to deliver images and data from an orbital weather satellite directly to end users via a VHF radio signal. It is used aboard polar-orbiting, near-Earth weather satellite programs such as MetOp and NPOESS.\nhttps://en.wikipedia.org/wiki/Radio_Data_System - a communications protocol standard for embedding small amounts of digital information in conventional FM radio broadcasts. RDS standardizes several types of information transmitted, including time, station identification and program information.The standard began as a project of the European Broadcasting Union (EBU), but has since become an international standard of the International Electrotechnical Commission (IEC). Radio Broadcast Data System (RBDS) is the official name used for the U.S. version of RDS. The two standards are only slightly different.Both carry data at 1,187.5 bits per second on a 57 kHz subcarrier, so there are exactly 48 cycles of subcarrier during every data bit. The RBDS/RDS subcarrier was set to the third harmonic of the 19 kHz FM stereo pilot tone to minimize interference and intermodulation between the data signal, the stereo pilot and the 38 kHz DSB-SC stereo difference signal. (The stereo difference signal extends up to 38 kHz + 15 kHz = 53 kHz, leaving 4 kHz for the lower sideband of the RDS signal.) The data is sent with error correction. RDS defines many features including how private (in-house) or other undefined features can be \"packaged\" in unused program groups.\nRDS Surveyor — Radio Data System decoder - a complete open-source tool for decoding and analyzing Radio Data System (RDS) data. RDS (also known as RBDS in North America) is a communication protocol for embedding streams of digital information in FM radio broadcasts.RDS Surveyor is Java-based, hence it runs on all platforms. It has been successfully used on Linux, MacOS and Windows.\nhttps://en.wikipedia.org/wiki/Subsidiary_communications_authority - the United States, and Subsidiary Communications Multiplex Operation (SCMO) in Canada, is a subcarrier on a radio station, allowing the station to broadcast additional services as part of its signal.\nPhasor is a demo running on a custom minimalistic ATmega88-based demo platform that generates a composite video signal (PAL).\nhttps://en.wikipedia.org/wiki/Amateur_television - the transmission of broadcast quality video and audio over the wide range of frequencies of radio waves allocated for radio amateur (Ham) use. ATV is used for non-commercial experimentation, pleasure, and public service events. Ham TV stations were on the air in many cities before commercial television stations came on the air. Various transmission standards are used, these include the broadcast transmission standards of NTSC in North America and Japan, and PAL or SECAM elsewhere, utilizing the full refresh rates of those standards. ATV includes the study of building of such transmitters and receivers, and the study of radio propagation of signals travelling between transmitting and receiving stations. ATV is an extension of amateur radio. It is also called HAM TV or fast-scan TV (FSTV), as opposed to slow-scan television (SSTV). SSTV is a method of transmitting still images over radio, when it is not possible to send video.\nhttps://en.wikipedia.org/wiki/Slow-scan_television - a picture transmission method used mainly by amateur radio operators, to transmit and receive static pictures via radio in monochrome or color. A literal term for SSTV is narrowband television. Analog broadcast television requires at least 6 MHz wide channels, because it transmits 25 or 30 picture frames per second (in the NTSC, PAL or SECAM color systems), but SSTV usually only takes up to a maximum of 3 kHz of bandwidth. It is a much slower method of still picture transmission, usually taking from about eight seconds to a couple of minutes, depending on the mode used, to transmit one image frame. Since SSTV systems operate on voice frequencies, amateurs use it on shortwave (also known as HF by amateur radio operators), VHF and UHF radio.\nhttps://en.wikipedia.org/wiki/Radiofax - also known as weatherfax (portmanteau word from the words \"weather facsimile\") and HF fax (due to its common use on shortwave radio), is an analogue mode for transmitting monochrome images. It was the predecessor to slow-scan television (SSTV). Prior to the advent of the commercial telephone line \"fax\" machine, it was known, more traditionally, by the term \"radiofacsimile\". The cover of the regular NOAA publication on frequencies and schedules states \"Worldwide Marine Radiofacsimile Broadcast Schedules\".\nhttps://en.wikipedia.org/wiki/Radioteletype - a telecommunications system consisting originally of two or more electromechanical teleprinters in different locations connected by radio rather than a wired link. These machines were superseded by personal computers (PCs) running software to emulate teleprinters. Radioteletype evolved from earlier landline teleprinter operations that began in the mid-1800s. The US Navy Department successfully tested printing telegraphy between an airplane and ground radio station in 1922. Later that year, the Radio Corporation of America successfully tested printing telegraphy via their Chatham, Massachusetts, radio station to the R.M.S. Majestic. Commercial RTTY systems were in active service between San Francisco and Honolulu as early as April 1932 and between San Francisco and New York City by 1934. The US military used radioteletype in the 1930s and expanded this usage during World War II. From the 1980s, teleprinters were replaced by computers running teleprinter emulation software. The term radioteletype is used to describe both the original radioteletype system, sometimes described as \"Baudot\", as well as the entire family of systems connecting two or more teleprinters or PCs using software to emulate teleprinters, over radio, regardless of alphabet, link system or modulation.In some applications, notably military and government, radioteletype is known by the acronym RATT (Radio Automatic Teletype).\nhttps://en.wikipedia.org/wiki/Packet_radio - a form of packet switching technology used to transmit digital data via wireless communications. Packet radio uses the same concepts of data transmission using datagrams that are fundamental to communications on the Internet, as opposed to older techniques used by dedicated or switched circuits. Packet radio can be used over long distances without the need for a physical connection between stations. Packet radio can also be used for mobile communications.\nhttps://en.wikipedia.org/wiki/AX.25 - a data link layer protocol originally derived from layer 2 of the X.25 protocol suite and designed for use by amateur radio operators. It is used extensively on amateur packet radio networks.AX.25 v2.0 and later occupies the data link layer, the second layer of the OSI model. It is responsible for establishing link-layer connections, transferring data encapsulated in frames between nodes, and detecting errors introduced by the communications channel. As AX.25 is a pre-OSI-model protocol, the original specification was not written to cleanly separate into OSI layers. This was rectified with version 2.0 (1984), which assumes compliance with OSI level 2.\nhttps://en.wikipedia.org/wiki/Datacasting - the broadcasting of data over a wide area via radio waves. It most often refers to supplemental information sent by television stations along with digital television, but may also be applied to digital signals on analog TV or radio. It generally does not apply to data which is inherent to the medium, such as PSIP data which defines virtual channels for DTV or direct broadcast satellite systems; or to things like cable modem or satellite modem, which use a completely separate channel for data.\nhttps://en.wikipedia.org/wiki/Bluetooth - a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.400 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs). Invented by Dutch electrical engineer Jaap Haartsen, working for telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables.\nhttps://en.wikipedia.org/wiki/Bluetooth_Low_Energy - Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries. Compared to Classic Bluetooth, Bluetooth Low Energy is intended to provide considerably reduced power consumption and cost while maintaining a similar communication range.Mobile operating systems including iOS, Android, Windows Phone and BlackBerry, as well as macOS, Linux, Windows 8 and Windows 10, natively support Bluetooth Low Energy. The Bluetooth SIG predicts that by 2018 more than 90% of Bluetooth-enabled smartphones will support Bluetooth Low Energy.\nhttps://en.wikipedia.org/wiki/Bluetooth_low_energy_beacon - hardware transmitters - a class of Bluetooth low energy (LE) devices that broadcast their identifier to nearby portable electronic devices. The technology enables smartphones, tablets and other devices to perform actions when in close proximity to a beacon. Bluetooth beacons use Bluetooth low energy proximity sensing to transmit a universally unique identifier picked up by a compatible app or operating system. The identifier and several bytes sent with it can be used to determine the device's physical location, track customers, or trigger a location-based action on the device such as a check-in on social media or a push notification.\nBluez - provides Linux support for the core Bluetooth layers and protocols. It is flexible, efficient and uses a modular implementation.\nhttps://linux.die.net/man/1/hcitool - used to configure Bluetooth connections and send some special command to Bluetooth devices. If no command is given, or if the option -h is used, hcitool prints some usage information and exits.\nhttps://github.com/greatscottgadgets/ubertooth/ - an open source wireless development platform suitable for Bluetooth experimentation. Ubertooth ships with a capable BLE (Bluetooth Smart) sniffer and can sniff some data from Basic Rate (BR) Bluetooth Classic connections.\nhttps://github.com/pwnieexpress/blue_hydra - a Bluetooth device discovery service built on top of the bluez library. BlueHydra makes use of ubertooth where available and attempts to track both classic and low energy (LE) bluetooth devices over time.\nhttps://en.wikipedia.org/wiki/LoRa - a patented digital wireless data communication IoT technology developed by Cycleo of Grenoble, France, and acquired by Semtech in 2012. LoRa uses license-free sub-gigahertz radio frequency bands like 169 MHz, 433 MHz, 868 MHz (Europe) and 915 MHz (North America). LoRa enables very-long-range transmissions (more than 10 km in rural areas) with low power consumption. The technology is presented in two parts — LoRa, the physical layer and LoRaWAN, the upper layers.\nhttps://en.wikipedia.org/wiki/1G - refers to the first generation of wireless cellular technology (mobile telecommunications). These are the analog telecommunications standards that were introduced in the 1980s and continued until being replaced by 2G digital telecommunications. The main difference between the two mobile cellular systems (1G and 2G), is that the radio signals used by 1G networks are analog, while 2G networks are digital.\nhttps://en.wikipedia.org/wiki/2G - short for second-generation cellular technology. Second-generation 2G cellular networks were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991. Three primary benefits of 2G networks over their predecessors were that phone conversations were digitally encrypted; 2G systems were significantly more efficient on the spectrum allowing for far greater wireless penetration levels; and 2G introduced data services for mobile, starting with SMS text messages. 2G technologies enabled the various networks to provide the services such as text messages, picture messages, and MMS (multimedia messages). All text messages sent over 2G are digitally encrypted, allowing for the transfer of data in such a way that only the intended receiver can receive and read it.\nhttps://en.wikipedia.org/wiki/Wireless_Application_Protocol - a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. Introduced with much hype in 1999, WAP achieved some popularity in the early 2000s, but by the 2010s it had been largely superseded by more modern standards. Most modern handset internet browsers now fully support HTML, so do not need to use WAP markup for webpage compatibility, and most of them are no longer able to render and display pages written in WAP.\nKannel - a compact and very powerful open source WAP and SMS gateway, used widely across the globe both for serving trillions of short messages (SMS), WAP Push service indications and mobile internet connectivity.\nhttps://en.wikipedia.org/wiki/SMS - Short Message Service is a text messaging service component of most telephone, World Wide Web, and mobile device systems. It uses standardized communication protocols to enable mobile devices to exchange short text messages. An intermediary service can facilitate a text-to-voice conversion to be sent to landlines. SMS was the most widely used data application, with an estimated 3.5 billion active users, or about 80% of all mobile subscribers, at the end of 2010.\nSMS, as used on modern devices, originated from radio telegraphy in radio memo pagers that used standardized phone protocols. These were defined in 1985 as part of the Global System for Mobile Communications (GSM) series of standards. The protocols allowed users to send and receive messages of up to 160 alpha-numeric characters to and from GSM mobiles. Although most SMS messages are mobile-to-mobile text messages, support for the service has expanded to include other mobile technologies, such as ANSI CDMA networks and Digital AMPS. SMS is also employed in mobile marketing, a type of direct marketing.According to one market research report, as of 2014, the global SMS messaging business was estimated to be worth over $100 billion, accounting for almost 50 percent of all the revenue generated by mobile messaging.\nhttps://en.wikipedia.org/wiki/Multimedia_Messaging_Service - a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network. Users and providers may refer to such a message as a PXT, a picture message, or a multimedia message. The MMS standard extends the core SMS (Short Message Service) capability, allowing the exchange of text messages greater than 160 characters in length. Unlike text-only SMS, MMS can deliver a variety of media, including up to forty seconds of video, one image, a slideshow of multiple images, or audio.\nhttps://en.wikipedia.org/wiki/3G - standing for third generation, is the third generation of wireless mobile telecommunications technology. It is the upgrade for 2G and 2.5G GPRS networks, for faster internet speed. This is based on a set of standards used for mobile devices and mobile telecommunications use services and networks that comply with the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union. 3G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV.\n3G telecommunication networks support services that provide an information transfer rate of at least 0.2 Mbit/s. Later 3G releases, often denoted 3.5G and 3.75G, also provide mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers. This ensures it can be applied to wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV technologies.\nhttps://en.wikipedia.org/wiki/4G - the fourth generation of broadband cellular network technology, succeeding 3G. A 4G system must provide capabilities defined by ITU in IMT Advanced. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, and 3D television. The first-release Long Term Evolution (LTE) standard (a 4G candidate system) has been commercially deployed in Oslo, Norway, and Stockholm, Sweden since 2009. It has, however, been debated whether first-release versions should be considered 4G.\nOsmocom - an umbrella project regarding Open source mobile communications. This includes software and tools implementing a variety of mobile communication standards, including GSM, DECT, TETRA and others.\nCellular Infrastructure - a group of Osmocom programs implementing cellular network infrastructure components for GSM, GPRS, EDGE, UMTS, HSPA, LTE and their associated interfaces and protocol stacks.\nOpenBTS - a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet. This forms the basis of a new type of wireless network which promises to expand coverage to unserved and underserved markets while unleashing a platform for innovation, including offering support for emerging network technologies, such as those targeted at the Internet of Things.\nUmTRX - The industrial grade dual-channel wide-band SDR transceiver.\nUmSITE-TM3 - A complete mobile network in a single tower mounted base station, one of the key components of the Fairwaves GSM network architecture. Technical details: Osmocom or OpenBTS software suites (Osmocom by default). Ability to run GnuRadio and other SDR software. Output power - 3W per channel (6W total). UmSITE includes internal duplexers and amplifiers. 1-3 km coverage (with external antennas). Two independent TRX's, i.e. two ARFCNs. Based on UmTRX transceiver. Stable reference clocks: 26MHz TCXO (integer multiple of GSM sample rate) with 100ppb frequency stability. DAC for TCXO frequency fine tuning. Integrated GPS module for automatic TCXO frequency stabilization.\nZeroPhone - an open-source smartphone that can be assembled for 50$ in parts. It is Linux-powered, with UI software written in Python, allowing it it to be easily modifiable - and it doesn't prohibit you from changing the way it works.\nMEGA65 - The 21st century realization of the C65 heritage: A complete 8-bit computer running around 50x faster than a C64 while being highly compatible. C65 design, mechanical keyboard, HD output, SD card support, Ethernet, extended memory and other features increase the fun without spoiling the 8-bit feel. Hardware designs and software are open-source (LGPL).\nhttp://wiki.opendigitalradio.org Opendigitalradio.org wiki] - Open digital broadcasting techniques based on software defined radio. Digital radio transmission and development must also become democratized for experimenters and small broadcasters. Opendigitalradio.org wiki is about creating a community for documenting and exchanging experimentations and gather information about existing small-scale DAB projects. Please read Introduction for more information. Opendigitalradio is a non-profit association based in Switzerland (page in french), offering also a broadcast infrastructure for temporary radio stations.\nMyriad RF is a family of open source hardware and software projects for wireless communications, and a community that is working to make wireless innovation accessible to as many people as possible.\nLimeSDR board provides a hardware platform for developing and prototyping high-performance and logic-intensive digital and RF designs using Altera’s Cyclone IV FPGA and Lime Microsystems transceiver.\nhttp://sdr.osmocom.org/trac/wiki/rtl-sdr - RTL-SDR is a set of tools that enables DVB-T USB dongles based on the Realtek RTL2832U chipset to be used as cheap software defined radios, given that the chip allows transferring raw I/Q samples from the tuner straight to the host device.\nThe frequency range of the RTL2832U / E4000 is generally around 64MHZ to 1700MHz with a gap around 1100MHz to 1250MHz. The RTL2832U / R820T frequency range is 24MHZ to roughly 1850MHz with no gaps (found yet), and no DC offset spike.\nRTL dongles have 2.4 MHz of useful bandwidth.\nRtl Power - a unix-hacker's approach to the waterfall. Its unique features include:Just getting started with rtl_power, and it looks like just the to... Unlimited frequency range. You can do the whole 1.7GHz of a dongle. Unlimited time. At least until you run out of disk for logging. Unlimited FFT bins. But in practice I don't think I've taken it above 100k bins. Quantitative rendering. Exact power levels are logged. Runs on anything. A slower computer will use less samples to keep up.\nhttps://github.com/Make-Magazine/PirateRadio - MAKE Raspberry Pi Automated FM Radio Script.\nhttps://github.com/coup-de-foudre/tesla_coil_fm_driver - Project forked from PNPtutorials.Use Raspberry Pi as FM transmitter. Works on any RPi board.This project uses the general clock output to produce frequency modulated radio communication. It is based on idea originaly posted here but does not use DMA controller in order to distribute samples to output (clock generator), so sound quality is worse as in PiFm project and only mono transmition is available but this makes possible to run it on all kind of boards.\nosmo-fl2k - Since rtl-sdr has been released a couple of years ago, cheap SDR receivers are ubiquitous. SDRs with transmission capability have become cheaper as well, but are still more expensive. osmo-fl2k allows to use USB 3.0 to VGA adapters based on the Fresco Logic FL2000 chip, which are available for around $5, as general purpose DACs and SDR transmitter generating a continuous stream of samples by avoiding the HSYNC and VSYNC blanking intervals.\nrunning the \"volk_profile\" gnuradio utility will detect and enable processor specific optimisations and will in many cases give a significant performance boost.\nGqrx is a software defined radio receiver powered by the GNU Radio SDR framework and the Qt graphical toolkit.\nliquid-dsp - a free and open-source signal processing library for software-defined radios written in C. Its purpose is to provide a set of extensible DSP modules that do not rely on external dependencies or cumbersome frameworks.\nFreeDV - a Digital Voice mode for HF radio. You can run FreeDV using a free GUI application for Windows, Linux and OSX that allows any SSB radio to be used for low bit rate digital voice.\nhttps://github.com/jontio/JMPX - A Stereo encoder for FM transmitters now with RDS, SCA and DSCA support.\nwelle.io - an open source DAB and DAB+ software defined radio (SDR) with support for rtl-sdr (RTL2832U) and airspy. It supports high DPI and touch displays and it runs even on cheap computers like Raspberry Pi 2/3 and 100€ China Windows 10 tablets.\nhttps://github.com/JvanKatwijk/qt-dab - for Windows, Linux and Raspberry Pi for listening to terrestrial Digital Audio Broadcasting (DAB and DAB+). It is the successor of both DAB-rpi and sdr-j-DAB, two former programs by the same author.\nGoogle Play: Wavesink DAB/FM Trial - Turn your phone or tablet into a DAB and FM-Stereo RDS receiver. On USB-OTG compatible phones, simply connect a cheap USB dongle and listen to VHF radio in HiFi quality. Note that the trial version has a runtime limitation and does not support DAB+ but only DAB and FM/RDS.\nIdentification Guide - wiki intended to help identify radio signals through example sounds and waterfall images. Most signals are received and recorded using a software defined radio such as the RTL-SDR, Airspy, SDRPlay, HackRF, BladeRF, Funcube Dongle, USRP or others.\nOpenBTS - a Unix application that uses a software radio to present a GSM air interface to standard 2G GSM handset and uses a SIP softswitch or PBX to connect calls. (You might even say that OpenBTS is a simplified form of IMS that works with 2G feature-phone handsets.) The combination of the global-standard GSM air interface with low-cost VoIP backhaul forms the basis of a new type of cellular network that can be deployed and operated at substantially lower cost than existing technologies in many applications, including rural cellular deployments and private cellular networks in remote areas.\nSDR.hu - On sdr.hu, you can find SDR receivers that amateur radio operators shared, so you can listen to radio signals without even having to buy any SDR hardware! In fact, amateur radio is a great thing and also lets you experiment with transmitting on the air, by using various frequency bands and modulations.\nRootIO Radio - a technology platform for low cost, hyperlocal community radio stations. Tiny FM radio stations that require little investment, maintenance, or contribution from the community, yet at the same time offer more and better modes of interaction than traditional stations. After a few days of installation and training, stations can start to facilitate new economic opportunities, new opportunities for expression and deliberation, and provide information across, into, and out of the community they serve.Each station is amplified by our cloud/telephony Radio as a Service (RaaS). With the cloud, an individual station can receive free voice-quality calls that go straight to air, download audio from the Internet in the background, or run SMS votes. Using any basic phone (through RaaS) local hosts can run live shows with callers; local business people can record ads or announcements; citizen journalists can cover live meetings or sports events. With solar power a station can serve as 24/7 endpoint to emergency services.Four stations have been running in Northern Uganda for the last year, and small rural communities are creating their own programs, reporting their own news, and requesting audio content from the Internet. RootIO, with the help of Resilient Africa Network, is hoping to launch another 20 stations in the coming year.\nRadioWitness - Immutable, peer-to-peer archiving and distribution of police radio calls. Authors use Software-Defined Radios and Dat Archives to record local police radio. Publishers seed archives from Authors and then re-distribute them to larger audiances. Other rolse arise too, such as Studios who synthesize radio archives into archives of audible speech, and Indexers who aggregate metadata on individual radio calls. Stop by #radiowitness on freenode and say hi.\nhttps://en.wikipedia.org/wiki/Radio-frequency_identification - uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source (such as a battery) and may operate hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC).\nhttps://en.wikipedia.org/wiki/Microchip_implant_(animal) - an identifying integrated circuit placed under the skin of an animal. The chip, about the size of a large grain of rice, uses passive RFID (Radio Frequency Identification) technology, and is also known as a PIT (Passive Integrated Transponder) tag.Externally attached microchips such as RFID ear tags are commonly used to identify farm and ranch animals, with the exception of horses. Some external microchips can be read with the same scanner used with implanted chips.\nhttps://github.com/Proxmark/proxmark3 - a powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.This repository contains enough software, logic (for the FPGA), and design documentation for the hardware that you could, at least in theory, do something useful with a proxmark3.\nThis page was last edited on 12 April 2019, at 06:15." | 2019-04-19T15:08:54Z | https://wiki.thingsandstuff.org/index.php?title=Radio&oldid=50097 |
With a double whammy of a brand new platform and a record-breaking haul of 43 products to test, the VB test team had their work cut out this month. John Hawes has all the details of how the products fared on the shiny new Windows 7 platform.
So Windows 7 is finally with us. The hordes of users and admins who have put off migrating away from the stalwart XP can breathe a sigh of relief and finally start using a modern operating system. Vista can be consigned to the scrap heap of history, with the best of its innovations living on in it successor and the rest swiftly forgotten.
Perhaps that’s going a little far; as a new and untried entity, Windows 7 will at least have to do a little work to earn the approval and trust of cautious users. Initial impressions have generally been fairly positive, with speed, stability and style impressing many early adopters. Some teething problems were noted with many security products, but that was way back at the public beta stage and by now they should all have been resolved. We can only hope as much anyway, as this month’s comparative takes place on the new platform, with the deadline for product submission having been just days after its official public release.
Unlike the general consensus elsewhere, our initial impressions of Windows 7 were not entirely favourable. A trial installation of the Ultimate edition – to see how it got on with our hardware and tools, and to get a feel for what changes we needed to be aware of – proved somewhat problematic. A troublesome install process finally got us to a fully operational set-up, but Explorer seemed prone to odd behaviour, displaying only blackness within its shimmery semi-transparent framing until the right combination of clicks restored it to life. Meanwhile, the first blue screen was achieved within half an hour of installation.
Fortunately, the Pro edition selected for our tests proved more robust and well behaved. Getting all our test systems installed, activated and backed up with images was not an arduous task, with most of the steps fairly standard (although finding our way to some of the configuration controls proved a little bewildering thanks to some unnecessary adjustments to the layout).
With our lab hardware fully supported from the off, few changes were required to the standard installation besides a couple of handy tools to be used during testing – an archiving package to access submissions sent as archives and a PDF reader to check out manuals in case of unclear or unfamiliar products. Being rather simple folk easily overwhelmed by fancy graphics, we opted to revert the display to the plain, unflashy ‘classic’ style, intending to check out each product in the context of the snazzy ‘Aero’ options briefly, just to make sure they didn’t look too out of place.
Getting the test sets and associated tools put together and onto the systems was also a relatively simple task. The test set deadline was 24 October, and the latest WildList available on that date, the September list, provided few surprises. The most dangerous of the Virut strains which rocked the last comparative was retired from the list, and our troublesome large set of samples thus removed to the polymorphic set. Additions to the WildList were dominated by online gaming and social networking threats, along with a sprinkling of autorun worms and Conficker variants. The polymorphic set was enlarged in terms of numbers of samples, but not greatly in terms of entirely new items, while the set of worms and bots was trimmed of some older items and enhanced with a selection of more recent arrivals. As usual, the trojans set was compiled entirely afresh, mostly with samples gathered during September while we were busy working on the last comparative. The RAP sets were populated as usual in the few weeks before the test, and in the week following the 28 October deadline for product submissions – meaning that testing could not start until well into November.
The deadline day proved a busy one, with products coming in thick and fast – a few new arrivals to spice things up, the usual flood of familiar faces, many of them providing both suite and AV-only variants, and one even submitting a free edition alongside the standard paid-for version. Many of our occasional entrants failed to materialize, perhaps put off by the potentially tricky new platform, but nevertheless the numbers stacked up to a monster 43 products. With a record field to test on what was likely to be a difficult platform, we knew that time would be against us.
Noting this time pressure, and having put together a fairly large and challenging set of infected samples to test against, we decided to make things extra hard for ourselves by expanding and deepening our performance tests. The standard speed sets were enhanced with a selection of files from the new operating system, while the clean set got a fairly large addition from CDs provided with hardware devices and magazines, and popular and recommended downloads from various software sites.
The speed tests were extended to take into account the performance-enhancing caching technologies included in many products these days. While in the past only one set of figures was reported for default handling of the speed sets, for this test we decided to include both ‘cold’ and ‘warm’ figures – that is, for the initial encounter with the files, and for subsequent rescans of the same items, measured multiple times and averaged to minimize anomalies. These measurements were taken both on access and on demand, although the on-demand figures are perhaps somewhat less useful – most products will have been updated at least once between on-demand scans of the same items, which should mean that any cached data should be purged and items looked at afresh in case improved detection powers lead to something being spotted. The on-access data is much more relevant, as files may be accessed numerous times between updates and checking known files faster will significantly reduce the system footprint of the security solution.
We also introduced an update to our on-access measuring tool, opening files with the execute flag set to spark detection in a fuller range of products, and also taking MD5s of each file encountered and granted access to, in order to keep better track of unwanted changes to the testbeds. During testing we also gathered some more detailed performance measures, including records of CPU and memory consumption under various conditions, but given the heavy workload this month it was not possible to wrestle these figures into presentable shape in time for inclusion in the final report.
With all these schemes ready to go, and a tally of 43 products to get through, we shut ourselves away in the lab ready for a long and arduous, but what we hoped would be a productive month of testing.
AhnLab’s offering kicks off this month’s review with few changes from its last few appearances. The installation process is fairly smooth and speedy, with minimal interruption from Windows 7’s UAC system – a single prompt for confirmation on commencing the install. The interface is fairly pleasant and reasonably usable, with a few quirks likely to fool the unwary, but generally simple to navigate and operate. Running through the tests proved unproblematic, although matters were slightly complicated by the separation of logging into items categorized as mere ‘spyware’ from those definitely malicious. After some careful merging of logging data some reasonable scores were recorded across the detection sets.
In the speed tests, scanning speeds were pretty decent but on-access overheads were a trifle heavy. No false positives were recorded, but in the WildList set a single sample of the last remaining W32/Virut strain was missed, thus denying AhnLab a VB100 once again.
This may be the last appearance in VB’s tests of the current version of Alwil’s popular avast! product, with a long-anticipated new edition due for release very soon. The install is uncomplicated and fairly speedy but does require a reboot of the system to complete, while the design of the interface remains somewhat unusual but provides a good range of fine-tuning for the more demanding user if switched to the advanced version. Running individual scans is a little fiddly, and logging can be problematic – initially limited to a fairly small size and, if a non-existent folder was mistakenly selected to write logs to, the process was silently disabled.
Detection rates were pretty solid across the test sets, with a steady decline as expected across the RAP sets but a strong starting level making for a very respectable overall average. Speeds were excellent, with some impressive improvements on access when files had been checked before. The WildList presented no difficulties and with no false positives either, Alwil earns this month’s first VB100 award.
It has been a while since ArcaBit made an appearance in VB100 testing. The product’s installer defaults to Polish, but is otherwise straightforward and very speedy, the installation process requiring less than a minute all told (although a reboot is required at the end). Running the tests proved a little more arduous, with multiple UAC prompts presented at various stages of accessing and adjusting the controls and extremely long pauses waiting for browser windows to be presented. Nevertheless, scanning speeds were decent – fast on demand and overheads not too heavy on access.
Detection rates were not bad in general. There was a marked decrease in coverage in the more recent weeks of the RAP sets, but the WildList was covered without problems despite the large numbers of previously unseen Virut samples. With the clean sets throwing up no show-stoppers either, ArcaBit earns its first VB100 award after a handful of sporadic appearances; we hope to see the product becoming a more regular entrant in the future.
Authentium’s product goes very much for simplicity, with a pared-down interface providing the bare minimum of control options, all of which are reasonably easy to find. Opening reports proved slow in the extreme, most likely thanks to the unusually large size which would not be experienced by normal users, but otherwise testing progressed without major difficulty.
Scanning speeds were on the good side of medium and pretty light in terms of on-access overheads. Detection scores were fairly decent, with an especially strong showing in the proactive week of the RAP sets, and with no problems in the WildList and no false positives, Authentium safely qualifies for a VB100 award.
AVG’s product had a very lengthy and complicated installation process, with numerous components to be put in place and configured. When the product is finally installed, it demands to be allowed to make an ‘optimization scan’. If delayed, this scan is run anyway before any scheduled scan can take place – as we discovered when we set a scheduled job to run overnight, only to find on arrival the next morning that the optimization process was still running, and the requested job was yet to begin. Perhaps not helped by the incomplete optimization process, on-demand scans showed no sign of speeding up when run again over previously scanned data, and on access only a minimal improvement was observed on revisiting previously scanned files.
The interface occasionally proved rather slow to respond, especially when updating its display during large scans, but was generally reasonably easy to navigate, and a decent although not exhaustive level of configuration was available. Detection results were pretty solid, with no problems in the WildList and an excellent showing in the reactive portion of the RAP sets. With no false positives in the clean sets either, a VB100 is duly earned by AVG.
Perhaps responding to the increased interest in free solutions of late, Avira opted to enter its free version in this month’s test, and the product did not disappoint. The basic design and layout was pretty familiar to us from having used the professional edition, with a few minor adjustments, starting with the personal usage terms and conditions presented during the snappy install process. A few other areas also seemed different, with the default scanning depths perhaps a trifle less strict, and the on-access scanner lacking an option to simply block without prompting for an action. In the on-demand area, the GUI seemed to provide no option to scan a folder, offering to scan only entire drives or partitions, but a context-menu scan option provided more flexibility. These issues proved a little frustrating during our intensive on-access test, but not too upsetting, and otherwise the depth of configuration proved admirable.
Performance was excellent, with some very fast scanning speeds both on access and on demand, while detection rates proved as splendid as we have come to expect from the company. The test sets were demolished without apparent effort, with even the proactive portion of the RAP sets handled impressively. With no problems in the WildList, and no false alarms, Avira’s free Personal edition comfortably earns its first VB100 award.
The full paid-for version of AntiVir, as mentioned above, is pretty similar to the free one on the surface, but with a wider range of options and a deeper level of control available. The set-up process is similarly simple although some post-install options are presented, including some extras such as detection of suspicious iframes. Logging is also clearer and more sophisticated than in the Personal edition, as befits a product intended to be put to use in a business environment.
Otherwise, little difference was observed – detection rates were identical to the free edition, while speed measures were as superb. Again no problems emerged in the WildList and no false positives were presented, and Avira adds a second VB100 to this month’s haul.
BitDefender’s 2010 edition provides another redesign and another unusual look and feel. The install process is rather lengthy and features a number of command prompt windows flashing into view and disappearing again in an instant. A reboot is needed to complete the process. The new GUI has a simple, straightforward, rather chunky appearance, with the layout variable for each of a selection of user profiles – an interesting and effective approach to allowing the advanced user a decent level of control while avoiding frightening the novice. A number of other interesting features are included, such as home network configuration controls, vulnerability management and system configuration options, alongside the core anti-malware protection elements which proved as solid as ever.
Detection rates were excellent across the test sets, while in the performance measures scanning speeds proved fairly slow on first sight of files but improved notably on revisiting them, with a particularly impressive improvement on access. The WildList was handled comfortably, and with no false positives BitDefender earns a VB100 award.
Incorporating the BitDefender detection engine, Bullguard’s product proved much faster and easier to install, but again a reboot is needed for full operation. Its overwhelmingly red interface felt a trifle cluttered, but with a little exploration proved nicely laid out and fairly simple to use – although the process of setting up and running a custom scan is a little long-winded, and requires the approval of a UAC prompt.
Detection rates, as expected, were along the same lines as those achieved by BitDefender – a very respectable showing – while in the speed tests medium rates were recorded with no change on second viewing of the files. No problems cropped up in the WildList or the clean sets, and a VB100 is duly earned by Bullguard.
CA’s home-user offering arrives following a major overhaul, with a redesigned interface promising some stylistic innovations. The installation begins with some extremely large icons, and after a long and slow process requires a reboot before presenting a final interface which is equally large-featured. The design is indeed unusual, with its swirling 3D tabs and icons apparently inspired by computer systems used on the TV show CSI: Miami. Clearly, it is intended to provide a simple and user-friendly experience for the most inexperienced users. For us, however, it proved baffling in the extreme, with the tiny amount of configuration available proving both tricky to find and perplexing to make use of; perhaps with experience its mysteries will be unravelled.
An attempt to run scans from the GUI – when the appropriate area was at last uncovered – proved very slow to access the filesystem browsing details. A context-menu entry is provided for simpler initiation of specific scans, but is also somewhat confusing, with multiple nested options and the option to exclude an area from scanning given prominence over the scan itself. Scanning speeds seemed remarkably fast – as we have come to expect from CA solutions – but on repeated attempts showed some worrying oddities. Most rescans proved slightly faster than the first attempt, as might be expected, but some were significantly slower and apparently scanning at a greater depth (with no change to the options). On one occasion a component of the useful Sysinternals suite was alerted on as a potential hacking tool, despite having been missed on two previous scans and going unnoticed again on two subsequent runs.
In the infected sets, detection was less than excellent, with three items in the WildList set not detected: an autorun worm and a pair of online gaming password-stealers. Furthermore, while running the performance tests a .DLL file included with the Windows 7 operating system (in the system32 folder) was alerted on as a ‘Startpage’ trojan; CA’s new-look product is thus denied a VB100 award this month.
UPDATE: re-analysis of the false positive alerted on by CA Internet Security Suite Plus 2010 was carried out, and it was found that while the false positive existed in the installer submitted by the company, it was no longer present in the updated definition set also included in the submission. As users would be updated to the fixed protection level prior to running any scans, the issue should not emerge in the real world. As the product is confirmed to have also had problems in the WildList set, this will not affect qualification for a VB100 award. The revised RAP graphic is shown below.
According to the vendor, CA’s business product is no longer to be referred to as ‘eTrust’ – but despite this it continues to carry ‘eTrust’ branding at various points and persists in using a rather old-fashioned and less than satisfactory interface. However, we understand that the long-awaited redesign is on the horizon at last.
We have learnt through long and painful experience how to cope with the quirks and oddities of this product’s layout, although the responsiveness issues noted in previous tests were less evident here than on some other platforms. Some particular areas of frustration remained, including the reverting of some option selections from scan to scan, the absence of archive scanning on access despite the provision of a setting to enable it, and the awkward logging which put such a strain on the interface trying to interpret and display the data that on one attempt the machine overheated and rebooted.
Eventually, though, it did manage to display its own logs in a fairly usable format – a first for the product – and detection rates seemed somewhat better than previous rather disappointing levels. However, despite the autorun worm being handled properly this time, the two gaming trojans were missed once again. In the clean sets there was no sign of the false positive found by the consumer product, but nevertheless, CA’s business solution is also denied a VB100 award this month.
The Blink product submitted for this month’s test is a late-stage beta, due for final release around the time this review will be published, and thus a few oddities are only to be expected. After a fairly straightforward and reasonably pacey install process, some areas of the nicely designed interface failed to operate properly, presenting some rather stark messages reading simply ‘Parameter is incorrect’. However, after a reboot, and with some patience, testing was completed without serious problems. We noted that the firewall bundled with the product is disabled by default, but some of the other additions, such as the vulnerability scanner and intrusion-detection controls, impressed us greatly. The anti-malware component is only a minor part of the offering, and is thus granted less space in the configuration areas than might be desired by more demanding users.
The product incorporates the Norman engine, and the implementation of sandboxing of unknown files may well account for some rather sluggish scanning speeds over executable files on demand. The sandbox came into its own in the detection tests, with the on-demand results proving rather better than the on-access ones, where less intensive scanning is provided. This was something of a problem for eEye in the WildList set, though, where a handful of W32/Virut samples were missed by the on-access component, although spotted by the sandbox on demand. In the clean sets, the same .DLL file which caused trouble for the CA consumer product was alerted on. Thus, despite a generally solid performance, eEye does not qualify for a VB100 award this month.
The latest version of eScan has another rather lengthy installation process with a number of long pauses, and a reboot to cap things off. When up and running, the interface proved somewhat poorly laid out but fairly usable with a little practice. Once again there were problems accessing browser windows when setting up scans. The product includes a number of extra features, including controls for managing removable USB devices and application control.
During the process of running some of the more demanding scans of the infected sets, an error window was presented, warning the user that the product had stopped working. However, scanning seemed to continue unimpeded and further investigation showed that on-access protection was also fully operational. Scanning speeds in the clean set were slow in the extreme, with no sign of speeding up on repeated runs, but the product remained solid and well behaved throughout. Detection rates continue to impress with strong scores across all sets, and with no issues in the WildList or clean sets a VB100 award is well deserved.
ESET’s product remains much as it has been for some time: pleasantly designed with an efficient and lucid layout. The install process is simple and needs no reboot, and protection is up and running with ease. Configuration is as in-depth as could be desired, although options to enable the scanning of archives on access seemed to produce no increase in scanning when enabled.
At one point during the most intensive scan of the infected sets the product became a little overwhelmed, consuming rather more than its share of memory and requiring a reboot to return the system to a functioning state. In more normal activities no problems were observed however, with scanning speeds unaffected by repeated runs but fast enough to be beyond complaint. Detection rates were very solid, with a commendable regularity across the reactive part of the RAP sets and still fairly strong in the proactive portion. With no trouble handling the WildList or clean sets, ESET adds yet another VB100 award to its tally.
FortiClient proved a little tricky to install on Windows 7, with two UAC prompts before the installer got started on a process doomed to fail very shortly. Re-running the installation numerous times while applying varying options to the useful compatibility troubleshooting tool provided by the operating system eventually got things rolling. When the product was finally installed and running the interface offered excellent clarity of design and a fairly thorough selection of options – appropriate for a predominantly business-focused solution. One issue observed with the GUI was that the ‘restore defaults’ control failed to reset changes made in advanced subsections.
Scanning speeds were in the mid-range, but stability was maintained even under pressure and detection rates showed notable improvement over recent tests. No issues were observed in the WildList or clean sets, and a VB100 award is duly earned.
F-PROT continues to offer icy minimalism, with a swift and straightforward install process impeded only by a single UAC prompt and the need for a reboot to complete. The interface provides few options but caters for the basics in an admirably clear way. Scanning speeds were fairly reasonable but showed no sign of advanced caching of known-clean files, and detection rates were decent but not overly impressive.
With full coverage of the WildList set and no false positives, F-PROT also earns a VB100 award this month.
F-Secure’s latest product version features a notable redesign, starting with a heavily automated install process requiring minimal user intervention – even offering to remove any existing protective solutions – but taking some time and needing a reboot. On restarting the system a notable heaviness was apparent, with Windows taking some time to come back to life, and a number of large and intrusive pop-ups from the HIPS system warned of potentially unwanted behaviour on the part of several standard Windows components, including the Malicious Software Removal Tool (although such behaviour may have been influenced by the lack of an Internet connection to check with cloud-based systems).
Our first attempt at running the test proved fruitless as the on-access component appeared completely non-functional, but on reinstalling on a second test machine the issue did not recur. Once everything was working properly testing proceeded without further interruption, with some fairly decent scanning speeds and splendid detection rates. Even the highly inefficient and precarious logging system proved more reliable on this occasion. There were no problems in the WildList and no false positives in the clean sets, and as a result a VB100 award is easily earned.
F-Secure’s second submission this month is the company’s rebrandable version provided to users via ISPs and so on. It is fairly similar to the 2010 version in design and user experience, even down to the annoying pop-ups warning about Windows components. Scanning speeds were similarly reasonable and detection rates likewise excellent, and with an identical showing in the core sets a second VB100 award goes to F-Secure this month.
G DATA’s 2010 edition has a rather higher than usual number of steps to its installation process, including the set-up of the malware feedback system for reporting detections back to base. The latest version of the interface is clear and uncluttered with a pleasantly logical layout. Configuration is made available at a reasonable depth – with some more specialist requirements perhaps missing, but quite ample for the average user.
A few oddities were observed, with the most notable examples being a somewhat low default limit on archive scanning (300KB) and the intrusion of a UAC prompt before any on-demand scan can be run. Logging is also a little frustrating, with reports stored in an awkward format which proved something of a strain for the product to interpret into human-readable form if allowed to grow too large. Initial scanning speeds were fairly slow, as expected from a multi-engine approach, but on repeat viewing of previously seen files speeds proved lightning fast, with the same pattern of improvement showing again in the on-access tests, demonstrating some sterling effort at keeping overheads down through caching.
Detection rates, as we have come to expect from G DATA, were stratospheric, setting a seriously tough benchmark for others to aim for across all the sets, with even the proactive portion of the RAP sets handled admirably. With barely a whisper of a miss in the standard sets the WildList proved something of a breeze, and with no false alarms either G DATA easily earns another VB100 award for its effort.
K7’s installation process is nice and speedy, with a single UAC prompt at the start, a standard set of stages including a check for conflicting third-party software, and no reboot required. The interface is simple and pleasant, providing an ample level of configuration for the average home user in a rational and usable layout. Logging was a minor problem, with the viewer window freezing on attempting to view unusually large logs, but this minor issue is unlikely to affect the majority of users. The only other oddity observed was the occasional zero missing from scan duration times, which was no more than a little confusing.
Detection rates proved pretty decent, with most of the older sets handled with aplomb and a decent score in the trojans set, while the RAP scores proved a little uneven, with the ‘week +1’ set handled marginally better than the ‘week -1’ set. The WildList presented no difficulties however, and with no false positives in the clean sets either, K7 wins a VB100 award and our gratitude for a nice easy run through the tests.
Kaspersky’s latest consumer offering is as glossy and shiny a beast as ever; the install is no slower than the average and getting at the new-look interface didn’t take long. The redesign caused a few moments of confusion on first approach, but soon became familiar and simple to use. A vast wealth of fine-tuning options are provided under the attractive surface, including some interesting features like the keylogger-proof ‘virtual keyboard’.
Scanning speeds were pretty slow in some areas, especially over the sets of media and documents which most products fly through. While they did show some signs of improvement on second and subsequent attempts, the rescans still took a long while.
On the other hand, detection rates proved superb pretty much across the board, and with no issues handling the core sets and no false alarms, Kaspersky comfortably earns a VB100 for its 2010 edition.
Kaspersky’s second offering this month has a slightly more businesslike name and is presumably a corporate version, but in look and feel it is not so very different from the home-user edition – somewhat plainer perhaps, and with some of the advanced features absent. Again the wealth of configuration options is a pleasure to behold and the user experience is extremely smooth and trouble free. Scanning speeds were much faster this time too, and showed signs of considerable improvement on repeat attempts thanks to the ‘iSwift’ and ‘iChecker’ technologies mentioned in the control system.
Detection rates were excellent in all sets, and no problems were encountered in the certification requirements, thus earning Kaspersky a second VB100 award this month.
Kingsoft’s Advanced edition has a fairly straightforward installation process: fast and unchallenging with only the mention of cloud-based intelligence worthy of comment; no reboot is required to complete. The interface is simple and unflashy, presenting all the required controls without fuss but occasionally looking a little sparse thanks to the use of some rather odd fonts.
Logging proved sturdy and responsive – something of a rarity for this month’s test and certainly worthy of praise. Scanning speeds were middle of the road and detection rates proved rather unpredictable, with problems being caused by both polymorphic viruses and samples that were less than a few weeks old. No such issues were encountered in the WildList however, despite the Virut strain in there, and with no false alarms generated either, Kingsoft earns a VB100 award for its Advanced edition.
Kingsoft’s Standard version is, as usual, identical to the Advanced edition – on the surface at least. In the past we have noted a sizeable speed difference between the two, but this time the two performed much on a par with each other. In terms of detection, however, a fairly major difference was observed, with much lower scores here in the trojans and RAP test sets – once again seeing that rather surprising jump up and down across the RAP weeks – and a similar level of polymorphic misses too. However, with no issues in the WildList and no false alarms, Kingsoft’s second entry also makes the required grade for a VB100, which is duly awarded.
Kingsoft’s ‘Swinstar’ version is apparently a preview of upcoming technology, and is indeed quite different from its predecessors in many respects, starting with an installer package of not much over half the size of the previous two versions. The install is even faster and simpler, and the interface a little more glitzy and stylish but still fairly simple and easily navigated. More sensible default settings and a greater range of configuration are available. Scanning speeds are also a little better.
Again no false alarms were generated in the clean sets, but in the WildList set a single sample out of several thousand of the W32/Virut strain was missed, thus denying Kingsoft the chance of a hat trick this month.
McAfee’s home-user product was one of several this month which required Internet access during the set-up phase; in this case, not only do updating and activation take place online but so does the entire installation process. For me this would be entirely unacceptable; the several systems I use for my own purposes are all regularly reimaged to a known-clean state, and wherever possible I scrupulously avoid connecting to the web until security is installed and active (preferably fully updated too). It could, of course, be that I have grown paranoid from long experience in the security industry and exposure to too many scare stories, but such factors seem not to have influenced the designers at McAfee.
Once the product is installed, after a fairly drawn-out process, it presents a rather drab, grey outlook on the world which the test team found rather depressing. Although well stocked with buttons to click, the product provides virtually no control over its behaviour, merrily skipping through our test sets deleting and disinfecting samples without hesitation or approval. Again this would be less than ideal for my personal needs – fear of false positives and sloppy disinfection of precious files makes many users prefer quarantining and manual checking before any permanent damage is done. Logging also proved an issue, capped at a very small fixed level which cannot apparently be adjusted, so although the product reported having spotted and destroyed numerous files and threats, it could provide no details of what it had done and where.
Scanning speeds were mediocre and showed no signs of improvement over time, but we finally got through the test. Numerous reboots were required as, lacking the ability to disable the protection, we were forced to boot into another operating system to replace destroyed sets. Results were obtained by laboriously checking the files left behind on disk and counting only those left in place unchanged as misses. A satisfactory level of detection was observed, solid across most sets. The WildList presented no difficulties and there were no false alarms, so McAfee’s consumer offering is adjudged (just about) worthy of a VB100 award.
The VirusScan product for the corporate market has a much more grown-up attitude to its users, providing a more solid and sensible approach. The installation process is simple and clean, with the offer to disable Windows Defender a highlight, and the product itself is similarly businesslike, unflashy and properly thought out.
It ran through the tests in good time without problems, showing excellent stability and general good behaviour throughout. In the final verdict it actually scored slightly lower than its wayward consumer sibling in the newer test sets, thanks to the daily offline updater being plucked somewhat earlier than we were able to install, update and snapshot the total product, but scores remained pretty decent. The WildList proved not much of a challenge, and with no false alarms VirusScan ably earns itself a VB100 award and much gratitude for a relatively painless experience.
The Forefront product requires a rather complex install process thanks to our hermetically sealed lab, with multiple reboots to get the various components in place. This non-standard set-up prevents us from properly commenting on the process as would be experienced in the real world. Once up and running however, the product is pleasantly simple to use, the very minimal configuration provided making for light work as no in-depth measurements could be taken.
Parsing the results, we saw some pretty decent scanning speeds and fairly lightweight on-access figures, with a very noticeable increase in speed once files had been initially processed and remembered. Detection scores were a little less pleasing though, with levels much lower than expected in most areas. Thinking at first some error had been made when applying updates, the tests were re-run but the same results were obtained. On checking the version information displayed, the updates appeared to be from several days prior to the deadline for the test – suggesting that the wrong updates had been included with the submission. With a number of W32/Bagle samples recently added to the WildList not detected, Forefront is regrettably ruled out of contention for a VB100 award this month.
UPDATE: After closer analysis, it was spotted that Microsoft Forefront Client Security had not been run with the default settings, as per the standard procedures of the VB100. When tests were rerun with the correct settings the product was found fully capable of detecting all samples on the WildList, and a VB100 award is thus awarded to the product retrospectively. Detection scores in the trojan and RAP sets were also affected by the adjustment, the revised RAP graphic is shown below.
Microsoft’s new, free home-user solution was reviewed in these pages just last month (see VB, November 2009, p.18), so its layout and usage provided no surprises. The design is simple but perfectly workable, with enough options and sensible default behaviour to satisfy our requirements comfortably. It ran through the test without hindrance or upset, running for what seemed like a rather long time over the infected sets, but which would later prove to be not so bad compared to some others in the field this month. In the proper speed tests, rates were pretty impressive, with some good use of caching to lighten on-access overheads once files had been confirmed safe.
After the problems noted with the corporate product there were some worries about detection rates, but clearly the submission for the Security Essentials product had been made more carefully; scores proved very solid indeed, with a very gentle decline across the RAP sets and a fairly sharp drop in the proactive week but remaining highly competitive. False positives being absent, and the WildList handled ably, Security Essentials comfortably takes its first VB100 award.
This was Nifty’s second appearance in our tests, and once again the product was only available in Japanese. Installation proved fairly simple – a little slow, but running through the familiar gamut of steps before demanding a reboot. With the GUI still trying to summon some of its display fonts from the operating system (where they were sadly not to be found in our test set-up) navigating proved somewhat difficult, especially since the guides provided by the developers on the previous occasion had been rendered out-of-date by changes to the interface and the operating system alike.
Nevertheless, we bravely soldiered on, eventually obtaining results through various techniques after one of the longest spells spent on a single product in VB100 history. Scores, as expected from the Kaspersky engine incorporated into the product, were pretty decent. Speeds were somewhat sluggish on first attempt but, as we had surmised they might be, considerably quicker on repeated scans. Easily satisfying the technical if not aesthetic demands of the VB100, an award is duly earned by the Nifty Corporation.
Norman’s suite solution has caused a few headaches in the past, and we were most grateful to see a considerably redesigned version submitted this month. The new version, after a very speedy install indeed, proved much more useable, stable and responsive, although the apparent absence of the ability to run a manual scan, either from the GUI or the context menu, set things back a little as well as provoking some bewildered amusement.
Another issue which seemed to defy all logic was the scheduled scan, confidently timed for late on a Friday night so that the bulk of the scanning would be complete by Monday. On arriving back after the weekend, we found the scan had uncovered an item of potentially aggressive commercial software early in the job, and had sat waiting for instructions for two days without continuing its scanning, leaving the vast bulk of the scheduled job still to run.
Having shaken our heads a little at these quirks, we did eventually manage to gather the required data, which showed some solid scores, aided by the sandbox. However, as expected after having seen the results of the Blink product, there was a slight failing on access with the Virut samples, although on-demand coverage was better. This was enough to deny Norman a VB100 award this month.
PC Tools’ product range has had a pretty shaky time in recent VB comparatives – seemingly coinciding with the company having been taken over and the product ceasing to incorporate a third-party engine. Running through the familiar installer, which took rather a long time and needed a reboot to finalize things, we were a little worried that nothing had changed this time, but running through the tests on the top-of-the-range Internet Security suite product proved much more satisfactory than on the last few occasions, with no problems with stability or bad behaviour of any kind. The interface, which has become more usable through familiarity and seems pretty much unchanged since the last submission, is fairly appealing and has a decent range of controls, most of which are sensibly located and labelled.
Under the hood though, it is clear that some great strides forward have been taken. Above and beyond the solid stability, detection rates have soared since the rather pitiful efforts of just a few months ago, possibly aided by the experience of the company’s new owners, and in the main sets – particularly the trojans – some truly excellent scores were achieved. The RAP sets were also handled fairly well, steady across the reactive weeks and with a steep dip into the proactive set, but overall not bad at all. Scanning speeds were somewhat mediocre, and especially slow handling .JAR archive files, but the WildList was handled impeccably and without false positives PC Tools is firmly back in the VB100 award winners’ camp.
The second PC Tools entry this month is essentially the same as the suite product minus a few of the extras, and has the same fairly slow installation process, punctuated this time by the offer of a Google toolbar. The product also presents a very similar-looking interface. This time, however, all was not so well, with the first install seeming to have a partially functioning on-access component. While malicious code was detected on execution, the on-read and on-write protection boasted of in the interface appeared to be completely absent, despite numerous restarts and adjustments of the settings. Finally, however, the right combination of clicks managed to get it up and running, and on a second install on fresh hardware it seemed happier to start of its own accord.
Scanning thus proceeded without further interruption, with the same excellent detection rates as the IS product, and also the same fairly slow scanning times. The core requirements of the VB100 were easily satisfied, and a second award is thus earned by PC Tools, along with some compliments on the developers’ sterling efforts at improving the product.
A newcomer to this month’s comparative, Preventon provides its own version of a third-party engine which appears generally to be sold via ISPs and other rebranding sales channels. Our first impressions were good, with a nice, simple install process, and a well-designed GUI aiming firmly for the simple end of the market. The simplicity did nothing to impair performance or usability however, with a sensible set of defaults and a sprinkling of useful controls that were easy to find in the bright, colourful interface. One issue that did perplex us was the pair of arrow buttons provided, which we assumed would move us left and right through the tabs but seemed not to; we eventually divined that they were actually browser-style forward and back buttons rather than simple left and right.
This minor moment of confusion aside, a few problems with auto-quarantining – which slowed things down considerably in the larger infected sets – and limited logging were easily overcome with some advice from the vendor and a little care in running jobs, and results were easily acquired. Scanning speeds were fairly decent, and detection rates pretty solid, with a fair-sized decline in the more recent weeks of the RAP sets. Without false alarms and with complete coverage of the WildList, Preventon is a worthy winner of a VB100 award on its first attempt.
A second newcomer to this month’s test, and like the previous entrant Qihoo was a surprise last-minute appearance with a third-party engine (BitDefender in this case). Qihoo hails from China and, this being a fairly new product, the company has yet to translate its product interface into other languages. Aided by a thorough guidebook and a little inspired guesswork, the team found the install fast and simple and the interface clearly and rationally designed, allowing some options to be discovered simply through logic without recourse to understanding the markings.
Scanning speeds were no more than mid-range but detection rates, as demonstrated by other incarnations of the same engine, were splendid, with solid scores across the sets. The WildList and clean sets proved little problem bar a handful of files marked merely as 'suspicious', and Qihoo also makes the VB100 grade at first attempt.
Quick Heal’s product offers a pre-installation scan along with the usual set of steps, but is still in place in excellent time. The design is bright and eye-catching, the layout reasonably rational and not too tricky to find one’s way around, and a fair level of controls is provided for most needs, so testing proceeded apace.
Speeds were not as rapid as we have come to expect from the product in the past, but still perfectly decent, and detection rates were fairly decent too, with a steady decline observed across the RAP sets. The WildList and clean sets were handled well, so Quick Heal also wins a VB100 award this month.
With the latest edition of this product Sophos again introduces some additional functionality without noticeably affecting the user experience. In this case we understand that encryption features have been merged into the company’s corporate offerings, but after another fairly lengthy install process the interface seemed unchanged, at least at a cursory glance.
The GUI is simple and logical and presents an excellent range of options, as demanded by the product’s business audience – although some items, such as always scanning memory and boot sectors when running a manual scan, are tucked away in a super-advanced section alongside other controls of a far more technical nature. We noted a few quirks in the layout which had the potential to confuse, such as the separation of scan settings into two areas, and also spotted some disagreement in data presented when opening the scan interface part-way into a running scan. While the newly opened scan window reported one set of figures, these seemed only to measure activity from the point at which the window was opened. Meanwhile, the display in the main interface offered a different set of statistics for the same scan.
These minor quibbles aside, scanning speeds proved pretty decent and detection rates solid. Detection rates were particularly good in the RAP sets where some excellent figures were noted, especially in the proactive set; we observed enormous numbers of detections being covered by a relatively tiny number of unique identities, so it seems like Sophos’s focus on generic coverage is paying dividends. With no problems in the WildList and no false positives, Sophos earns another VB100 award after a minor upset last time around.
Perhaps one of the most long-anticipated VB100 appearances, Sunbelt’s Vipre has been around for a few years now. The product was featured in a standalone review in these pages last summer (see VB, July 2008, p.16), and has been building a strong reputation for itself despite little participation in the standard tests. For some time we have been getting regular enquiries from our readers as to why Vipre has yet to appear in the VB100, and it is with great excitement that we finally get to record and report some results. Given the company’s marketing of the product as lightweight and easy on resources, we were particularly interested in its performance figures.
The installation process runs along fairly typical lines, at a rapid pace, but requires a reboot to complete. The interface is fairly clean and attractive and provides a reasonable range of configuration options, although we could not find a way to protect against more than the default set of file extensions on access – or indeed, to delve into archives on demand.
Stability proved solid though, and speeds were pretty decent too, with an impressive improvement on access once files had become known to the product. Detection rates were not bad either, with a few issues in the polymorphic set mostly explained by rare and obscure items not covered at all, and scores in the trojans and RAP set fitting into the better end of the middle of the field. The WildList proved no obstacle despite the set of tricky Virut samples, and with no false positives either Vipre earns a VB100 on its first appearance; we hope to see many more.
Unlike many of its competitors, Symantec continues to enter only its corporate product for most of our comparative reviews – although we do hope to see some more regular appearances from the ubiquitous Norton consumer solutions in future.
The corporate product is a little less sober and businesslike than it used to be. After a fairly unflashy, somewhat slow install which requires a reboot to complete, a curvy and colourful interface appears, with a fairly simple layout. Some in-depth configuration is provided in more serious-looking ‘advanced’ areas – although some administrators may wish for a little more depth. In places options need to be set multiple times for minor variations on the same theme, making the process of setting up an on-demand scan something of a chore.
We’ve noted before that scanning infected items can be rather slow with this product – something which may be due to the intensive logging that is carried out as scanning proceeds. Where many other products this month have frustrated us by limiting their logs to unusably small sizes, Symantec has gone the other way and provided almost 2GB of information for us to plough through. On one occasion we had a more serious issue with the logging system, when a scan seemed to get snagged somehow, spending more than 30 minutes on a single file. Rebooting the system seemed to clear the jam, but the product insisted that the scan was still running, and thereafter refused to add any information about more recent jobs to the history display system.
These were fairly obscure issues of course, that are unlikely to be encountered in real-world day-to-day use, and in the core data all seemed to be fine. Scanning speeds were pretty good, and on-access overheads excellent, while detection scores were splendid up until a fairly steep decline in the latest weeks of the RAP sets. No problems were encountered in the WildList or clean sets however, and Symantec duly earns another VB100 award.
Trustport’s installer follows the standard paths, with a few sidetracks for some set-up of the multi-engine system, and does so at a fair speed, finishing with a reboot. The multi-GUI control system is not best suited to UAC-affected systems, as numerous prompts for confirmation must be endured to access the various components, and again some problems were observed opening browser windows for on-demand scans, which could take an excessively long time. We also noted the system was quite clearly slower to come to life on reboot, and after a number of on-access detections there seemed to be some oddity with pop-ups, which kept reappearing at regular intervals long after they had been observed and acknowledged, even after the system was rebooted.
Scanning speeds were fairly sluggish, but in some areas did show some improvement the second time over the same files on access. On the positive side, detection rates were outstanding as usual, with the highest scores overall this month in the trojans set and no issues at all elsewhere. With the core requirements easily met, Trustport comfortably earns a VB100 award.
VirusBuster’s installation is fast and easy, although the interface when it comes up looks increasingly elderly and in need of updating. The design is somewhat clunky and unintuitive, with on-demand scans requiring repeated recourse to advanced tabs, which must be called up separately in each of the numerous stages. There are also a few snags and glitches in the display, with lines and text boxes overlapping and poorly laid out on screen.
Otherwise everything proved pretty plain sailing, with some fairly decent scanning speeds and reasonable detection rates too, declining steadily into the final portions of the RAP sets. The WildList and clean sets presented no difficulties, and a VB100 award is duly earned.
The final entry on this month’s monster roster of products, Webroot’s installation process kicks off with a very busy page covering registration code, EULA, install options and the offer of a (free!) Ask toolbar, all at once. The install process is then fairly brisk until a reboot is demanded, and some post-install set-up of community scheme participation is also required.
The product itself is slowly revealing its mysteries thanks to long exposure, but remains something of a challenge to navigate and control properly, with custom on-demand scans a particularly arduous chore. GUI buttons can take a huge amount of time to respond, particularly at the end of a scan when it sometimes feels like it would be quicker to allow the product to destroy our test sets than to wait for the ‘deselect all’ and ‘quarantine selected’ to respond – even with little or nothing selected. Logging is also severely restricted, although a custom fix from the developers provided us with a way around this. On-access scanning appears not to function on-read by default, with an option to enable it buried deep in the elaborate configuration structure. In most cases scores were divined by a mixture of logging and checking copied test sets for files either not written or allowed to write only after disinfection.
In the end, scanning speeds were fairly good. On-access overheads were heavier than expected, but detection rates pretty decent, as one would expect from the Sophos engine that underlies the product. The WildList proved no major challenge, and with no false positives either Webroot also takes away a VB100 award.
Crawling exhausted from the lab after our biggest month of testing ever, with a mind-numbing 43 products crammed into a mere three weeks of testing, we found it surprisingly difficult to draw any specific conclusions from such a large and varied set of data. As usual there were some excellent performances and some disappointments, some high scorers and some fast speeds counterbalanced by some at the other ends of both scales.
Generally we found Windows 7 a fairly amenable platform, afflicted by a number of fairly basic bugs which will hopefully be ironed out in the first service pack (which surely cannot be long in coming). Our poor test hardware, battered from some seriously heavy usage, began to show signs of wear, with some of the more heavyweight products causing one system in particular to overheat regularly. The range of products under test had few specific issues running on the new operating system, although a few had some problems getting installed and for many some more thought is needed as to how to interact with the UAC system less intrusively.
In terms of passes and fails, this has been a good month for most products, with a fairly small number of false positives – perhaps thanks in part to the tightening of our own rules concerning what is considered ‘fair game’ for the clean sets. The WildList, despite more rapid changes in its makeup, presented few major challenges, but continues to be a good gauge of which products are consistently up to the mark. Some further improvements to the complexity of the list are expected soon, which should make it a much more complete and challenging measure. We had a number of new faces in the test this month, several of whom will be able to present themselves to their customers with certain proof of their bona fides – a valuable thing in these days of rogue products flooding the Internet with their deceitful claims.
What issues were observed with products mainly confined themselves to frustrations and irritations rather than outright show-stoppers. Curious and inexplicable time lags were frequent, especially when trying to browse local filesystems, and many of the interfaces proved far less responsive than most users will accept. With a mix of corporate and consumer products being tested, we saw some vast differences in the approach to user interaction, with many at the home-user end trying to take responsibility and control away from the user entirely – an approach which seems to limit their market somewhat to only the least engaged audiences.
One of the biggest issues we had this month was with logging, with problems arising both from the lack of complete data and data being obscured and/or encrypted. Some products which store their data in proprietary formats and rely on parsing and processing raw data into humanly readable forms can easily get overwhelmed by logs over a certain size. Meanwhile, others seem to think it acceptable to simply destroy any data once a certain size threshold has been reached; if software has been doing things to my computer, I want it to be able to tell me about it and account for its activities, whether or not it has been busy doing other things since. Aside from this worry, it renders testing rather difficult, and we may have to impose some stricter requirements on logging provision for future comparatives.
Something else which will have to wait is the introduction of our additional performance measures. A vast horde of data was gathered during this month’s test, but as deadlines closed in on us and the slower, more recalcitrant products took longer and longer to provide usable data, we had to make a decision to put off the lengthy job of processing and interpreting all this information for presentation to our readers. Hopefully we will be able to make it available soon, and having gone through the process of preparation we should be able to include it regularly in comparatives from now on.
Looking to the future, the next test will be our annual excursion on Linux – surely a blessing for our tired eyes and weary fingers thanks to the less well-populated field of potential competitors. After that we will be back up to full speed for another XP comparative, and what looks likely to be another challenge to this month’s record-breaking haul of submissions. We can only hope that on a more seasoned and familiar platform, and with some points taken on board from this month’s comments, products will be better behaved and easier to push through our ever-growing range of tests.
Test environment. All products were tested on identical systems with AMD Athlon64 X2 Dual Core 5200+ processors, 2 GB RAM, dual 80GB and 400GB hard drives, running Microsoft Windows7 Professional, 32-bit edition. | 2019-04-23T02:40:07Z | https://www.virusbulletin.com/virusbulletin/2009/12/windows-7 |
Hepatocellular carcinoma (HCC) is characterized by widespread epidemiological and molecular heterogeneity. Previous work showed that in the western part of North Africa, a region of low incidence of HCC, mutations are scarce for this tumor type. As epigenetic changes are considered possible surrogates to mutations in human cancers, we decided, thus, to characterize DNA methylation in HCC from North-African patients.
A set of 11 loci was investigated in a series of 45 tumor specimens using methylation-specific and combined-bisulfite restriction assay PCR. Results obtained on clinical samples were subsequently validated in liver cancer cell lines.
DNA methylation at tumor suppressor loci is significantly higher in samples displaying chromosome instability. More importantly, DNA methylation was significantly higher in Arg/Arg when compared to Pro/Pro genotype carriers at codon 72 rs1042522 of TP53 (65% vs 20% methylated loci, p = 0.0006), a polymorphism already known to affect somatic mutation rate in human carcinomas. In vitro experiments in cell lines indicated that enzymes controlling DNA methylation were differentially regulated by codon 72 Arg or Pro isoforms of p53. Furthermore, the Arg72-carrying version of p53 was shown to re-methylate DNA more rapidly than the pro-harboring isoform. Finally, Pro-carrying cell lines were shown to be significantly more resistant to decitabine treatment (two-fold, p = 0.005).
Our data suggest that Arg72Pro polymorphism in a WT p53 context may act as a primary driver of epigenetic changes in HCC. It suggests, in addition, that rs1042522 genotype may predict sensitivity to epigenetic-targeted therapy. This model of liver tumorigenesis that associates low penetrance genetic predisposition to epigenetic changes emerges from a region of low HCC incidence and it may, therefore, apply essentially to population living in similar areas. Surveys on populations submitted to highly mutagenic conditions as perinatally-acquired chronic hepatitis B or aflatoxin B1 exposure remained to be conducted to validate our observations as a general model.
Hepatocellular carcinoma (HCC), the most frequent primary liver tumor, is a malignancy affecting around 7 105 patients each year, with highest incidences measured in Sub-Saharan Africa and Eastern Asia. HCC is now the fifth most common malignant tumor and the third common cause of cancer-related mortality worldwide . The Western North-Africa (WNA: Morocco, Algeria and Tunisia), is considered as an area of intermediate endemicities for chronic viral hepatitis B and C, and displays much lower incidences of HCC than both European or African neighboring countries [2,3]. It is generally admitted that liver tumorigenesis is a consequence of accumulation of genetic and epigenetic alterations in key genes controlling proapoptotic or prosurvival signals. These changes occur generally in an impaired hepatic tissue undergoing a persistent viral infection and/or a cirrhosis, but it could be promoted also by an exposure to mutagens such as aflatoxin B1 . Several classifications of HCC were established to differentiate tumors by focusing on histological characteristics, gene mutations in TP53 and Wnt pathways and hypermethylation of tumor suppressor genes (TSG) [5,6]. In addition, HCC can be genomically characterized from the most instable tumors with frequent TP53 and AXIN1 mutations to stable tumors with β-catenin alterations . Moreover, transcriptomics revealed an overexpression of imprinted and mitotic cell cycle genes within instable tumors at odds with stable ones that show increased levels of metabolism-controlling genes coupled to an underexpression of stress, immune response and cell adhesion coding genes [8,9]. Epigenetic alterations, and particularly DNA methylation, are also suspected to represent a class of decisive events in liver tumorigenesis. Indeed, diverse studies have been carried out on different cohorts of HCC patients affording insight about epigenetic changes controlling liver carcinogenesis . Hypermethylation of a set of TSG such as RASSF1, RIZ, CDK2NA and GSTP1 is commonly reported in HCC . Such targeted silencing is generally accompanied by a global hypomethylation affecting repetitive elements covering the genome [12,13]. The connections between genetic and epigenetic features mentioned above are still poorly understood. Finally, numerous studies have been performed to explore the association of the genetic background of patients with an eventual individual susceptibility to HCC [14,15]. TP53 presents, at codon 72, a functional single nucleotide polymorphism (SNP, R72P, rs1042522) that modulates the susceptibility to several cancers including HCC . Notably, the presence of an arginine at codon 72 is known to be associated with higher rates of somatic TP53 mutations in tumors .
Despite this apparent wealth of data, carcinogenesis in specific populations such as WNA inhabitants is still poorly understood. The WNA patients are, actually, characterized by the scarcity of alterations found in HCC . This situation suggests that epigenetic changes may be the most significant changes in WNA patients. The aim of the study was, thus, to provide an appraisal of the epigenetic changes occurring in HCC from a WNA population. Methylation status at 10 individual loci as well as at repetitive elements (LINE-1) was assessed. Variations in DNA methylation levels were further confronted with genetic data including β-catenin and TP53 mutations, chromosomal instability (CIN) and genotypes of selected SNPs. We found that, in HCC from WNA, somatic changes including methylation, mutations, or CIN were primarily conditioned by the genotype at codon 72 of TP53. The current report represents the first description of the existing correlation between TP53 R72P and epigenetic changes in tumors.
Clinico-biological features of the HCC patients are summarized in Table 1. In this study, we examined methylation patterns of ten tumor-associated genes (RASSF1A, GSTP1, RIZ1, SOCS1, TNFRSF10C, hTERT, NRG1, CLU, miR-203, miR-663) and of the LINE-1 repetitive element in 45 HCC and 17 matching non-tumor livers (see Figure 1 and Additional file 1: Table S1). Genes were selected on the basis of the literature as aberrantly methylated in different human cancers including HCC [18-29].We define Methylation Index (MethIndex) as the number of methylated genes on the total number of informative loci analyzed for a given sample (LINE-1 was excluded from the calculation as it is constitutively methylated). miR-663 was found unmethylated in all samples.
Chromosome instability is expressed as the fraction of chromosome arms lost in a given samples (chromosomes 1p, 4q, 6q, 8p, 9p, 17p were analyzed).
HCV, hepatitis C virus; HBs Ag, surface antigen of hepatitis B virus; HBc, hepatitis B virus capsid/core.
Analysis of DNA methylation in WNA HCC by two PCR methods. (A) Representative Methylation-Specific PCR for 6 of the 11loci on 5 different matching pairs of hepatocellular carcinomas and non-tumorous livers. U: PCR with primers for unmethylated DNA, M: PCR with primers detecting methylated DNA. (B) Representative examples of combined bisulfite restriction analysis (COBRA) performed on 7 pairs of hepatocellular carcinomas and corresponding non-tumorous livers on three different loci. The smaller bands beneath the larger ones represent digested (i.e. methylated for BstUI and unmethylated for HpHI restriction enzymes) alleles. N, noncancerous liver; T: livertumor, C: controls, C- : native DNA from WI38 fibroblasts in culture, C+: SssI CpG methylase-treated DNA from the same cells. Ratio of undigested/digested quantified with ImageJ 1.38 Instrument software integrated (Yang et al., ).
First, we intended to check whether there was a significant increase of DNA methylation in tumors when compared with non-tumorous DNA extracted from the liver tissue of patients with HCC. The methylation profiles of 17 HCCs and their matching non-tumorous liver (NTL) tissues were visualized on a heatmap produced by unsupervised hierarchical clustering approach. Major differences between tumors and non-tumorous DNA enabled clustering analysis to discriminate between sample types (see Figure 2A). Significant differences or trends between HCC and NTL were detectable at four loci (SOCS1, RIZ1, TNFRSF10C, miR-203) out of the 11 examined (Figure 2B). RASSF1 locus comparison displayed only an infra-significant P value (P = 0.083). The overall difference between malignant and non-malignant tissues was highly significant (MethIndex was mean ± SD = 44 ± 20% in HCC versus 24 ± 20% in NT, p = 0.003, Figure 2C).
Distinct DNA methylation levels in HCC and non-tumor livers. (A) Hierarchical unsupervisedclustering and corresponding heatmap of the methylation status in 17 WNA HCCs and the 17 matching non tumorous livers. Clustering was obtained using a 1-rank correlation distance calculation and an average linkage on DChip software. T symbolyzes the tumor samples whereas N corresponds to the non-tumor liver counterparts. (B) Comparison of the methylation rates as detected at the different loci in the 45 HCC and the 17 Non-tumor livers. (C) Methylation Index in HCC and matching non-tumor liver DNA from the same patient. Lines link the dots corresponding to T and NT specimens of the same patient.
We then wondered whether the methylation pattern could distinguish different subsets of tumors in correlation with previously analyzed somatic mutations, loss of heterozygosity (LOH) or SNPs [2,30]. Unsupervised hierarchical clustering distinguished three categories of HCC patients: those with low MethIndex (mean ± SD = 19 ± 18%), a second group with medium MethIndex (42 ± 12%) and a third subset with high (69 ± 11%) MethIndex (Figure 3A). TP53 somatic mutations and LOH at chromosome 17p (TP53 maps in 17p13.1) were significantly associated with the high methylation index cluster (p = 0.022 and p = 0.014). Single-locus matrix of correlation revealed frequent significant associations between methylation occurring at RIZ1 or RASSF1 promoters and presence of methylation at other loci (Additional file 1: Table S2). Furthermore, increased methylation of tumor suppressor genes or decreased methylation of LINE-1 repetitive element, were associated with higher rates of somatic changes in tumor samples. There was a strong correlation between LINE-1 demethylation and the loss of chromosome 17p or the presence of somatic mutations in the tumor (either at TP53 or CTNNB1, p = 0.006, see Figure 3B). We next decided to explore whether DNA methylation at individual loci could be correlated with a more general form of chromosome instability. We calculated in a previous work on the same samples the fractional allelic loss (FAL) for common deletion targets in HCC (1p, 4q, 6q, 8p, 9p and 17p) . FAL is the number of chromosome arms showing LOH/number of informative chromosome in a given sample [31,32]. RASSF1 methylated status was significantly associated with higher FAL values (p = 0.034, Figure 3C) as well as isolated 17p loss (Additional file 1: Table S3). Methylation of RIZ1 and miR-203 was positively correlated with somatic mutations or losses at chromosome 17p and 4q (see Additional file 1: Table S3). Finally, we noticed a strong influence of the SNP rs1042522 on the methylation of WNA HCCs. The proline variant at codon 72 of TP53 gene was significantly associated with the low methylation cluster (p = 0.04, Figure 3A), and specifically with an almost complete absence of methylation on RIZ1, TNFRSF10C, NRG1, hTERT and miR-203. When the MethIndex was stratified according to TP53 codon 72 genotypes, significant differences were even more apparent (see Figure 3D). A very low MethIndex was associated with Pro/Pro genotype (mean ± SD = 20.8 ± 14%) whereas methylation was significantly higher in tumors of individuals homozygous for arginine (57.1 ± 19%, P = 0.0006). Tumors from heterozygous Arg/Pro were occupying an intermediate position for MethIndex (39.1 ± 23%) suggesting the existence of an allele dosage effect of TP53 codon 72 polymorphism on the DNA methylation in HCC from WNA patients. In addition, MethIndex distributions for Arg/Arg and Arg/Pro carriers were displaying a bimodal distribution (see Figure 3D). Methylation of SOCS1 was appearing as particularly correlated with TP53 codon 72 genotype (see Additional file 1: Table S3).
TP53 ARG72PRO modulates DNA methylation in WNA HCC. (A) Hierarchical clustering and corresponding heatmap of the methylation status at 10 loci in 45 WNA HCCs. Clustering was obtained using a 1-rank correlation distance calculation and an average linkage on DChip software. Squares indicate the presence of a somatic change or a pathogenic variant in the corresponding samples. TP53 somatic mutation (p = 0.017), LOH at chromosome 17p (p = 0.0094) and chromosome instability (p = 0.067) are associated with the high methylation index cluster whereas Pro/Pro at codon 72 of TP53 is significantly associated (p = 0.048) with a medium or low methylation index. (B) In WNA HCC, methylation of LINE elements correlates significantly with the presence of other somatic changes as point mutations (in TP53, CTNNB1 and AXIN1) or allelic loss at chromosome 17p where is mapping TP53. (C) Distribution of the Fractional Allelic Loss (FAL) according to the methylation status of RASSF1. mRASSF1, methylated or hemimethylated locus; uRASSF1, unmethylated locus. FAL was assessed on 6 chromosomes (1p, 4q, 6q, 8p, 9p, and 17p). LOH, loss of heterozygosity. (D) Distribution of the methylation index according to the genotype at codon 72 of p53. Methylation index is calculated as the methylated fraction at 9 loci (SOCS1, RASSF1, RIZ1, GSTP1, TNFRSF10C, miR203, NRG1, CLU and TERT).
Predicting the propensity of individuals to undergo a strong DNA methylation in their tumors may prove to be useful in a perspective of future treatment by epigenetic-targeting drugs. To determine whether it is possible to find a correlation between the aberrant methylation process ongoing in tumors and the DNA methylation in circulating lymphocytes, we analyzed the DNA extracted from peripheral lymphocytes of 25 patients with HCC and 35 patients with chronic hepatitis B or C but without HCC. All patients were from WNA. No significant differences were detected between patients with or without primary liver cancer (see Additional file 2: Figure S1A). DNA Methylation was very low in PBMCs of HCC patients as well as in patients infected by hepatitis viruses (Additional file 2: Figure S1B). In contrast, LINE-1 methylation remained high in both subsets of samples. Genetic targets usually used to assess the methylation process in tumors did not appear to be sensitive markers reflecting the tumor DNA methylation level when they were analyzed ectopically as in PBMC (Additional file 2: Figure S1C).
We decided subsequently to explore in vitro whether p53 codon 72 Arg or Pro-encoding isoforms could be endowed of a differential transcriptional activity, explaining the rate of DNA methylation observed in vivo. For this purpose, we analyzed eight different TP53 wild-type HCC cell lines differing at codon 72 (Figure 4A). All these cell lines were expressing p53 protein either at baseline or upon induction by doxorubicin (0.2 μM/24 h, see western-blot on Figure 4B).
Impact of TP53 ARG72PRO on the expression of genes involved in DNA methylation metabolism. (A) Panel of liver cancer cell lines wild-type for TP53 used for in vitro experiments. (B) Western-blot analysis of p53 expression (baseline and doxorubicin-induced) in the panel of cell lines. +: indicates doxorubicin treatment, 0.2 μM/72 h. (C) qRT-PCR analysis of genes involved in DNA methylation metabolism. All cells were treated 48 h by 0.5 μM doxorubicin. P values are obtained by ANOVA analysis.
TP53 encodes a transcription activator/repressor known to modulate directly or indirectly expression levels of many genes . As the codon 72 Arg72Pro polymorphism is located in the transactivation domain of the protein, we wondered whether this genetic variation might impact the capacity of p53 to modulate expression of those genes most directly involved in DNA methylation i.e. DNA methyltransferases and demethylases [34,35]. Using qPCR, we compared the expression of sixteen genes encoding for factors modulating DNA methylation levels positively or negatively. Gene expression was measured after 0.5 μM doxorubicin, or 2.5 μM decitabine or vehicle treatment for 48 h. Baseline or post-decitabine expression of the 16 genes was not different according to TP53 codon 72 genotypes (data not shown). Following doxorubicin treatment, we did not observe difference for two bona fide p53-responsive genes (p21-CDKN1A, GADD45). By contrast, DNMT3A, TET1 and TET2 expression levels were significantly higher in Arg/Arg cell lines whereas in a Pro/Pro background APOBEC3B expression was increased (see Figure 4C). Importantly, TP53 expression was significantly higher in Pro/Pro cells. These data suggest that, in case of genotoxic stress, Arg-bearing isoforms of p53 are more efficient inducers of enzyme controlling DNA methylation than Pro-encoding isoforms.
We next explored whether it is possible to mimic in cell lines what we observed on DNA from North-African HCC patients i.e. an increased DNA methylation in presence of Arg/Arg genotype. At variance with commonly performed gene inactivation experiments, differences of activity between two natural variants of a fully functional protein were predictably rather mild . Furthermore, the DNA methylation status is intrinsic to each cell line and may differ widely at baseline. We thus decided to analyze DNA methylation and re-methylation dynamics following treatment with drugs modifying DNA methylation levels. Decitabine alone, doxorubicin alone or both drugs were sequentially used. Doxorubicin, as an intercalating agent, is known to induce DNA breaks but early reports have shown as well its capacity to induce DNA methylation . To analyze methylation variations, we used a methylation-specific restriction enzyme (MSRE)-coupled qPCR method [37,38]. A set of seven CpG island-containing promoters (BIRC5, CDC25C, CLU, GSTP1, NRG1, RASSF1, SOCS1) was investigated on the panel of TP53 wild-type codon 72 Arg or Pro HCC cell lines (Additional file 3: Figure S2).
The impact of the treatment was dependent on the compound and on the promoter analyzed. No difference in DNA methylation level was observed after doxorubicin or decitabine treatment alone (data not shown). However, when decitabine (5 μM/72 h) and doxorubicin (0.25 μM/24 h) were used sequentially in a demethylation-remethylation procedure, a frequently higher rate of DNA methylation was observed (see Figure 5A) in presence of codon 72 Arg forms of p53, indicating a more active kinetic of DNA methylation. The phenomenon was particularly pronounced for genes displaying differential methylation in vivo (GSTP1, NRG1, RASSF1, and SOCS1). It was not observed on promoters of genes without differential methylation (CLU) or controlling cell cycle (data of CDC25C, BIRC5 are not shown).
Increased DNA methylation and increased sensitivity to DNA demethylation of ARG72 carrying HCC cell lines. (A) MSRE-coupled qPCR analysis following sequential treatment of the cells by decitabine (5 μM/72 h) and doxorubicin (0.25 μM/24 h). ARG/ARG cell lines are often more resistant to methylation-sensitive DNA restriction than PRO/PRO cells that usually yield weaker signal in qPCR. The figure represents the outcome of two independent experiments in triplicate. Fold is relative to decitabine-treated only DNA. (B) Cell viability analysis of Cell lines as measured by MTT assay in different treatment conditions.
Given the differential gene expression or DNA methylation capacity of p53 variants, the issue of a differential sensitivity to epigenetic-targeted treatment was asked. The eight TP53 WT cell lines were, thus, treated either with decitabine (10 μM/96 h) or doxorubicin (0.25 μM/72 h) and cell viability measured by MTT assay. No difference was observed with decitabine whereas homozygous Arg cells were significantly more sensitive to doxorubicin treatment (Figure 5B). Previous experiments have shown that differential in vitro effect of codon 72 polymorphism was essentially a kinetic-dependent phenomenon rather than relying on a difference in nature. We thus decided to measure the effect of decitabine at different time point after removal of the active compound. Cells were treated by 5 μM decitabine during 96 h and cell culture medium was then replaced by decitabine-free medium. Cell viability was then measured at 24 h, 48 h, 72 h, 96 h, 7 days and 10 days. No difference was observed after 24 h or 7 and 10 days of recovery (data not shown). However, significant differences of cell viability were observed 48 h (p = 0.05, not shown), 72 h (p = 0.01, not shown), and 96 h (p = 0.005, see Figure 5B) post-decitabine removal. In these settings, Arg/Arg HCC cells were significantly less viable than Pro/Pro. These results suggest, therefore, a more efficient death-inducing activity of decitabine in an Arg-bearing p53 background.
HCC epidemiology is known to follow ethno-geographic variations of incidence. Intriguingly, despite intermediate endemicities for chronic viral hepatitis B and C, low incidences of HCC are registered in the WNA populations (1.2-2.3 cases/105 habitants for males, age standardized ratio, http://globocan.iarc.fr/) [39,40]. Remarkably, in WNA, HCC is characterized by a relative paucity of mutations at common genetic targets (TP53, CTNNB1, AXIN1), making of liver tumorigenesis in WNA a rather mysterious process (2). Nevertheless, and despite an apparently mild tumor process, HCC prognosis in WNA is as bad as anywhere else [41,42].
To date, no survey characterizing epigenetic features of HCC in WNA patients has been published. Our results were in accordance with those published by Hernandez-Vargas et al. underlining the importance of aberrant methylation that differentially affects RASSF1, RIZ1 and SOCS1 in tumors and non-tumorous tissues . A rather high level of methylation was observed in four NT liver DNA (≥4 loci methyl(+), see Figure 2A). We could not find any annotations common to the four patients. However, we observed that their non-tumor liver tissues tended to be more frequently non cirrhotic (3/4 vs 5/41, p = 0 .014) and the FAL in tumors slightly higher (38 vs 28%, ns) than in other samples of the series. These observations might indicate that a stronger carcinogenic process conferring a preneoplastic status to NT liver is at work in these patients. Alternatively, it might be the consequence of a field cancerization process in absence of full-fledged cirrhosis [44-46]. Besides, Nishida et al. have shown that DNA methylation levels are correlated with chromosomal instability, TP53 and β-catenin mutations . Our data broadly corroborated this model, though without integrating β-catenin, as this alteration is very infrequent in WNA HCC. We hereby presented data refining and strengthening this model by showing a link between polymorphism at codon 72 of TP53, somatic mutations, chromosomal instability and DNA methylation status in HCC from WNA patients. The preferential association of codon 72 Arg with somatic mutation of TP53 has been thoroughly reviewed by Soussi and Wiman . Likewise, the well-known association of chromosomal instability and TP53 mutation will preferentially occur in an Arg/Arg context . Finally, it has been shown that DNA methylation is significantly reduced in Li-Fraumeni cell lines . However, to our best knowledge, a correlation between aberrant methylation and germline background of patients for TP53 was never reported.
The TP53 R72P polymorphism is known to be functionally relevant. The Arg variant was shown to be associated with a better apoptotic activity compared to Pro allele . Furthermore, predisposition studies showed that the presence of the Pro allele is commonly associated with a higher risk of cancer including HCC [30,51] and of defects in embryonic implantation . Our data indicate that codon 72 polymorphism conditions, apparently, genomic and epigenetic alterations encountered in the tumor tissue. In the current series of HCC from WNA patients, the Pro variant is associated with paucimutated and mildly methylated tumors. On the contrary, the presence of Arg allele requires the presence of additional somatic mutations and frequent DNA hypermethylation. It is well known that aging process is accompanied by an increase of genomic methylation that progressively decreases the expression of multiple genes . Moreover, as shown in mouse models, an excess of p53 activity is characterized by an aging-like syndrome . Finally, it has been shown in humans that TP53 codon72 Pro carriers tend to live longer than Arg carriers . A link between rs1042522 and constitutive DNA methylation was, however, never evoked so far. Our results indicated consistently that TP53 codon72 Arg/Pro polymorphism may, in the North-African ethno-environmental settings, influence somatic evolution through the modulation of DNA methylation levels. The fact that we were able to reproduce this situation in vitro reinforces this hypothesis. We did not detect baseline differences of DNA methylation between cell lines but an increased DNA methylation was often detectable in Arg/Arg cells after decitabine-induced demethylation and subsequent doxorubicin-induced DNA re-methylation. Interestingly, three of the genes showing differential methylation between Arg and Pro variants (GSTP1, RASSF1, and SOCS1) are known to be p53 targets [56-58]. This situation suggests that p53 may, depending on circumstances activates or methylate its target genes. The system we developed in vitro is relatively removed from physiological conditions or from a slow and long lasting process as tumorigenesis but it suggests that p53 controls DNA-methylation plasticity in condition of stress. Genome wide DNA methylation studies on normal and pathological conditions are now warranted to confirm our data. Another intriguing feature of DNA methylation in Arg/Arg and Arg/Pro carriers was its bimodal distribution. We were not able to correlate this feature with any of the clinic-biological annotations at our disposal. It is, thus, tempting to hypothesize that p53 impact on DNA methylation could be modulated by another genetic trait. It is, indeed, well known that DNA methylation levels in humans are strongly influenced by polymorphisms affecting genes controlling one-carbon metabolism [59,60]. Moreover other polymorphic effectors of DNA methylation, to be found in the oxidative stress pathway or among partners acting directly in DNA methylation (eg DNMTs), can be suspected to influence methylation levels [61-63].
Being aware that we do not provide a mechanistic explanation to our observations, some conspicuous differential expression affecting genes involved in DNA methylation metabolism, particularly those of DNMT3A (methylating) or APOBEC3B (demethylating), however, are in keeping with the current model of DNA-methylation metabolism . It is well known that p53 entertains tight connections with the different cellular DNA-methyltransferases. Indeed, p53 and Dnmt3A are direct interactors as shown by co-immunoprecipitation experiments [65,66]. In addition, and in absence of mutagenic stress, p53 is known to directly inhibit DNMT1 expression by trapping Sp1 and repressive chromatin modifiers on the promoter of the gene [67,68]. The links between p53 and Dnmt1 are, however, far more complex. Both proteins have been shown to physically interact on various p53-responsive promoters (eg survivin/BIRC5) leading to their inactivation through DNA methylation as well as other chromatin modifications [38,69]. These data and the well-described differential activities of p53 Arg/Pro isoforms in other epigenetic-sensitive phenomena such as cancer or ageing, make plausible a differential activity of rs1042522 on DNA methylation levels.
Finally, we showed a mild but significant increased ability to recover from decitabine treatment in Pro-carrying cells than in Arg carriers. This is in line with our hypothesis according to which tumorigenesis is less dependent on DNA methylation in Pro than in Arg carriers. In addition, and despite hitherto disappointing results in solid tumors, our data suggested that decitabine use in a codon 72 Arg/Arg wild-type TP53 context might significantly improve chemotherapeutic treatment [70,71]. The hypothesis obviously needs further confirmation but may be considered as a potential novel application in personalized treatment of cancer.
Our model of tumorigenesis, relying on TP53 Arg72Pro, may hold true only in selected populations of patients. In areas of high HCC incidence (Far East, Sub-Saharan Africa), populations are, indeed, exposed to potent risk factors such as perinatal infection with hepatitis B virus or exposure to aflatoxin B1. Such conditions, known to induce major genomic alterations in HCC, are presumably dwarfing the subtle impact of rs1042522 . Cases of primary liver cancers with somatic changes depending primarily on TP53 R72P genotype might be confined to low incidence areas such as WNA, Middle East, Indian sub-continent or South America. In a research field dominated by clinical and biological studies undertaken on Far-Eastern patients, our work emphasizes the necessary space for a research conducted on alternative populations affected with specific tumor processes.Such studies may provide valuable information for the understanding of a disease which natural history and biology remain amazingly diverse from one world region to another.
Sixty-three liver tissues including forty five HCC and seventeen matching corresponding non-tumorous liver tissues were obtained from WNA patients who underwent a liver surgery at University hospitals in Morocco (n = 41) and Tunisia (n = 4). Clinico-pathological features of patients are described in Table 1. In addition, PBMCs of thirty-five patients with chronic viral hepatitis B or C (27 HBV+ and 8 HCV+) but without tumors were collected for comparative methylation analysis with 25 PBMCs samples from patients with HCCs. All samples have been already published in previous surveys . The research was conducted with the informed consent of the patients in accordance to the recommendations issued by the conference of Helsinki. It was approved by the Ethics Committees of the Faculty of Medicine of Casablanca and that of the Tunisian Ministry of Health. DNA was extracted from frozen tissues and blood samples as previously described .
Data of SNP in TP53 (rs1042522) were previously published . Exons 4–10 of TP53, exons 2–6 of CTNNB1, exons 2–8 of AXIN1 were analyzed for the presence of point mutations by PCR-sequencing as previously described (2). Six chromosomes (1p, 4q, 6q, 8p, 9p, 17p) considered as “hotspots” of deletions in HCC, were tested for loss of heterozygosity (LOH) according to the protocol previously described .
PBMCs, non-tumorous and tumorous genomic DNA samples were subjected to bisulfite treatment using Epitect® Bisulfite Kit (Qiagen, Courtabœuf, France) according to manufacturer’s instructions. WI38 cells DNA were used as positive control of methylation after treatment with 12 units SssI methyltransferase (NE Biolabs, Ipswich, MA) in the presence of S-adenosyl-methionine 32 μM.
Methylation status was assessed for 10 loci including eight cancer-related genes and two miRNAs coding loci, methylation presence was determined by methyl-specific PCR (MSP) for RIZ1, RASSF1, SOCS1, TERT, TNFRSF10C and GSTP1 genes (Additional file 1: Table S4), and using COBRA for NRG1, CLU, mir-203 and mir-663 genes (Additional file 1: Table S5). Quantification of LINE-1 methylation was performed by COBRA as well according to the method described previously . Variations in bands intensity were analyzed by densitometry using a CCD camera and the GeneTools software (Syngene, Ozyme, Saint-Quentin-en-Yvelines, France). A 50% increase of methylated product in tumorous DNA as compared with non-tumorous was considered as the positive threshold. The methylation index (MethIndex) was defined as the ratio of the number of loci found methylated (Met(+)Loci) on the total number of informative loci in a given sample([Met(+) + Met(−)]Loci): Met(+)-Loci÷[Met(+) + Met(−)]Loci.
Each PCR reaction was performed in a 25 μl final volume containing 100 ng of genomic DNA, 1X PCR buffer, 1.5 mM MgCl2, 200 mMdNTP, 20 pmol of each primer, 5 units of AmpliTaq GOLD DNA polymerase (Applied Biosystem, Saint-Aubin, France). Reactions were subjected to 94°C for 5 min, followed by 40 cycles at 95°C for 1 min, 50-60°C for 1 min and 72°C for 1 min and final extension at 72°C for 7 min on a MyCycler thermal cycler (Bio-Rad, Marnes-la-Coquette, France). PCR products were separated on 3% agarose gels stained with ethidium bromide (Euromedex, Souffelweyersheim, France) as shown in Figure 1A [76-78]. All primer sequences are provided in Additional file 1: Table S4. Primers used for GSTP1, RASSF1, RIZ1, and hTERT analyses have been previously published [79-81].
PCR reactions were performed as described in MSP method with modification of Taq DNA polymerase using Platinium® Taq DNA Polymerase (Life Technologies, Illkirch, France). A volume of 15 μl of PCR products was then digested with suitable restriction enzymes (Fermentas, Life Technologies, Illkirch, France, Additional file 1: Table S5). PCR products were separated on 2.5% stained agarose gels and results were determined referring to the density of bands related to those of controls (Figure 1B). Primers used for miR-203 and LINE1 analyses have been previously published [12,75].
HCC derived cell lines analyzed have been described previously (Additional file 4). The cells were cultured in DMEM (Life Technologies, Saint-Aubin, France) supplemented with FBS (10%, Biowest, Nuaille, France) and antibiotic-antimycotic. Cells were incubated and maintained at 37°C with humified air and 5% CO2 (Binder, Tuttlingen, Germany). Cells at 50-60% confluence were treated for 6-96 h at various concentrations of doxorubicin (Selleck chemicals, Euromedex, Souffelweyersheim, France) and/or decitabine (Fluka, Saint-Quentin Fallavier, France). DNA, RNA, and proteins were extracted from 6-well plates (TPP, Dominique Dutscher, Brumath, France). Cell culture experiments were performed at least three times. For protein analysis, cells were washed in cold phosphate buffered saline (PBS), lysed in Laemmli buffer as described previously and samples loaded on Criterion XT precast gels (Bio-Rad, Marnes-la-Coquette, France) . Western-blots were carried out with a Trans-blot Turbo transfer system as indicated by the manufacturer (Bio-Rad). Blots were probed with primary antibody against p53 (Santa-Cruz, CliniSciences, Nanterre, France sc-6243, 1/1000) and vinculin (Abcam, Cambridge, UK, ab18058, 1/500) or actin (Sigma, Saint-Quentin Fallavier, France, a2066, 1/5000). Cell viability was measured by MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl-tetrazolium bromide, Euromedex) assay after seeding in flat bottom 96-well plates (TPP) and treatment for various time length. Formazan crystal resulting from MTT reduction was solubilized in acid isopropanol and absorbance measured at 570 nm on a Fluostar Omega plate reader (BMG Labtech, Champigny/Marne, France).
Total RNA was obtained from cell culture by direct lysis in Tri-Reagent (Sigma). One microgram of RNA was reverse transcribed using a high-capacity cDNA Archive Kit (Applied Biosystems, Villebon, France) according to the manufacturer’s specifications. Expression of 15 genes involved in DNA methylation (DNMT3A-B-L, DNMT1) and demethylation (TET1-3, APOBEC1, APOBEC3A-B-C-H, AID, SMUG and TDG) processes was analyzed. Two known p53-responsive genes (p21-CDKN1A, GADD45) were included in the analysis. Real-time PCR was performed in a CFX96 qPCR machine (Bio-Rad). All samples were measured in triplicate. The PCR volume of 10 μl included 20 ng of RT product, 1× TaqMan Universal PCR master mix and 1 μl of pre-validated Taqman Gene Expression Assay (TaqMan FG Shelf, Applied Biosystems, see Additional file 1: Table S6). The reactions were incubated in a 96-well optical plate at 95°C for 10 min, followed by 40 cycles of 95°C for 15 sec and 60° for 1 min. The Ct data was determinate using default threshold settings. The threshold cycle (Ct) is defined as the fractional cycle number at which the fluorescence passes the fixed threshold. For data analysis, gene expression values were determined using the calculation of the relative quantitation (RQ) of target genes normalized to a calibrator corresponding to 5 normal livers. RQ calculation was performed using the DeltaCT method with the geometric mean of three reference genes (TRIM44, Hs00214040_m1, HMBS; Hs00609297_m1 and LMF2; Hs00611068_m1) as reference . The three references genes were selected among 12 constant genes arising from a previous array analysis of 70 HCC samples and 9 normal livers to which were applied algorithms described previously .
QPCR coupled Methyl Sensitive Restriction Enzyme (MSRE) reactions were carried out as described by Melnikof et al. . Genomic DNA was extracted as described previously and quantified using NanoDrop ND-1000 (NanoDrop, Wilmington, USA) . All digestions were performed with HpaII, a methylation sensitive restriction enzyme. An amount of 200 ng of genomic DNA was digested 16 h at 37°C in a final volume of 100 μl containing 10 units of HpaII or HhaI. After incubation, each digested sample was diluted 5-fold with sterile water and incubated at 65°C for 15 min to inactivate the enzyme. QPCR was performed in triplicate on a Bio-Rad CFX-96 system (Bio-Rad) with 10 μl of reaction mixture containing 4 ng of digested DNA, 5 μl of 2X Sso Advanced SYBR Green Supermix (Bio-Rad) and 5 pmoles of each primer. Primers at CMYA5 gene, mapping in 5q21.1, a region non-affected by copy number changes in HCC, were used as reference. QPCR conditions included a denaturation step at 98°C for 2 min followed by 40 cycles at 98°C for 5 sec and 60°C for 1 min . Results were analyzed using the CFX Manager and Precision Melt Analysis software (Bio-Rad). Primers are provided on Additional file 1: Table S7.
Instat software (GraphPad Software Inc, La Jolla, CA, USA) was used for statistical analysis of the data with the Chi-square test, Fisher’s exact test, Student’s t-test, the Mann–Whitney test, ANOVA test and Kruskal-Wallis test as appropriate. The cut-off value for significance was of P < 0.05. All tests were two-sided.
Khadija Rebbani and Agnès Marchio are contributed equally to this work.
This work was funded by the French Ligue Nationale Contre le Cancer (LNCC) Odyssey-RE and the Pasteur Institutes International Network (RIIP).We are grateful to Eliane Coeffier, Marc Jouan and Jérôme Salomon from the Division International of the Institut Pasteur for their support. We thank Hélène Bierne, Marie-Louise Michel and Ophélie Godon for their scientific suggestions.
Additional file 1: Table S1. Functions of the genes investigated for DNA methylations in HCC from Western North-African patients. Table S2. Correlation matrix of the methylated loci as detected in North-African Hepatocellular Carcinoma. Table S3. Genetic features associated with abnormal DNA methylation in North-African Hepatocellular Carcinoma. Table S4. Methylation-specific PCR primers. Genome locations of primer sequences are given according to those provided by the Genome browser gateway. (http://genome-euro.ucsc.edu/cgi-bin/hgGateway?db=hg11&redirect=auto&source=genome.ucsc.edu). Um: amplifies unmethylated DNA, M: amplifies methylated DNA. Table S5. COBRA assay primers. Genome locations of primer sequences are given according to those provided by the Genome browser gateway. (http://genome-euro.ucsc.edu/cgi-bin/hgGateway?db=hg11&redirect=auto&source=genome.ucsc.edu). Table S6. Taqman Gene Expression Assay (PE Applied Biosystems). Table S7. MSRE-qPCR primers. Genome locations of primer sequences are given according to those provided by the Genome browser gateway (http://genome-euro.ucsc.edu/cgi-bin/hgGateway?db=hg11&redirect=auto&source=genome.ucsc.edu).
Additional file 2: Figure S1. (A) DNA methylation levels for the loci studied. No difference was statistically significant. (B) Methylation Index at 9 loci for DNA extracted from peripheral lymphocytes in patients with or without primary liver cancer. (C) Non-supervised hierarchical clustering of DNA methylation in PBMCs does not detect any difference between patients with or without liver cancer.
Additional file 3: Figure S2. Map of six among the seven promoters analyzed by MSRE-qPCR. Positions of primers are indicated by double arrows. Nucleotide position of primers is defined according to transcription Start site (↱1). Restriction sites are shown above the gene. Exons are symbolized at the scale by rectangles. BIRC5 assay is not shown.
Additional file 4: Supplementary data.
AM and PP designed research. KR and AM performed the molecular genetics study. PP performed cell culture experiments. KR, AM, SE, RA, OB, HT, MK, AE, AD, SB and PP analyzed the data. KR and PP wrote the manuscript. All authors read and approved the final manuscript. | 2019-04-21T22:09:51Z | https://molecular-cancer.biomedcentral.com/articles/10.1186/s12943-015-0340-2 |
377. The discharge of trade effluent into public sewers is regulated under the WIA. An occupier of trade premises requires a trade effluent consent before he may discharge trade effluent into the public sewer. He must therefore apply to his sewerage undertaker (water & sewerage company) who will consider the application and issue a trade effluent consent if they are content to do so. Trade effluent consents specify what may be discharged to sewer and contain conditions which the discharger must meet to comply with his consent.
378. From time to time confusion arises as to whether discharges arising from particular types of activity are required to be regulated under the trade effluent consenting regime. Often these discharges are small in volume, but a large quantity of such discharges could potentially be harmful to the environment. Sometimes it has proved difficult for sewerage undertakers to decide and this has led to inconsistency within the consenting regime.
379. Where this has occurred in the past, the problem has been overcome by amending the primary legislation in order to make it clear that effluent emanating from a specified trade required a trade effluent consent. However, this process whilst dealing with the immediate problem has not proved to be a satisfactory long term answer to this problem and remains a somewhat inflexible approach to take.
380. A power is provided Secretary of State to make it clear by statutory instrument whether discharges of any given liquid or matter (whether or not constituting trade effluent) to the public sewer are or are not required to be carried on in accordance with the conditions of a trade effluent consent.
381. The Secretary of State has the power (in effect) to modify the meaning of `trade effluent' and `trade premises' for the purposes of the trade effluent consenting regime in the WIA. By using this power, the Secretary of State should be able to narrow or widen the meaning of these expressions and in turn, make it clear whether discharges from particular processes, substances or types of activity to the public sewer are subject to the consenting regime.
382. The overall effect of these clauses is intended to result in better regulation of the trade effluent discharge process by bringing under control the discharge of small volumes of potentially harmful substances to the water environment.
383. Clauses 92 and 93 amend sections 42 - 44 of the WIA to enable the requisitioned costs of a water main to be paid by a single payment. The existing method of paying over 12 years is retained as an alternative (at the election of the person requisitioning the main).
384. Clause 92: Water mains requisitions: financial conditions. This clause amends section 42 of the WIA (financial conditions of compliance with water mains requisition) to enable the relevant deficit to be paid by a single payment. It also allows for disputes about requisition payments to be determined by the Authority.
385. Clause 93: Water mains requisitions: calculation of payments. This clause amends section 43 of the WIA (calculation of relevant deficit for the purpose of section 42) and is a consequence of the self lay provisions of water mains in clause 94. It also provides a new section 43A which sets out how the discounted aggregate deficit will be calculated. This deficit is the estimated charge by customers over the following 12 years which are taken into account when calculating the single payment. It also makes minor amendments to section 44 of the WIA (determination of completion date and route for requisitioned main).
386. Clause 94: Self-lay and adoption of water mains and service pipes. This clause provides five new sections 51A to 51E.
387. New Section 51A sets out the steps and agreement that must be entered into by a developer or self lay organization proposing to construct domestic water mains or service pipes which are to be vested in the water undertaker. It provides that the main must be built in accordance with the agreement with the water undertaker to enable it to be adopted on completion. The provisions do not prevent agreements being entered into in relation to declarations of vesting for pipes used for non-domestic supplies.
388. New Section 51B sets out the situations where appeals can be made to the Authority if the undertaker refuses to enter into an adoption agreement on reasonable terms.
389. New section 51C provides that the person who enters into the adoption agreement relating to a water main shall pay the undertaker's reasonable costs of incorporating the water main within its existing water mains network. It also provides for an offset payment to be made by the undertaker to the developer or self lay organisation equivalent to the discounted estimated sum of water charges for the first twelve years in respect of premises expected to be connected to the new main.
390. New section 51D provides that if anyone other than a water undertaker builds a water main or service pipe which will be used for supplying water for domestic or food production purposes, the pipe must not be connected unless it vests in the undertaker.
391. New section 51E is supplementary to sections 51A to 51D and Subsections (2) to (7) make minor amendments to sections 45, 47, 179, 198 and 219 of the WIA.
392. Clause 95: Requisition and adoption of sewers. This clause amends section 99 of the WIA to allow the offset payment to be made as a single sum as an alternative to paying over 12 years and provides a new section 100A which sets out how the single sum should be calculated.
393. Clause 96: Provision of public sewers otherwise than by requisition. This clause removes the cut off date from Section 101A of the WIA and extends the duty to provide a public sewer in certain circumstances to all properties where the existing non-mains drainage arrangements is causing environmental or amenity problems.
394. Clauses 97 to 100 provide for lateral drains to be requisitioned from the sewerage undertaker or if they are to be constructed by someone else for adoption by the undertaker, an agreement should be entered into with the undertaker to ensure they are built to adoptable standards. It also provides for an inspection chamber to be constructed close to the curtilage of the property to define the demarcation between the lateral and the house drain. The chamber will also have to be constructed to the required standard for adoption by the sewerage undertaker. A lateral is that part of a drain which runs from the curtilage of the premises to the sewer.
395. Clause 97: Requisition of lateral drains. This clause amends section 98 of the WIA (duty to comply with sewer requisition) to enable lateral drains to also be requisitioned from the sewerage undertaker.
396. Clause 98: Adoption of lateral drains. This clause amends s104 of the WIA to enable lateral drains to be adopted by the sewerage undertaker if they have been constructed in accordance with an agreement with the undertaker. It also makes provision for an inspection chamber to be installed in the lateral drain at or near the point of connection between the lateral drain and the house drain at the curtilage of the property.
397. Clause 99: Requisitioning and adoption of lateral drains: supplementary. This clause amends other relevant sections of the WIA and includes a definition of lateral drains.
398. Clause 100: Communication with public sewers. This clause makes consequential amendments to section 106 of the WIA (right to communicate with public sewers) and in particular to subsection 4 to enable a request to communicate a lateral drain with the sewer to be refused if the standard of construction of the lateral is unreasonable.
399. These clauses deal with devolution, consequential amendments, transitional provisions and powers to make orders and regulations, including providing for Schedule 7 and 8 to have effect. They also cite the name of this Act as the Water Act 2003 and cover its extent.
400. Clause 103 Specific transitional and transitory provisions. Section 103(1) provides that existing abstraction licences are a treated as a full licence (see Clause 3). Section 103(2) provides that where an abstraction is no longer required to be licensed by virtue of the introduction of the new threshold in clause 8, then a licence ceases to have effect for that abstraction.
401. Section 103(3) provides that where an abstraction licence is no longer required by virtue of section 103(2) then the protected right associated with the abstraction continues. However, the protected right will lapse, under section 103(4), if no abstraction has been made for four years or other period as agreed by the Agency if the abstraction is planned to occur over longer intervals.
403. Clause 104: Powers to make further supplementary, consequential and transitional provisions, etc This provision enables the Secretary of State to make such supplementary, incidental, consequential, transitory, transitional or saving provision as she considers necessary or expedient for the purposes of, in consequence of, or for giving full effect to any provision of this Act. This includes a power to amend primary legislation.
404. This power is considered by the Government to be necessary since the Bill is complex. A wide range of consequential amendments to existing legislation and other supplementary, incidental and transitional provisions may be needed.
405. Clause 105: Regulations and orders. This clause relates to the general purposes for which powers under the Bill may be exercised. This provides that any power to make any order or regulations includes powers to make "such incidental, supplementary, consequential, saving or transitional provision (including provision amending, repealing or revoking enactments..)" as the authority doing so considers "expedient". Instruments are generally subject to the negative procedure (clause 105(3)).
406. Part 1 of this Schedule makes a number of minor changes to the abstraction and impounding licensing regime. These include provision in paragraph 2 for the EA to require reports, such as an environmental report, to accompany a licence application. Provision is also made by paragraph 10 to end the current exemption from charges for groundwater abstractions for agricultural use (other than spray irrigation) of less than 20m3 per day (generally such abstractions will become exempt from licence control and hence also from charges). Paragraph 14 replaces Schedule 6 of the WRA, allowing the Environment Agency (only) to apply for Orders to vary abstraction thresholds (Clause 8) and to establish Registers of Protected rights (Clause 20). The revised Schedule retains the structure and consultation requirements of the original, and adds the nature conservation authorities and the Broads Authority (where appropriate) to the list of consultees.
Schedule 8 Minor and Consequential Amendments: Licensing of Water Suppliers etc.
407. Schedule 8 sets out minor and consequential amendments regarding licensing of water suppliers etc.
408. Section 174 of the Water Act 1989 applies a general restriction on disclosure of information obtained under that Act. The section is amended so that the restriction does not apply to disclosure for purposes of facilitating the carrying out of licensed activities by a licensed water supplier.
409. In section 6 of the WIA new subsection (5A) prevents a licensed water supplier from also holding an appointment as a water undertaker. This has the effect of not allowing undertakers to act as licensed water suppliers at the same time. In practice undertakers will need to set up new water supply companies in order to operate outside their own area as licensed water suppliers.
410. Section 18 of the WIA is amended to include licensed water suppliers in orders for securing compliance. Amendment to subsection (1) means that breach of conditions of licence and other enforceable requirements will leave the licensee subject to enforcement action. The insertion of new subsection (1A) will provide for action where either an undertaker has caused or contributed, or is likely to cause or contribute, to a contravention by a licensee or vice versa. This allows enforcement action to be taken against undertakers which cause, or are likely to cause, licensed water suppliers to breach their licence conditions or statutory duties which are made subject to enforcement, or against licensed suppliers where they cause, or are likely to cause, an undertaker to breach its appointment conditions or statutory duties subject to enforcement. This allows for cases where, for instance, an undertaker is in breach of its statutory duties with regard to water quality, but a licensed water supplier contributed to the problem by the omission of not alerting the undertaker to an incident at its customer's premises.
411. Further minor amendments in this section achieve the same purpose as above; including licensed suppliers in the framework for provisional enforcement orders (subsection (4)) and explaining how enforcement orders operate (subsections (6) and (8)).
412. Section 19 of the WIA: Exceptions to the duty to enforce; minor and consequential amendments to make provision for licensed water suppliers. This not only allows for the same exceptions for licensed water suppliers as undertakers where the contravention is trivial or the company is already complying etc. but will also make an exception where the extent of the contribution to the contravention was trivial.
413. Section 20 of the WIA: Procedure for making final enforcement orders; minor and consequential amendments to make provision for licensed water suppliers and contributing to contravention. These ensure the new elements of enforcement are included in the Secretary of State's or Authority's notices.
414. Section 22 of the WIA: Minor and consequential amendments to make provision for licensed water suppliers.
415. Section 23 of the WIA: is amended and has insertions of subsections (2A) and (6). At present, there are various circumstances under which an undertaker may be placed in special administration. These include: becoming insolvent and being in contravention of a requirement so that it would be inappropriate for it to continue to hold an appointment. This amendment extends the existing special administration provisions to licensed water suppliers. The aim of a special administration order is to enable the activities of a licensed water supplier (holding a combined licence) to carry on in respect of its strategic supplies (as defined in section 66G/66H). When a licensed water supplier is put into special administration, the special administration order would make the continued input of water into the supply system one of its purposes. The order allows the input of water to carry on whilst arranging for transfer of those activities to another company or companies through the appointment of a special administrator. (The order can only be made however, if the company already had its introduction or introductions of water designated as a strategic supply (or collective strategic supply) under new section 66G/66H of the Water Industry Act).
416. Section 24 is amended (and with insertion of subsection (1A)) to explain the grounds on which special administration procedures can be invoked in relation to qualifying licensed water suppliers. These grounds will include a breach of licence conditions or an enforcement order or causing an undertaker to breach its duties (if this was serious enough to make it inappropriate for the licence holder to continue to hold its licence). The grounds to invoke special administration will also include serious financial difficulty or the company being about to be wound up.
417. Section 27 of the WIA is amended to so that, in addition to keeping the activities of undertakers under review, the Authority will also keep authorised activities of licensed water suppliers under review. This allows the Authority to gather information from licensed suppliers in pursuance of its duties and powers and to pass on relevant information and assistance to the Secretary of State and the Director General of Fair Trading.
418. Section 39A of the WIA: Undertakers are already obliged to inform their customers about their standards of performance. The amendment of 39A ensures that the Authority can also direct undertakers to pass this information on to licensed suppliers who are using their systems to supply customers. In addition, the Authority can direct licensed suppliers to pass on the undertakers' information on standards of performance to their customers. This will enable customers to continue to be supplied with this information whether the undertaker or licensee is their supplier.
419. Section 43: Customers who requisition a new main in order to make a connection to their premises have to pay an amount known as the relevant deficit. This is defined in this section as the annual borrowing costs of the loan of the amount required to lay that main, minus the water charges payable in respect of that main. The latter amount is the charges paid by the undertaker's customer(s) supplied by that main. If one or more of the customers supplied by that main are subsequently supplied by a licensed water supplier, this amount will reduce and the relevant deficit will then not reflect the revenue received by the undertaker in respect of that main. To correct this, the amendment modifies the calculation of the water charges payable so that it includes the amount received by the undertaker from the licensed water supplier for giving wholesale supplies and permitting the introduction of water into its supply system which can be attributed to the licensed water supplier's customers supplied by that main.
420. Sections 52 and 55 of the WIA are amended to remove the duty for undertakers to supply water to customers eligible for competition outside their areas of appointment whilst ensuring that they do have a duty to supply ineligible customers, out of area, whether for domestic or non-domestic purposes. This has been done so that undertakers are not competing for customers with their associated companies outside their area boundaries. This change also removes any distinction between non-domestic and domestic duties outside undertakers' areas to supply to households and other customers ineligible for competition, i.e. household premises or premises using less than the threshold quantity. There has been ambiguity over application of the non-domestic duty due to requests for supply to premises for both domestic and non-domestic purposes. The changes will remove some ambiguity as to duties when an undertaker supplies water out of area. The only distinction will now be between eligible and ineligible customers.
421. Insertion of new subsection (6A) to section 52 of the WIA removes undertakers' domestic supply duty to any premises where a customer has served notice that they wish to discontinue being supplied by the undertaker (a request made under new section 63AA; see below) on transfer to a licensed water supplier. This means that a customer will have to re-apply to the undertaker for a supply for domestic purposes (under section 52) if they wish to return to being supplied by an undertaker. This subsection ensures that, once a customer has transferred from an undertaker to a licensed water supplier, specific rights and obligations which arise between an undertaker and its customers no longer apply. As an example, once a customer has discontinued being supplied by the undertaker, the licensed water supplier is responsible for ensuring a continued supply of water through its agreement with the undertaker. But the undertaker continues to be responsible to the entire network for water pressure and constancy of supply.
422. New sections 63AA and 63AB of the WIA allow undertakers' (domestic and non-domestic supply) customers to notify them that they no longer want to be supplied by the undertaker and instead are to be supplied by a licensed supplier. The notice will specify the time at which the transfer will occur and must allow at least 2 days notice for metered premises (so that the undertaker can arrange for the meter to be read). Once the undertaker no longer supplies customers, its domestic or non-domestic (as relevant) supply duty to them is interrupted until they re-apply to the undertaker for a supply. Domestic customers wishing to return to the undertaker will re-apply under section 52 of the Act. Non-domestic customers wishing to return will re-apply for a supply under section 55 of the Act. In the latter case, unlike an application under section 52, the undertaker will have ensure that it can meet other current and future supply obligations before it is required to re-supply.
423. Section 63AC. The insertion of section 63AC caters for instances where the customer ceases to be supplied by the licensed water supplier but has not notified the undertaker that he has made other arrangements or otherwise does not want a supply. Where the customer makes such arrangements himself he would be expected to make these in good time to arrange re-supply by the undertaker. Where the licensee has ceased to supply for some reason, an interim supply needs to be available until proper arrangements for re-supply (by the undertaker or another supplier) can be made by the customer.
424. Subsections (2) to (4) provide for the undertaker, as long as it does not put at risk its duties under the Act, to continue supplying the customer with the water as the supplier was previously doing. This supply will continue for a period of at least three months whilst the customer is making other arrangements.
425. Subsections (5) and (6). Where the customer seeks re-supply for non-domestic purposes (under section 55 of the Act) the undertaker will consider this a request for 'new' supply and will first have to ensure its other obligations can be fulfilled before agreeing to supply. The normal provisions regarding disconnections for non-payment and at the request of the customer (under sections 60 to 63 of the Water Industry Act) will apply.
426. Subsection (7). If the undertaker unreasonably fails to make a supply under new section 63AC, the customer will be able to sue them for any loss or damage.
427. Section 68 of the WIA is amended to include licensed water suppliers in the water quality provisions of the Act. Several small amendments in section 68 ensure that the undertaker's duty to provide wholesome water under this section exists whether the water is supplied by the undertaker or by a licensed water supplier. The duty applies to water supplied for domestic or food production purposes through the water undertaker's supply system.
428. New subsection (1A) requires that the licensed water supplier will be responsible for ensuring the water it supplies is wholesome at the time of supply. This will be irrespective of the source from which the water originates; the potential sources being its own abstraction and treatment works, where relevant, or treated water from an undertaker supplied under a wholesale agreement. All licensed water suppliers will have a responsibility to ensure that the water that they supply is wholesome. For example, a licensed water supplier with a retail authorisation may be in receipt of information (from their customers) that, if it was passed on to the relevant undertaker, could alert the undertaker to a water quality problem. In this instance the licensed water supplier acts as a conduit, passing important information between their customer and the undertaker, irrespective of which party supplied the water.
429. Subsection (2) is amended so that, as for the undertaker, the licensed supplier will not be responsible for instances where the water has ceased to be wholesome after having left the undertaker's pipes. However the undertaker (subsection (3)) does have a responsibility to ensure steps are taken to reduce the risk of water deteriorating after leaving the undertaker's pipes. An example of this is where the water supplied may react with lead piping at a premises, leading to an increase in the lead content of water at the tap, the undertaker will be expected to consider additional treatment of the water at the treatment works to reduce these risks. Subsection (3A) extends this duty to licensees.
430. Section 69 of the WIA is amended to ensure licensed water suppliers are included in the provisions for preserving water quality through the supply system. These provisions describe the general steps an undertaker should ensure are taken, such as monitoring, analysis, recording etc, to ensure that the water it supplies meets the wholesomeness requirements set out in section 68. The section provides for these steps to be specified by regulation making powers of the Secretary of State under this section. In the case of the undertaker, the 'steps' described in subsection (2) will need to cover all of the supplies made using the undertakers system. In the case of licensed water suppliers the steps taken to ensure water quality in subsection (2) will apply only to supplies made by them using the undertakers system.
431. The section is amended to allow inclusion of licensed suppliers in regulations made by the Secretary of State regarding the use of approved substances and processes in treating water intended for domestic supply or food production purposes, and to allow inclusion of licensed suppliers in regulations made by the Secretary of State regarding publication of information to customers and other interested parties about water quality in the supply system.
432. Section 70 of the WIA is amended to ensure that anyone concerned in the supply of water unfit for human consumption will be liable to prosecution. This will allow licensed water suppliers and their contractors (or those of undertakers) to be prosecuted for any incidents of such supply. The effect of new subsection (1A) is to include undertakers and any other employer of self-employed person of those concerned in the supply as relevant persons to which the section applies. These parties would all have to show, in the case of an incident (subsection (3A)), that they had no reasonable grounds for suspecting that the water would be used for human consumption or that they took all reasonable steps and all due diligence in avoiding the incident. Subsection (3B) explains the concept of relevant arrangements. The undertaker is in control of the system and in granting access to the licensed water supplier will ensure that they put in place arrangements to ensure water is fit. The licensed water supplier would be responsible for ensuring that all these arrangements are carried out. This is to prevent an undertaker or licensed water supplier claiming that an incident was the fault of a contractor or someone else concerned in the supply, where it had not taken sufficient care to ensure the contractor was carrying out his duties properly, i.e. it will have some responsibility whether it was directly or indirectly involved in an incident.
433. Section 72 of the WIA: Minor and consequential amendment extends the application of the section to the pipes and conduits of licensed water suppliers. It will be an offence to contaminate water in the pipes of licensed water suppliers as well as those of an undertaker.
434. Section 73 of the WIA: Minor and consequential amendment extends to the supply of water by licensed suppliers the protection against contamination and waste of water currently afforded to undertakers.
435. Section 74 of the WIA: Minor and consequential amendment extends to licensed suppliers the protection by regulations preventing contamination, waste and safety of water fittings currently afforded to undertakers.
436. Section 75 of the WIA: Minor and consequential amendment to make provision for premises supplied by licensed water suppliers to remain within the provisions which enable undertakers to prevent damage, contamination or misuse of the water, to their systems arising from customer's fittings.
437. Section 76 of the WIA is amended to include premises supplied by licensed water suppliers within those that will be affected by temporary hosepipe bans. Since undertakers issue public notices about hosepipe bans, they will remain responsible for informing all customers on their networks, irrespective of the supplier.
438. Section 78 of the WIA is amended to ensure that when local authorities inform undertakers of water quality or supply problems at a customer's premises, they do this whether the supplier is the undertaker or a licensed supplier. The undertaker would inform the licensee of the problem where appropriate.
439. Amendment of sections 93A to 93D of the WIA extends to licensed water suppliers the existing duty for undertakers to promote efficient use of water by their customers. Efficiency services offered to customers can, for example, advise them of ways of reducing their water consumption and adapting their seasonal water requirements.
440. Section 150 of the WIA is amended to ensure that the effect of the section, to impose a cap on charges on water resellers, does not affect licensed water suppliers supplying their customers.
441. Section 152 of the WIA is amended to allow licensed water suppliers to obtain grants in order to comply with national security directions (section 208) where this is appropriate. Currently undertakers can receive grants in order to assist them with complying with national security directions.
442. Section 158 of the WIA, powers to lay pipes in streets, is amended to include certain pipes laid in order to introduce water at the request of a licensed water supplier (subject to exclusions). The powers to lay these pipes will also apply across third party land under section 159. This power will not apply to pipes laid for the purpose of connecting to a non-potable network.
443. Section 174 of the WIA: Minor and consequential amendments extend the offence of interference with works, from the pipes and fittings vested in or belonging to undertakers, to those vested in or belonging to licensed water suppliers or used by them to supply customers.
444. Section 175 of the WIA: Minor and consequential amendments extend the offence of tampering with a meter used by undertakers in supplying a customer to meters used in supplying customers of licensed water suppliers.
445. Amendment of section 179 of the WIA requires undertakers to own any pipes laid by themselves between the licensed water supplier's treatment works and the undertaker's supply system, or between the secondary undertakers' distribution network and the undertaker's supply system in accordance with sections 66B and 66C respectively.
446. Amendment of section 195 of the WIA requires the Authority to add information on licensed water suppliers to the register that it keeps on undertakers' appointments. The register will include information on licences, variations and revocations. It will also include any direction, consent or determination made by the Secretary of State, Environment Agency or the NAW.
447. Amendment of section 201 of the WIA extends the right of the Secretary of State or the Authority to publish information in the public interest on the activities of a licensed supplier.
448. Amendment of section 202 of the WIA extends to licensed water suppliers the duty to supply to the Secretary of State information related to their licensed activities that the Secretary of State might reasonably require in order to carry out his statutory functions.
449. Amendment of section 203 of the WIA extends the power of the Secretary of State or the Authority in order that they may acquire information from any person if they suspect a licensed water supplier has breached its licence conditions or caused an undertaker to breach its appointment conditions; and also conversely, if they suspect that an undertaker has caused a licensed water supplier to breach the conditions of its licence. This is to ensure that the Secretary of State or Authority is able to gather all relevant information that they might reasonably need relating to the supply of water by a licensed water supplier.
450. Currently section 205 of the WIA allows sewerage undertakers to demand meter readings from water undertakers serving the same customer in order to estimate their sewerage service bills. The section is amended to allow any party; water undertaker, licensed water supplier or sewerage undertaker, subject to paying a suitable fee, to demand meter readings from the other party if it has that information. In practice this will mean if the water undertaker takes a meter reading, the sewerage undertaker and the licensed water supplier to the same premises may demand the meter reading on paying the meter reading charge. It may be the case that the licensed water supplier has its own meter and comes to an arrangement with the sewerage undertaker to supply it with a meter reading. This amendment ensures data is available to all parties involved in providing water and sewerage services. The aim is to prevent all three parties being obliged to visit the customer's premises (with the possible disruption to the customer) to take meter readings.
451. Amendment of section 206 of the WIA makes consequential amendments in respect of licensed water suppliers; restricting disclosure of any information obtained from licensed water suppliers by provisions of the Act. This extends the protection currently available to undertakers; that certain commercial or personal information is not published except under certain circumstances.
452. Amendment of section 208 of the WIA includes licensed water suppliers within the remit of the Secretary of State's power to make directions with regard to issues of national security and emergency planning. This draws in licensed water suppliers so that their water sources can if necessary be taken into account in preparations made to deal with civil emergencies.
453. Schedule 2 of the WIA is amended in order to apply the provisions relating to the making of transfer schemes to circumstances where a special administration order is made in respect of a licensed water supplier which provides one or more designated strategic supplies. They entitle a special administrator to make a scheme to transfer all or part of the property, rights, and liabilities of the licensed water supplier related to the strategic supply or collective strategic supply to one or more other parties, namely a new licensed water supplier together with, if the special administrator so determines, one or more of the undertakers in whose areas the strategic supplies are located. The new paragraph 4A, however, prohibits the special administrator from including in the scheme provisions to transfer the licence itself to the new licensed water supplier, which must go through an appropriate licensing process if it does not already hold a licence.
454. Schedule 3 of the WIA governs the application of certain provisions of the Insolvency Act 1986 in the specific circumstances of special administration. The amendments provide that the Insolvency Act will be applied where a licensed water supplier is the subject of a special administration order in the same way as it applies where an undertaker is the subject of a special administration order.
455. Amendment of section 203 of the Water Resources Act 1991, includes the licensed water suppliers in the reciprocal duties (which undertakers are currently under) to exchange information with the Environment Agency with respect to pollution incidents.
456. Amendment of section 204 of the Water Resources Act 1991, Minor and consequential amendments applies the restriction on disclosure of information to licensed water suppliers, and takes into account the changes to section 203 of the WRA.
457. Minor and consequential amendments will be made to paragraph 19A(9) of Schedule 7 to the Competition Act 1998 to make provision for licensed water suppliers.
458. Minor and consequential amendments will be made to section 168 and section 249 of the Enterprise Act 2002 to make provision for licensed water suppliers. | 2019-04-24T07:54:02Z | https://publications.parliament.uk/pa/cm200203/cmbills/149/en/03149x-e.htm |
Respondent brought this class action for injunctive and declaratory relief against the Illinois officials administering the federal-state programs of Aid to the Aged, Blind, and Disabled (AABD), which are funded equally by the State and Federal Governments, contending that they were violating federal law and denying equal protection of the laws by following state regulations that did not comply with the federal time limits within which participating States had to process and make grants with respect to AABD applications. The District Court by a permanent injunction required compliance with the federal time limits and also ordered the state officials to release and remit AABD benefits wrongfully withheld to all persons found eligible who had applied therefor between July 1, 1968, the date of the federal regulations, and April 16, 1971, the date of the court's preliminary injunction. The Court of Appeals affirmed, rejecting the state officials' contentions that the Eleventh Amendment barred the award of the retroactive benefits and that the judgment of inconsistency between federal regulations and state provisions could be given only prospective effect. Held: The Eleventh Amendment of the Constitution bars that portion of the District Court's decree that ordered retroactive payment of benefits. Pp. 658678.
(a) A suit by private parties seeking to impose a liability payable from public funds in the state treasury is foreclosed by the Amendment if the State does not consent to suit. Pp. 662663.
(b) The Court of Appeals erred in holding that Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714, which awarded only prospective relief, did not preclude the retroactive monetary award here on the ground that it was an 'equitable restitution,' since that award, though on its face directed against the state official individually, as a practical matter could be satisfied only from the general revenues of the State and was indistinguishable from an award of damages against the State. Ford Motor Co. v. Department of Treasury, 323 U.S. 459, 65 S.Ct. 347, 89 L.Ed. 389, followed. Shapiro v. Thompson, 394 U.S. 618, 89 S.Ct. 1322, 22 L.Ed.2d 600; State Dept. of Health and Rehabilitation Services v. Zarate, 407 U.S. 918, 92 S.Ct. 2462, 32 L.Ed.2d 803; Sterrett v. Mothers' & Children's Rights Organization, 409 U.S. 809, 93 S.Ct. 68, 34 L.Ed.2d 70; Wyman v. Bowens, 397 U.S. 49, 90 S.Ct. 813, 25 L.Ed.2d 38, disapproved to extent that their holdings do not comport with the holding in the instant case on the Eleventh Amendment issue. Pp. 663771.
(c) The State of Illinois did not waive its Eleventh Amendment immunity and consent to the bringing of respondent's suit by participating in the federal AABD program. Parden v. Terminal R. Co., 377 U.S. 184, 84 S.Ct. 1207, 12 L.Ed.2d 233, and Petty v. Tennessee-Missouri Bridge Comm'n., 359 U.S. 275, 79 S.Ct. 785, 3 L.Ed.2d 804, distinguished. Nor does the mere fact that a State participates in a program partially funded by the Federal Government manifest consent by the State to be sued in federal courts. Pp. 671674.
(d) The Court of Appeals properly considered the Eleventh Amendment defense, which the state officials did not assert in the District Court, since that defense partakes of the nature of a jurisdictional bar. Ford Motor Co. v. Department of Treasury, supra. Pp. 677678.
472 F.2d 985, 7 Cir., reversed and remanded.
Robert J. O'Rourke, Chicago, Ill., for petitioner.
Sheldon Roodman, Chicago, Ill., for respondents.
On appeal to the United States Court of Appeals for the Seventh Circuit, the Illinois officials contended, inter alia, that the Eleventh Amendment barred the award of retroactive benefits, that the judgment of inconsistency between the federal regulations and the provisions of the Illinois Categorical Assistance Manual could be given prospective effect only, and that the federal regulations in question were inconsistent with the Social Security Act itself. The Court of Appeals rejected these contentions and affirmed the judgment of the District Court. Jordan v. Weaver, 472 F.2d 985 (7 Cir. 1973). 6 Because of an apparent conflict on the Eleventh Amendment issue with the decision of the Court of Appeals for the Second Circuit in Rothstein v. Wyman, 467 F.2d 226 (1972), cert. denied, 411 U.S. 921, 93 S.Ct. 1552, 36 L.Ed.2d 315 (1973), we granted the petition for certiorari filed by petitioner Joel Edelman, who is the present Director of the Illinois Department of Public Aid, and successor to the former directors sued below. 412 U.S. 937, 93 S.Ct. 2776, 37 L.Ed.2d 398 (1973).
'The right of the Federal Judiciary to summon a State as defendant and to adjudicate its rights and liabilities had been the subject of deep apprehension and of active debate at the time of the adoption of the Constitution; but the existence of any such right had been disclaimed by many of the most eminent advocates of the new Federal Government, and it was largely owing to their successful dissipation of the fear of the existence of such Federal power that the Constitution was finally adopted.' 1 C. Warren, The Supreme Court in United States History 91 (rev.ed.1973).
Despite such disclaimers, 9 the very first suit entered in this Court at its February Term in 1791 was brought against the State of Maryland by a firm of Dutch bankers as creditors. Vanstophorst v. Maryland, see 2 Dall. 401 and Warren, supra, at 91 n. 1. The subsequent year brought the institution of additional suits against other States, and caused considerable alarm and consternation in the country.
'(W)hen the action is in essence one for the recovery of money from the state, the state is the real, substantial party in interest and is entitled to invoke its sovereign immunity from suit even though individual officials are nominal defendants.' Id., at 464, 65 S.Ct., at 350.
Thus the rule has evolved that a suit by private parties seeking to impose a liability which must be paid from public funds in the state treasury is barred by the Eleventh Amendment. Great Northern Life Insurance Co. v. Read, supra; Kennecott Copper Corp. v. State Tax Comm'n, 327 U.S. 573, 66 S.Ct. 745, 90 L.Ed. 862 (1946).
The Court of Appeals in this case, while recognizing that the Hans line of cases permitted the State to raise the Eleventh Amendment as a defense to suit by its own citizens, nevertheless concluded that the Amendment did not bar the award of retroactive payments of the statutory benefits found to have been wrongfully withheld. The Court of Appeals held that the above-cited cases, when read in light of this Court's landmark decision in Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714 (1908), do not preclude the grant of such a monetary award in the nature of equitable restitution.
Petitioner concedes that Ex parte Young, supra, is no bar to that part of the District Court's judgment that prospectively enjoined petitioner's predecessors from failing to process applications within the time limits established by the federal regulations. Petitioner argues, however, that Ex parte Young does not extend so far as to permit a suit which seeks the award of an accrued monetary liability which must be met from the general revenues of a State, absent consent or waiver by the State of its Eleventh Amendment immunity, and that therefore the award of retroactive benefits by the District Court was improper.
Ex parte Young was a watershed case in which this Court held that the Eleventh Amendment did not bar an action in the federal courts seeking to enjoin the Attorney General of Minnesota from enforcing a statute claimed to violate the Fourteenth Amendment of the United States Constitution. This holding has permitted the Civil War Amendments to the Constitution to serve as a sword, rather than merely as a shield, for those whom they were designed to protect. But the relief awarded in Ex parte Young was prospective only; the Attorney General of Minnesota was enjoined to conform his future conduct of that office to the requirement of the Fourteenth Amendment. Such relief is analogous to that awarded by the District Court in the prospective portion of its order under review in this case.
'It is not pretended that these payments are to come from the personal resources of these appellants. Appellees expressly contemplate that they will, rather, involve substantial expenditures from the public funds of the state. . . .
'It is one thing to tell the Commissioner of Social Services that he must comply with the federal standards for the future if the state is to have the benefit of federal funds in the programs he administers. It is quite another thing to order the Commissioner to use state funds to make reparation for the past. The latter would appear to us to fall afoul of the Eleventh Amendment if that basic constitutional provision is to be conceived of as having any present force.' 467 F.2d, at 236237 (footnotes omitted).
We agree with Judge McGowan's observations. The funds to satisfy the award in this case must inevitably come from the general revenues of the State of Illinois, and thus the award resembles far more closely the monetary award against the State itself, Ford Motor Co. v. Department of Treasury, supra, than it does the prospective injunctive relief awarded in Ex parte Young.
We do not read Ex parte Young or subsequent holdings of this Court to indicate that any form of relief may be awarded against a state officer, no matter how closely it may in practice resemble a money judgment payable out of the state treasury, so long as the relief may be labeled 'equitable' in nature. The Court's opinion in Ex parte Young hewed to no such line. Its citation of Hagood v. Southern, 117 U.S. 52, 6 S.Ct. 608, 29 L.Ed. 805 (1886), and In re Ayers, 123 U.S. 443, 8 S.Ct. 164, 31 L.Ed. 216 (1887), which were both actions against state officers for specific performance of a contract to which the State was a party, demonstrate that equitable relief may be barred by the Eleventh Amendment.
As in most areas of the law, the difference between the type of relief barred by the Eleventh Amendment and that permitted under Ex parte Young will not in many instances be that between day and night. The injunction issued in Ex parte Young was not totally without effect on the State's revenues, since the state law which the Attorney General was enjoined from enforcing provided substantial monetary penalties against railroads which did not conform to its provisions. Later cases from this Court have authorized equitable relief which has probably had greater impact on state treasuries than did that awarded in Ex parte Young. In Graham v. Richardson, 403 U.S. 365, 91 S.Ct. 1848, 29 L.Ed.2d 534 (1971), Arizona and Pennsylvania welfare officials were prohibited from denying welfare benefits to otherwise qualified recipients who were aliens. In Goldberg v. Kelly, 397 U.S. 254, 90 S.Ct. 1011, 25 L.Ed.2d 287 (1970), New York City welfare officials were enjoined from following New York State procedures which authorized the termination of benefits paid to welfare recipients without prior hearing. 12 But the fiscal consequences to state treasuries in these cases were the necessary result of compliance with decrees which by their terms were prospective in nature. State officials, in order to shape their official conduct to the mandate of the Court's decrees, would more likely have to spend money from the state treasury than if they had been left free to pursue their previous course of conduct. Such an ancillary effect on the state treasury is a permissible and often an inevitable consequence of the principle announced in Ex parte Young, supra.
But that portion of the District Court's decree which petitioner challenges on Eleventh Amendment grounds goes much further than any of the cases cited. It requires payment of state funds, not as a necessary consequence of compliance in the future with a substantive federal-question determination, but as a form of compensation to those whose applications were processed on the slower time schedule at a time when petitioner was under no court-imposed obligation to conform to a different standard. While the Court of Appeals described this retroactive award of monetary relief as a form of 'equitable restitution,' it is in practical effect indistinguishable in many aspects from an award of damages against the State. It will to a virtual certainty be paid from state funds, and not from the pockets of the individual state officials who were the defendants in the action. It is measured in terms of a monetary loss resulting from a past breach of a legal duty on the part of the defendant state officials.
Were we to uphold this portion of the District Court's decree, we would be obligated to overrule the Court's holding in Ford Motor Co. v. Department of Treasury, supra. There a taxpayer, who had, under protest, paid taxes to the State of Indiana, sought a refund of those taxes from the Indiana state officials who were charged with their collection. The taxpayer claimed that the tax had been imposed in violation of the United States Constitution. The term 'equitable restitution' would seem even more applicable to the relief sought in that case, since the taxpayer had at one time had the money, and paid it over to the State pursuant to an allegedly unconstitutional tax exaction. Yet this Court had no hesitation in holding that the taxpayer's action was a suit against the State, and barred by the Eleventh Amendment. We reach a similar conclusion with respect to the retroactive portion of the relief awarded by the District Court in this case.
'With respect to appellants' contention that the State of Colorado has not consented to suit in a federal forum even where the plaintiff is the United States, see Principality Monaco v. Mississippi, 292 U.S. 313, 54 S.Ct. 745, 78 L.Ed. 1282 (1934), and Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714 (1908).' Id., at 358, 87 S.Ct., at 467.
Monaco v. Mississippi, 292 U.S. 313, 54 S.Ct. 745, 78 L.Ed. 1282 (1934), reaffirmed the principle that the Eleventh Amendment was no bar to a suit by the United States against a State. Id., at 329, 54 S.Ct., at 750. In view of Mr. Chief Justice Hughes' vigorous reaffirmation in Monaco of the principles of the Eleventh Amendment and sovereign immunity, we think it unlikely that the Court in Department of Employment v. United States, in citing Ex parte Young as well as Monaco, intended to foreshadow a departure from the rule to which we adhere today.
Three fairly recent District Court judgments requiring state directors of public aid to make the type of retroactive payment involved here have been summarily affirmed by this Court notwithstanding Eleventh Amendment contentions made by state officers who were appealing from the District Court judgment. 13 Shapiro v. Thompson, 394 U.S. 618, 89 S.Ct. 1322, 22 L.Ed.2d 600 (1969), is the only instance in which the Eleventh Amendment objection to such retroactive relief was actually presented to this Court in a case which was orally argued. The three-judge District Court in that case had ordered the retractive payment of welfare benefits found by that court to have been unlawfully withheld because of residence requirements held violative of equal protection. 270 F.Supp. 331, 338 n. 5 (D.C.Conn.1967). This Court, while affirming the judgment, did not in its opinion refer to or substantively treat the Eleventh Amendment argument. Nor, of course, did the summary dispositions of the three District Court cases contain any substantive discussion of this or any other issues raised by the parties.
This case, therefore, is the first opportunity the Court has taken to fully explore and treat the Eleventh Amendment aspects of such relief in a written opinion. Shapiro v. Thompson and these three summary affirmances obviously are of precedential value in support of the contention that the Eleventh Amendment does not bar the relief awarded by the District Court in this case. Equally obviously, they are not of the same precedential value as would be an opinion of this Court treating the question on the merits. Since we deal with a constitutional question, we are less constrained by the principle of stare decisis than we are in other areas of the law. 14 Having now had an opportunity to more fully consider the Eleventh Amendment issue after briefing and argument, we disapprove the Eleventh Amendment holdings of those cases to the extent that they are inconsistent with our holding today.
The Court of Appeals held in the alternative that even if the Eleventh Amendment be deemed a bar to the retroactive relief awarded respondent in this case, the State of Illinois had waived its Eleventh Amendment immunity and consented to the bringing of such a suit by participating in the federal AABD program. The Court of Appeals relied upon our holdings in Parden v. Terminal R. Co., 377 U.S. 184, 84 S.Ct. 1207, 12 L.Ed.2d 233 (1964), and Petty v. Tennessee-Missouri Bridge Comm'n, 359 U.S. 275, 79 S.Ct. 785, 3 L.Ed.2d 804 (1959), and on the dissenting opinion of Judge Bright in Employees v. Department of Public Health and Welfare, 452 F.2d 820, 827 (C.A.8 1971). While the holding in the latter case was ultimately affirmed by this Court in 411 U.S. 279, 93 S.Ct. 1614, 36 L.Ed.2d 251 (1973), we do not think that the answer to the waiver question turns on the distinction between Parden, supra, and Employees, supra. Both Parden and Employees involved a congressional enactment which by its terms authorized suit by designated plaintiffs against a general class of defendants which literally included States or state instrumentalities. Similarly, Petty v. Tennessee-Missouri Bridge Comm'n, supra, involved congressional approval, pursuant to the Compact Clause, of a compact between Tennessee and Missouri, which provided that each compacting State would have the power 'to contract, to sue, and be sued in its own name.' The question of waiver or consent under the Eleventh Amendment was found in those cases to turn on whether Congress had intended to abrogate the immunity in question, and whether the State by its participation in the program authorized by Congress had in effect consented to the abrogation of that immunity.
The mere fact that a State participates in a program through which the Federal Government provides assistance for the operation by the State of a system of public aid is not sufficient to establish consent on the part of the State to be sued in the federal courts. And while this Court has, in cases such as J. I. Case Co. v. Borak, 377 U.S. 426, 84 S.Ct. 1555, 12 L.Ed.2d 423 (1964), authorized suits by one private party against another in order to effectuate a statutory purpose, it has never done so in the context of the Eleventh Amendment and a state defendant. Since Employees, supra, where Congress had expressly authorized suits against a general class of defendants and the only thing left to implication was whether the described class of defendants included States, was decided adversely to the putative plaintiffs on the waiver question, surely this respondent must also fail on that issue. The only language in the Social Security Act which purported to provide a federal sanction against a State which did not comply with federal requirements for the distribution of federal monies was found in former 42 U.S.C. 1384 (now replaced by substantially similar provisions in 42 U.S.C. 804), which provided for termination of future allocations of federal funds when a participating State failed to conform with federal law. 16 This provision by its terms did not authorize suit against anyone, and standing alone, fell far short of a waiver by a participating State of its Eleventh Amendment immunity.
Our Brother MARSHALL argues in dissent, and the Court of Appeals held, that although the Social Security Act itself does not create a private cause of action, the cause of action created by 42 U.S.C. 1983, coupled with the enactment of the AABD program, and the issuance by HEW or regulations which require the States to make corrective payments after successful 'fair hearings' and provide for federal matching funds to satisfy federal court orders of retroactive payments, indicate that Congress intended a cause of action for public aid recipients such as respondent. 17 It is, of course, true that Rosado v. Wyman, 397 U.S. 397, 90 S.Ct. 1207, 25 L.Ed.2d 442 (1970), held that suits in federal court under § 1983 are proper to secure compliance with the provisions of the Social Security Act on the part of participating States. 18 But it has not heretofore been suggested that § 1983 was intended to create a waiver of a State's Eleventh Amendment immunity merely because an action could be brought under that section against state officers, rather than against the State itself. Though a § 1983 action may be instituted by public aid recipients such as respondent, a federal court's remedial power, consistent with the Eleventh Amendment, is necessarily limited to prospective injunctive relief, Ex parte Young, supra, and may not include a retroactive award which requires the payment of funds from the state treasury, Ford Motor Co. v. Department of Treasury, supra.
'(The Attorney General of Indiana) appealed in the federal District Court and the Circuit Court of Appeals and defended the suit on the merits. The objection to petitioner's suit as a violation of the Eleventh Amendment was first made and argued by Indiana in this Court. This was in time, however. The Eleventh Amendment declares a policy and sets forth an explicit limitation on federal judicial power of such compelling force that this Court will consider the issue arising under this Amendment in this case even though urged for the first time in this Court.' 323 U.S., at 466467, 65 S.Ct., at 352.
For the foregoing reasons we decide that the Court of Appeals was wrong in holding that the Eleventh Amendment did not constitute a bar to that portion of the District Court decree which ordered retroactive payment of benefits found to have been wrongfully withheld. The judgment of the Court of Appeals is therefore reversed and the cause remanded for further proceedings consistent with this opinion.
Once the federal court had jurisdiction over the case, the fact that it ruled adversely to the claimant on the constitutional claim did not deprive it of its pendent jurisdiction over the statutory claim. United States v. Georgia Pub.Serv. Comm'n, 371 U.S. 285, 287288, 83 S.Ct. 397, 399, 9 L.Ed.2d 317.
In Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714, a suit by stockholders of a railroad was brought in a federal court against state officials to enjoin the imposition of confiscatory rates on the railroad in violation of the Fourteenth Amendment. The Eleventh Amendment was interposed as a defense. The Court rejected the defense, saying that state officials with authority to enforce state laws 'who threaten and are about to commence proceedings, either of a civil or criminal nature, to enforce against parties affected an unconstitutional act, violating the Federal Constitution, may be enjoined by a Federal court of equity from such action.' Id., at 156, 28 S.Ct., at 452. The Court went on to say that a state official seeking to enforce in the name of a State an unconstitutional act 'comes into conflict with the superior authority of that Constitution, and he is in that case stripped of his official or representative character and is subjected in his person to the consequence of his individual conduct. The state has no power to impart to him any immunity from responsibility to the supreme authority of the United States.' Id., at 159160, 28 S.Ct., at 454.
As the complaint in the instant case alleges violations by officials of Illinois of the Equal Protections Clause of the Fourteenth Amendment, it seems that the case is governed by Ex parte Young so far as injunctive relief is concerned. The main thrust of the argument is that the instant case asks for relief which if granted would affect the treasury of the State.
Most welfare decisions by federal courts have a financial impact on the States. Under the existing federal-state cooperative system, a state desiring to participate, submits a 'state plan' to HEW for approval; once HEW approves the plan the State is locked into the cooperative scheme until it withdraws, 3 all as described in King v. Smith, 392 U.S. 309, 316, 88 S.Ct. 2128, 2132, 20 L.Ed.2d 1118 et seq. The welfare cases coming here have involved ultimately the financial responsibility of the State to beneficiaries claiming they were deprived of federal rights. King v. Smith required payment to children even though their mother was cohabitating with a man who could not pass muster as a 'parent.' Rosado v. Wyman, 397 U.S. 397, 90 S.Ct. 1207, 25 L.Ed.2d 442, held that under this state-federal cooperative program a State could not reduce its standard of need in conflict with the federal standard. It is true that Rosado did not involve retroactive payments as are involved here. But the distinction is not relevant or material because the result in every welfare case coming here is to increase or reduce the financial responsibility of the participating State. In no case when the responsibility of the State is increased to meet the lawful demand of the beneficiary, is there any levy on state founds. Whether the decree is prospective only or requires payments for the weeks or months wrongfully skipped over by the state officials, the nature of the impact on the state treasury is precisely the same.
The Court of Appeals for the Seventh Circuit is in line with that view; the opposed view of the Court of Appeals for the Second Circuit in Rothstein v. Wyman, 467 F.2d 226, is out of harmony with the established law.
What is asked by the instant case is minor compared to the relief granted in Griffin v. School Board, 377 U.S. 218, 84 S.Ct. 1226, 12 L.Ed.2d 256. In that case we authorized entry of an order putting an end to a segregated school system. We held, inter alia, that 'the District Court may, if necessary to prevent further racial discrimination, require the Supervisors to exercise the power that is theirs to levy taxes to raise funds adequate to reopen, operate, and maintain without racial discrimination a public school system in Prince Edward County like that operated in other counties in Virginia.' Id., at 233, 84 S.Ct., at 1234. We so held against vigorous contentions of the state officials that the Eleventh Amendment protected the State; and in reply we cited Lincoln County v. Luning, 133 U.S. 529, 10 S.Ct. 363, 33 L.Ed. 766, and Kennecott Copper Corp. v. State Tax Comm'n, 327 U.S. 573, 579, 66 S.Ct. 745, 748, 90 L.Ed. 862, to support the proposition that 'actions against a county can be maintained in United States courts in order to vindicate federally guaranteed rights.' 377 U.S., at 233, 84 S.Ct., at 1234.
Griffin is sought to be distinguished on the ground that a 'county' is not the 'state' for purposes of the Eleventh Amendment. But constitutionally the county in Griffin was exercising state policy as are the counties here, because otherwise the claim of denial of equal protection would be of no avail.
Counties are citizens of their State for purposes of diversity of citizenship. Bullard v. City of Cisco, 290 U.S. 179, 54 S.Ct. 177, 78 L.Ed. 254; Moor v. County of Alameda, 411 U.S. 693, 718719, 93 S.Ct. 1785, 1800, 36 L.Ed.2d 596. And they are not States for purposes of 28 U.S.C. 1251(a) which gives this Court original and exclusive jurisdiction of: '(1) All controversies between two or more states. . . .' Illinois v. City of Milwaukee, 406 U.S. 91, 98, 92 S.Ct. 1385, 1390, 31 L.Ed.2d 712. But, being citizens of their State, suits against them by another State are in our original but not exclusive jurisdiction under 28 U.S.C. 1251(b)(3). Ibid. Yet, as agencies of the State whether in carrying out educational policies or other they are the State, as Griffin held, for purposes of the Fourteenth Amendment. And Griffin, like the present case, dealt only with liability to citizens for state policy and state action.
It is said however, that the Eleventh Amendment is concerned, not with immunity of States from suit, but with the jurisdiction of the federal courts to entertain the suit. The Eleventh Amendment does not speak of 'jurisdiction'; it withholds the 'judicial power' of federal courts 'to any suit in law or equity . . . against one of the United States . . ..' If that 'judicial power,' or 'jurisdiction' if one prefers that concept, may not be exercised even in 'any suit in . . . equity' then Ex parte Young should be overruled. But there is none eager to take the step. Where a State has consented to join a federal-state cooperative project, it is realistic to conclude that the State has agreed to assume its obligations under that legislation. There is nothing in the Eleventh Amendment to suggest a difference between suits at law and suits in equity, for it treats the two without distinction. If common sense has any role to play in constitutional adjudication, once there is a waiver of immunity it must be true that it is complete so far as effective operation of the state-federal joint welfare program is concerned.
'Our conclusion is simply that Alabama, when it began operation of an interstate railroad approximately 20 years after enactment of the FELA, necessarily consented to such suit as was authorized by that Act,' Id., at 192, 84 S.Ct., at 1213.
'Our conclusion that this suit may be maintained is in accord with the common sense of this Nation's federalism. A State's immunity from suit by an individual without its consent has been fully recognized by the Eleventh Amendment and by subsequent decisions of this Court. But when a State leaves the sphere that is exclusively its own and enters into activities subject to congressional regulation, it subjects itself to that regulation as fully as if it were a private person or corporation.' Id., at 196, 84 S.Ct., at 1215.
As the Court of Appeals in the instant case concluded, Illinois by entering into the joint federal-state welfare plan just as surely '(left) the sphere that is exclusively its own.' Ibid.
It is argued that participation in the program of federal financial assistance is not sufficient to establish consent on the part of the State to be sued in federal courts. But it is not merely participation which supports a finding of Eleventh Amendment waiver, but participation in light of the existing state of the law as exhibited in such decisions as Shapiro v. Thompson, 394 U.S. 618, 89 S.Ct. 1322, 22 L.Ed.2d 600, which affirmed judgments ordering retroactive payment of benefits. Today's holding that the Eleventh Amendment forbids court-ordered retroactive payments, as the Court recognizes, necessitates an express overruling of several of our recent decisions. But it was against the background of those decisions that Illinois continued its participation in the federal program, and it can hardly be claimed that such participation was in ignorance of the possibility of court-ordered retroactive payments. The decision to participate against that background of precedent can only be viewed as a waiver of immunity from such judgments.
This suit is brought by Illinois citizens against Illinois officials. In that circumstance, Illinois may not invoke the Eleventh Amendment, since that Amendment bars only federal court suits against States by citizens of other States. Rather, the question is whether Illinois may avail itself of the nonconstitutional but ancient doctrine of sovereign immunity as a bar to respondent's claim for retroactive AABD payments. In my view Illinois may not assert sovereign immunity for the reason I expressed in dissent in Employees v. Department of Public Health and Welfare, 411 U.S. 279, 298, 93 S.Ct. 1614, 1625, 36 L.Ed.2d 251 (1973): the States surrendered that immunity in Hamilton's words, 'in the plan of the Convention,' that formed the Union, at least insofar as the States granted Congress specifically enumerated powers. See id., at 319 n. 7, 93 S.Ct., at 1635; Parden v. Terminal R. Co., 377 U.S. 184, 84 S.Ct. 1207, 12 L.Ed.2d 233 (1964). Congressional authority to enact the Social Security Act, of which AABD is a part, former 42 U.S.C. 13811385 (now replaced by similar provisions in 42 U.S.C. 801804 (1970 ed., Supp. II)), is to be found in Art. I, § 8, cl. 1, one of the enumerated powers granted Congress by the States in the Constitution. I remain of the opinion that 'because of its surrender, no immunity exists that can be the subject of a congressional declaration or a voluntary waiver,' 411 U.S., at 300, 93 S.Ct., at 1626, and thus have no occasion to inquire whether or not Congress authorized an action for AABD retroactive benefits, or whether or not Illinois voluntarily waived the immunity by its continued participation in the program against the background of precedents which sustained judgments ordering retroactive payments.
Mr. Justice MARSHALL, with whom Mr. Justice BLACKMUN joins, dissenting.
So here, Illinois elected to participate in the AABD program, and received and expended substantial federal funds in the years at issue. It thereby obligated itself to comply with federal law, including the requirement of former 42 U.S.C. 1382(a)(8) that 'such aid or assistance shall be furnished with reasonable promptness to all eligible individuals.' In Townsend v. Swank, 404 U.S. 282, 286, 92 S.Ct. 502, 505, 30 L.Ed.2d 448 (1971), we held that participating States must strictly comply with the requirement that aid be furnished 'to all eligible individuals,' and that the States have no power to impose additional eligibility requirements which exclude persons eligible for assistance under federal standards. Today's decision, ante, at 659660 n. 8, properly emphasizes that participating States must also comply strictly with the 'reasonable promptness' requirement and the more detailed regulations adding content to it.
In agreeing to comply with the requirements of the Social Security Act and HEW regulations, I believe that Illinois has also agreed to subject itself to suit in the federal courts to enforce these obligations. I recognize, of course, that the Social Security Act does not itself provide for a cause of action to enforce its obligations. As the Court points out, the only sanction expressly provided in the Act for a participating State's failure to comply with federal requirements is the cutoff of federal funding by the Secretary of HEW. Former 42 U.S.C. 1384 (now 42 U.S.C. 804 (1970 ed., Supp. II)).
But a cause of action is clearly provided by 42 U.S.C. 1983, which in terms authorizes suits to redress deprivations of rights secured by the 'laws' of the United States. And we have already rejected the argument that Congress intended the funding cutoff to be the sole remedy for noncompliance with federal requirements. In Rosado v. Wyman, 397 U.S. 397, 420423, 90 S.Ct. 1207, 12211223, 25 L.Ed.2d 442 (1970), we held that suits in federal court under § 1983 were proper to enforce the provisions of the Social Security Act against participating States. Mr. Justice Harlan, writing for the Court, examined the legislative history and found 'not the slightest indication' that Congress intended to prohibit suits in federal court to enforce compliance with federal standards. Id., at 422, 90 S.Ct., at 1223.
I believe that Congress also intended the full panoply of traditional judicial remedies to be available to the federal courts in these § 1983 suits. There is surely no indication of any congressional intent to restrict the courts' equitable jurisdiction. Yet the Court has held that '(u)nless a statute in so many words, or by a necessary and inescapable inference, restricts the court's jurisdiction in equity, the full scope of that jurisdiction is to be recognized and applied.' Porter v. Warner Holding Co., 328 U.S. 395, 398, 66 S.Ct. 1086, 1089, 90 L.Ed. 1332 (1946). 'When Congress entrusts to an equity court the enforcement of prohibitions contained in a regulatory enactment, it must be taken to have acted cognizant of the historic power of equity to provide complete relief in light of the statutory purposes.' Mitchell v. DeMario Jewelry, 361 U.S. 288, 291292, 80 S.Ct. 332, 335, 4 L.Ed.2d 323 (1960).
In particular, I am firmly convinced that Congress intended the restitution of wrongfully withheld assistance payments to be a remedy available to the federal courts in these suits. Benefits under the categorical assistance programs 'are a matter of statutory entitlement for persons qualified to receive them.' Goldberg v. Kelly, 397 U.S. 254, 262, 90 S.Ct. 1011, 1017, 25 L.Ed.2d 287 (1970). Retroactive payment of benefits secures for recipients this entitlement which was withheld in violation of federal law. Equally important, the courts' power to order retroactive payments is an essential remedy to insure future state compliance with federal requirements. See Porter v. Warner Holding Co., supra, 328 U.S., at 400, 66 S.Ct., at 1090. No other remedy can effectively deter States from the strong temptation to cut welfare budgets by circumventing the stringent requirements of federal law. The funding cutoff is a drastic sanction, one which HEW has proved unwilling or unable to employ to compel strict compliance with the Act and regulations. See Rosado v. Wyman, supra, 397 U.S., at 426, 90 S.Ct., at 1225 (Douglas, J., concurring). Moreover, the cutoff operates only prospectively; it in no way deters the States from even a flagrant violation of the Act's requirements for as long as HEW does not discover the violation and threaten to take such action.
Absent any remedy which may act with retroactive effect, state welfare officials have everything to gain and nothing to lose by failing to comply with the congressional mandate that assistance be paid with reasonable promptness to all eligible individuals. This is not idle speculation without basis in practical experience. In this very case, for example, Illinois officials have knowingly violated since 1968 federal regulations on the strength of an argument as to its invalidity which even the majority deems unworthy of discussion. Ante, at 659660 n. 8. Without a retroactive-payment remedy, we are indeed faced with 'the spectre of a state, perhaps calculatingly, defying federal law and thereby depriving welfare recipients of the financial assistance Congress thought it was giving them.' Jordan v. Weaver, 472 F.2d 985, 995 (CA7 1972). Like the Court of Appeals, I cannot believe that Congress could possibly have intended any such result.
Such indicia of congressional intent as can be gleaned from the statute confirm that Congress intended to authorize retroactive payment of assistance benefits unlawfully withheld. Availability of such payments is implicit in the 'fair hearing' requirement, former 42 U.S.C. 1382(a)(4), which permitted welfare recipients to challenge the denial of assistance. The regulations which require States to make corrective payments retroactively in the event of a successful fair hearing challenge, 45 CFR § 205.10(a)(18), merely confirm the obvious statutory intent. HEW regulations also authorize federal matching funds for retroactive assistance payments made pursuant to court order, 45 CFR §§ 205.10(b)(2), (b)(3). We should not lightly disregard this explicit recognition by the agency charged with administration of the statute that such a remedy was authorized by Congress. See Griggs v. Duke Power Co., 401 U.S. 424, 433434, 91 S.Ct. 849, 854 855, 28 L.Ed.2d 158 (1971).
Illinois chose to participate in the AABD program with its eyes wide open. Drawn by the lure of federal funds, it voluntarily obligated itself to comply with the Social Security Act and HEW regulations, with full knowledge that Congress had authorized assistance recipients to go into federal court to enforce these obligations and to recover benefits wrongfully denied. Any doubts on this score must surely have been removed by our decisions in Rosado v. Wyman, supra, and Shapiro v. Thompson, 394 U.S. 618, 89 S.Ct. 1322, 22 L.Ed.2d 600 (1969), where we affirmed a district court retroactive payment order. I cannot avoid the conclusion that, by virtue of its knowing and voluntary decision to nevertheless participate in the program, the State necessarily consented to subject itself to these suits. I have no quarrel with the Court's view that waiver of constitutional rights should not lightly be inferred. But I simply cannot believe that the State could have entered into this essentially contractual agreement with the Federal Government without recognizing that it was subjecting itself to the full scope of the § 1983 remedy provided by Congress to enforce the terms of the agreement.
Of course, § 1983 suits are nominally brought against state officers, rather than the State itself, and do not ordinarily raise Eleventh Amendment problems in view of this Court's decision in Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714 (1908). But to the extent that the relief authorized by Congress in an action under § 1983 may be open to Eleventh Amendment objections, 2 these objections are waived when the State agrees to comply with federal requirements enforceable in such an action. I do not find persuasive the Court's reliance in this case on the fact that 'congressional authorization to sue a class of defendants which literally includes States' is absent. Ante, at 672. While true, this fact is irrelevant here, for this is simply not a case 'literally' against the State. While the Court successfully knocks down the strawman it has thus set up, it never comes to grips with the undeniable fact that Congress has 'literally' authorized this suit within the terms of § 1983. Since there is every reason to believe that Congress intended the full panoply of judicial remedies to be available in § 1983 equitable actions to enforce the Social Security Act, I think the conclusion is inescapable that Congress authorized and the State consented to § 1983 actions in which the relief might otherwise be questioned on Eleventh Amendment grounds.
My conclusion that the State has waived its Eleventh Amendment objections to court-ordered retroactive assistance payments is fully consistent with last Term's decision in Employees v. Department of Public Health and Welfare, 411 U.S. 279, 93 S.Ct. 1614, 36 L.Ed.2d 251 (1973). As I emphasized in my concurring opinion, there was no voluntary action by the State in Employees which could reasonably be construed as evidencing its consent to suit in a federal forum.
'(T)he State was fully engaged in the operation of the affected hospitals and schools at the time of the 1966 amendments. To suggest that the State had the choice of either ceasing operation of these vital public services or 'consenting' to federal suit suffices, I believe, to demonstrate that the State had no true choice at all and thereby that the State did not voluntarily consent to the exercise of federal jurisdiction . . ..' Id., at 296, 93 S.Ct., at 1624.
A finding of waiver here is also consistent with the reasoning of the majority in Employees, which relied on a distinction between 'governmental' and 'proprietary' functions of state government. Id., at 284285, 93 S.Ct., at 16171618. This distinction apparently recognizes that if sovereign immunity is to be at all meaningful, the Court must be reluctant to hold a State to have waived its immunity simply by acting in its sovereign capacityi.e., by merely performing its 'governmental' functions. On the other hand, in launching a profitmaking enterprise, 'a State leaves the sphere that is exclusively its own,' Parden v. Terminal R. Co., 377 U.S., at 196, 84 S.Ct., at 1215, and a voluntary waiver of sovereign immunity can more easily be found. While conducting an assistance program for the needy is surely a 'governmental' function, the State here has done far more than operate its own program in its sovereign capacity. It has voluntarily subordinated its sovereignty in this matter to that of the Federal Government, and agreed to comply with the conditions imposed by Congress upon the expenditure of federal funds. In entering this federal-state cooperative program, the State again 'leaves the sphere that is exclusively its own,' and similarly may more readily be found to have voluntarily waived its immunity.
Indeed, this is the lesson to be drawn from this Court's decision in Petty v. Tennessee-Missouri Bridge Comm'n, 359 U.S. 275, 79 S.Ct. 785, 3 L.Ed.2d 804 (1959), where the Court found that the States had waived the sovereign immunity of the Commission by joining in an interstate compact subject to the approval of Congress. The Court in Petty emphasized that it was 'called on to interpret not unilateral state action but the terms of a consensual agreement' between the States and Congress, id., at 279, 79 S.Ct., at 788, and held that the States who join such a consensual agreement, 'by accepting it and acting under it assume the conditions that Congress under the Constitution attached.' Id., at 281282, 79 S.Ct., at 790. Although the congressional intent regarding the sue-and-be-sued clause was by no means certain, the Court held that the surrounding conditions made it clear that the States accepting it waived their sovereign immunity. Id., at 280, 79 S.Ct., at 789, especially since this interpretation was necessary to keep the compact 'a living interstate agreement which performs high functions in our federalism.' Id., at 279, 79 S.Ct., at 788.
I find the approach in Petty controlling here. As even the dissent in that case recognized, id., at 285, 79 S.Ct., at 792 (Frankfurter, J., dissenting), Congress undoubtedly has the power to insist upon a waiver of sovereign immunity as a condition of its consent to such a federal-state agreement. Since I am satisfied that Congress has in fact done so here, at least to the extent that the federal courts may do 'complete rather than truncated justice,' Porter v. Warner Holding Co., 328 U.S., at 398, 66 S.Ct., at 1089, in § 1983 actions authorized by Congress against state welfare authorities, I respectfully dissent.
In his complaint in the District Court, respondent claimed that the Illinois Department of Public Aid was not complying with federal regulations in its processing of public aid applications, and also that its refusal to process and allow respondent's claim for a period of four months, while processing and allowing the claims of those similarly situated, violated the Equal Protection Clause of the Fourteenth Amendment. Respondent asserted that the District Court could exercise jurisdiction over the cause by virtue of 28 U.S.C. 1331 and 1343(3) and (4). Though not briefed by the parties before this Court, we think that under our decision in Hagans v. Lavine, 415 U.S. 528, 94 S.Ct. 1372, 39 L.Ed.2d 577 (1974), the equal protection claim cannot be said to be 'wholly insubstantial,' and that therefore the District Court was correct in exercising pendent jurisdiction over the statutory claim.
Effective January 1, 1974, this AABD program was replaced by a similar program. See 42 U.S.C. 801805 (1970 ed., Supp. II).
'(ii) 60 days . . . (for aid to disabled). Under this requirement, the applicant is informed of the agency's time standard in acting on applications, which covers the time from date of application under the State plan to the date that the assistance check, or notification of denial of assistance or change of award, or the eligibility decision with respect to medical assistance, is mailed to the applicant or recipient. . . .' When originally issued in 1968 the regulations provided that the applications for aid to the aged and blind be processed within 30 days and that aid to the disabled be processed within 45 days of receipt. They also provided that the person determined to be eligible must receive his assistance check within the applicable time period. The amendment to 60 days for aid to the disabled occurred in 1971, as did the change to require mailing instead of receipt of the assistance check within the applicable time period; effective Oct. 15, 1973, the time for processing aged and blind applications became 45 days.
'Except for (disability) cases which have a time standard of 45 days, the time standard for disposition of applications is 30 days from the date of application to the date the applicants are determined eligible and the effective date of their first assistance or are determined ineligible and receive a notice of denial of assistance. . . .
'Initial awards may be new grants, reinstatements, or certain types of resumptions. They can be effective for the month in which Form FO550 is signed but for no prior period except (under conditions not relevant to this case).
'(ii) For those disabled applicants who applied between January 1, 1971 and April 16, 1971, whose first full AABD check was not mailed within sixty days from the date of application, AABD assistance for the period beginning with the sixtieth day from the date of application to the date the applicant's entitlement became effective.
'These AABD benefits shall be mailed to those persons currently receiving AABD within eight months with an explanatory letter, said letter having been first approved by plaintiffs' attorney. Any AABD benefits received pursuant to this paragraph shall not be deemed income or resources under Article III of the Illinois Public Aid Code.
'(a) A certified letter (return receipt requested), said letter having been first approved by plaintiffs' attorney, shall be sent to the last known address of the person, informing him in concise and easily understandable terms that he is entitled to a specified amount of AABD benefits wrongfully withheld, and that he may claim such amount by contacting the County Department of Public Aid at a specified address, within 45 days from the receipt of said letter.
On July 19, 1973, the author of this opinion stayed until further order of this Court these two paragraphs of the District Court's judgment. 414 U.S. 1301, 94 S.Ct. 13, 38 L.Ed.2d 15.
Respondent appealed from the District Court's judgment insofar as it held him not entitled to receive benefits from the date of his applications (as opposed to the date of authorization of benefits as provided by the federal regulations) and insofar as it failed to award punitive damages. The Court of Appeals upheld the District Court's decision against respondent on those points and they are not at issue here. 472 F.2d 985, 997999.
ground had been timely presented, defendants' contention would be meritless.' Ibid. Noting that one of three tests established by our decision in Huson for determining the retroactivity of court decisions was that 'the decision to be applied nonretroactively must establish a new principle of law, either by overruling clear past precedent on which litigants may have relied . . . or (have decided) an issue of first impression whose resolution was not clearly foreshadowed . . .,' Chevron Oil Co. v. Huson, supra, 404 U.S., at 106, 92 S.Ct., at 355, the Court of Appeals found that the petitioner had not satisfied this test, since the 'federal time requirements for processing applications and paying eligible AABD applicants were made effective July 1, 1968, and defendants were well aware of these mandatory maximum permissible time standards.' 472 F.2d, at 996.
In light of our disposition of this case on the Eleventh Amendment issue we see no reason to address this contention.
that the 'establishment of arbitrary (forty-five) and sixty day maximums in the HEW regulations for determination of eligibility and initiation of payments without taking into consideration the efficient administration of the Act by the State agencies is in consistent with the 'reasonable promptness' requirement and must therefore be declared unlawful . . ..' Pet. for Cert. 23. The Court of Appeals rejected this contention, holding that 'these time requirements, binding on state welfare officials, are an appropriate interpretation of the Congressional mandate of 'reasonable promptness." 472 F.2d, at 996. We agree with the Court of Appeals.
controversies between States of the Union and foreign States. That purpose was suitably to provide for adjudication in such cases if consent should be given but not otherwise. Madison said: 'The next case provides for disputes between a foreign state and one of our states, should such a case ever arise; and between a citizen and a foreign citizen or subject. I do not conceive that any controversy can ever be decided, in these courts, between an American state and a foreign state, without the consent of the parties. If they consent, provision is here made.' 3 Elliot's Debates, 533.
'Marshall, in the same Convention, expressed a similar view. Replying to an objection as to the admissibility of a suit by a foreign state, Marshall said: 'He objects, in the next place, to its jurisdiction in controversies between a state and a foreign state. Suppose, says he, in such a suit, a foreign state is cast; will she be bound by the decision? If a foreign state brought a suit against the commonwealth of Virginia, would she not be barred from the claim if the federal judiciary thought it unjust? The previous consent of the parties is necessary; and, as the federal judiciary will decide, each party will acquiesce.' 3 Elliot's Debates, 557.
'Hamilton, in The Federalist, No. 81, made the following emphatic statement of the general principle of immunity: 'It is inherent in the nature of sovereignty not to be amenable to the suit of an individual without its consent. This is the general sense and the general practice of mankind; and the exemption, as one of the attributes of sovereignty, is now enjoyed by the government of every State in the Union. Unless, therefore, there is a surrender of this immunity in the plan of the convention, it will remain with the States, and the danger intimated must be merely ideal. The circumstances which are necessary to produce an alienation of State sovereignty were discussed in considering the article of taxation and need not be repeated here. A recurrence to the principles there established will satisfy us that there is no color to pretend that the State governments would by the adoption of that plan be divested of the privilege of paying their own debts in their own way, free from every constraint but that which flows from the obligations of good faith. The contracts between a nation and individuals are only binding on the conscience of the sovereign, and have no pretensions to a compulsive force. They confer no right of action independent of the sovereign will. To what purpose would it be to authorize suits against States for the debts they owe? How could recoveries be enforced? It is evident it could not be done without waging war against the contracting State; and to ascribe to the federal courts by mere implication, and in destruction of a preexisting right of the State governments, a power which would involve such a consequence would be altogether forced and unwarrantable." Monaco v. Mississippi, 292 U.S. 313, 323325, 54 S.Ct. 745, 748, 749, 78 L.Ed. 1282 (1934) (footnotes omitted).
Of the Court of Appeals for the District of Columbia Circuit, sitting by designation on the Court of Appeals for the Second Circuit.
It may be true, as stated by our Brother DOUGLAS in dissent, that '(m)ost welfare decisions by federal courts have a financial impact on the States.' Post, at 680681. But we cannot agree that such a financial impact is the same where a federal court applies Ex parte Young to grant prospective declaratory and injunctive relief, as opposed to an order of retroactive payments as was made in the instant case. It is not necessarily true that '(w)hether the decree is prospective only or requires payments for the weeks or months wrongfully skipped over by the state officials, the nature of the impact on the state treasury is precisely the same.' Post, at 682. This argument neglects the fact that where the State has a definable allocation to be used in the payment of public aid benefits, and pursues a certain course of action such as the processing of applications within certain time periods as did Illinois here, the subsequent ordering by a federal court of retroactive payments to correct delays in such processing will invariably mean there is less money available for payments for the continuing obligations of the public aid system.
The Court of Appeals considered the Court's decision in Griffin v. School Board, 377 U.S. 218, 84 S.Ct. 1226, 12 L.Ed.2d 256 (1964), to be of like import. But as may be seen from Griffin's citation of Lincoln County v. Luning, 133 U.S. 529, 10 S.Ct. 363, 33 L.Ed. 766 (1890), a county does not occupy the same position as a State for purposes of the Eleventh Amendment. See also Moor v. County of Alameda, 411 U.S. 693, 93 S.Ct. 1785, 36 L.Ed.2d 596 (1973). The fact that the county policies executed by the county officials in Griffin were subject to the commands of the Fourteenth Amendment, but the county was not able to invoke the protection of the Eleventh Amendment, is no more than a recognition of the long-established rule that while county action is generally state action for purposes of the Fourteenth Amendment, a county defendant is not necessarily a state defendant for purposes of the Eleventh Amendment.
Brief for Respondent 1518. Decisions of this Court in which we summarily affirmed a decision of a lower federal court which ordered the payment of retroactive awards and in which the jurisdictional statement filed in this Court raised the Eleventh Amendment defense include: State Dept. of Health and Rehabilitative Services v. Zarate, 407 U.S. 918, 92 S.Ct. 2462, 32 L.Ed.2d 803 (1972), aff'g 347 F.Supp. 1004 (S.D.Fla.1971); Sterrett v. Mothers' and Children's Rights Organization, 409 U.S. 809, 93 S.Ct. 68, 34 L.Ed.2d 70 (1972), aff'g unreported order and judgment of District Court (ND Ind.1972) on remand from Carpenter v. Sterrett, 405 U.S. 971, 92 S.Ct. 1199, 31 L.Ed.2d 246 (1972); Gaddis v. Wyman, 304 F.Supp. 717 (S.D.N.Y.1969) (order at CCH Poverty Law Rep. 10,506 (19681971 Transfer Binder)), aff'd per curiam sub nom. Wyman v. Bowens, 397 U.S. 49, 90 S.Ct. 813, 25 L.Ed.2d 38 (1970).
In the words of Mr. Justice Brandeis: 'State decisis is usually the wise policy, because in most matters it is more important that the applicable rule of law be settled than that it be settled right. . . . This is commonly true even where the error is a matter of serious concern, provided correction can be had by legislation. But in cases involving the Federal Constitution, where correction through legislative action is practically impossible, this Court has often overruled its earlier decisions. The Court bows to the lessons of experience and the force of better reasoning, recognizing that the process of trial and error, so fruitful in the physical sciences, is appropriate also in the judicial function.' Burnet v. Coronado Oil & Gas Co., 285 U.S. 393, 406408, 52 S.Ct. 443, 447, 76 L.Ed. 815 (1932) (dissenting opinion) (footnotes omitted).
Respondent urges that the traditionally broad power of a federal court sitting as a court of equity to fashion appropriate remedies as are necessary to effect congressional purposes requires that the District Court's award of retroactive benefits be upheld. Respondent places principal reliance on our prior decisions in Porter v. Warner Holding Co., 328 U.S. 395, 66 S.Ct. 1086, 90 L.Ed. 1332 (1946), and Mitchell v. DeMario Jewelry, 361 U.S. 288, 80 S.Ct. 332, 4 L.Ed.2d 323 (1960). Both cases dealt with the power of a federal court to grant equitable relief for violations of federal law; the decision in Mitchell indicated that a federal court could provided equitable relief 'complete . . . in light of the statutory purposes.' Id., at 292, 80 S.Ct., at 335. Since neither of these cases involved a suit against a State or a state official, it did not purport to decide the availability of equitable relief consistent with the Eleventh Amendment.
HEW sought passage of a bill in the 91st Congress, H.R. 16311, § 407(a), which would have given it authority to require retroactive payments to eligible persons denied such benefits. The bill failed to pass the House of Representatives. See H.R. 16311, The Family Assistance Act of 1970, Senate Committee on Finance, 91st Cong., 2d Sess., C169170 (Comm. Print No. 5, 1970).
'(2) Payments of assistance made to carry out hearing decisions, or to take corrective action after an appeal but prior to hearing, or to extend the benefit of a hearing decision or court order to others in the same situation as those directly affected by the decision or order. Such payments may be retroactive in accordance with applicable Federal policies on corrective payments.
The Court of Appeals felt that § 1983, the enactment of the AABD program, and the issuance by HEW of the above regulation, indicated that Congress intended to include within the Social Security Act the remedy of 'effective judicial review' and 'the remedy of restoration of benefits withheld in violation of federal law.' 472 F.2d, at 994995 and n. 15. But the adoption of regulations by HEW to permit the use of federal funds in the satisfaction of judicial awards is not determinative of the constitutional issues here presented.
'New York is, of course, in no way prohibited from using only state funds according to whatever plan it chooses, providing it violates no provision of the Constitution. It follows, however, from our conclusion that New York's program is incompatible with § 402(a)(23), that petitioners are entitled to declaratory relief and an appropriate injunction by the District Court against the payment of federal monies according to the new schedules, should the State not develop a conforming plan within a reasonable period of time.
'We have considered an rejected the argument that a federal court is without power to review state welfare provisions or prohibit the use of federal funds by the States in view of the fact that Congress has lodged in the Department of HEW the power to cut off federal funds for noncompliance with statutory requirements. We are most reluctant to assume Congress has closed the avenue of effective judicial review to those individuals most directly affected by the administration of its program. . . . We adhere to King v. Smith, 392 U.S. 309, 88 S.Ct. 2128, 20 L.Ed.2d 1118 (1968), which implicitly rejected the argument that the statutory provisions for HEW review of plans should be read to curtail judicial relief and held Alabama's 'substitute father' regulation to be inconsistent with the federal statute. While King did not advert specifically to the remedial problem, the unarticulated premise was that the State had alternative choices of assuming the additional cost of paying benefits to families with substitute fathers or not using federal funds to pay welfare benefits according to a plan that was inconsistent with federal requirements.' 397 U.S., at 420421, 90 S.Ct., at 1222.
Court to 'afford New York an opportunity to revise its program . . . or, should New York choose (not to revise its program), issue its order restraining the further use of federal monies pursuant to the present statute,' 397 U.S., at 421422, 90 S.Ct., at 1222, indicates that the Court felt that retroactive relief was not a permissible remedy. Brief for Petitioner 1720. We do not regard Rosado as controlling either way since the Court was not faced with a district court judgment ordering retroactive payments or with a challenge based on the Eleventh Amendment.
Respondent urges that the State of Illinois has abolished its common-law sovereign immunity in its state courts, and appears to argue that suit in a federal court against the State may thus be maintained. Brief for Respondent 23. Petitioner contends that sovereign immunity has not been abolished in Illinois as to this type of case. Brief for Petitioner 3136. Whether Illinois permits such a suit to be brought against the State in its own courts is not determinative of whether Illinois has relinquished its Eleventh Amendment immunity from suit in the federal courts. Chandler v. Dix, 194 U.S. 590, 591592, 24 S.Ct. 766, 767, 48 L.Ed. 1129 (1904).
Effective January 1, 1974, this AABD program was replaced by a similar program. See 42 U.S.C. 801805 (1970 ed., Supp. II). The program in Illinois is administered by the Department of Public Aid. Ill.Rev.Stat., c. 23, §§ 31 to 312 (1973). The former program was funded in part by the State and in part by the Federal Government. 42 U.S.C. 303, 304, 306, 12011204, 1206, 13511355, 13811385.
The Social Security Act states what a 'state plan' must provide. At the time this suit was brought, 42 U.S.C. 1382(a) provided: 'A State plan for aid to the aged, blind, or disabled, or for aid to the aged, blind, or disabled and medical assistance for the aged, must . . ..
Nearly identical provisions are now found in 42 U.S.C. 802(a) (1970 ed., Supp. II).
The Secretary of HEW issued mandatory federal time standard regulations. Handbook, Public Assistance Administration, pt. IV, §§ 2200(b)(3), 2300(b)(5); 45 CFR § 206.10(a)(3). Illinois adopted a 30-day standard for aged and blind applicants (Ill. Categ. Assistance Manual § 4004.1) as contrasted to HEW's 60-day period, § 2200, supra. It is that conflict which exposes the merits of the controversy.
The lower court's opinion is found in D.C., 347 F.Supp. 1004.
The lower court's opinion is found in D.C., 304 F.Supp. 717. Retroactive payments were challenged in question 2 of the jurisdictional statement.
The lower court's opinion is found in D.C., 270 F.Supp. 331.
Id., at 338 n. 5. The award of money damages was alleged to be a violation of the Eleventh Amendment in Part V of the jurisdictional statement.
The jurisdictional statement in the Sterrett case explicitly urged that the decree below violated the Eleventh Amendment since it would expend itself on the public treasurythe second question in the jurisdictional statement.
We settled in Rosado v. Wyman, 397 U.S. 397, 90 S.Ct. 1207, 25 L.Ed.2d 442, the question whether the grant of authority under the Social Security Act to HEW to cut off federal funds for noncompliance with statutory requirements provides the exclusive procedure and remedy for violations of the Act. We said: 'We are most reluctant to assume Congress has closed the avenue of effective judicial review to those individuals most directly affected by the administration of its program.' Id., at 420, 90 S.Ct., at 1222.
In view of my conclusion on this issue, I find it unnecessary to consider whether the Court correctly treats this suit as one against the State, rather than as a suit against a state officer permissible under the rationale of Ex parte Young, 209 U.S. 123, 28 S.Ct. 441, 52 L.Ed. 714 (1908).
It should be noted that there has been no determination in this case that state action is unconstitutional under the Fourteenth Amendment. Thus, the Court necessarily does not decide whether the States' Eleventh Amendment sovereign immunity may have been limited by the later enactment of the Fourteenth Amendment to the extent that such a limitation is necessary to effectuate the purposes of that Amendment, an argument advanced by an amicus in this case. In view of my conclusion that any sovereign immunity which may exist has been waived, I also need not reach this issue.
COUNTY OF ONEIDA, NEW YORK, et al., Petitioners v. ONEIDA INDIAN NATION OF NEW YORK STATE, etc., et al. NEW YORK, Petitioner v. ONEIDA INDIAN NATION OF NEW YORK STATE, etc., et al.
NATIONAL LABOR RELATIONS BOARD, Petitioner, v. INTERNATIONAL LONGSHOREMEN'S ASSOCIATION, AFL-CIO, et al.
Michael J. BOWERS, Attorney General of Georgia, Petitioner v. Michael HARDWICK, and John and Mary Doe.
B.H. PAPASAN, Superintendent of Education, et al., Petitioners v. William A. ALLAIN, Governor of Mississippi, et al.
David Randolph GRAY, Petitioner v. MISSISSIPPI.
Otis R. BOWEN, Secretary of Health and Human Services, Petitioner, v. Beaty Mae GILLIARD et al. David T. FLAHERTY, Secretary, North Carolina Department of Human Resources, et al., Appellants, v. Beaty Mae GILLIARD et al.
MISSOURI, et al., Petitioners v. Kalima JENKINS, by her friend, Kamau AGYEI, et al.
PORT AUTHORITY TRANS-HUDSON CORPORATION, Petitioner v. Patrick FEENEY.
OKLAHOMA TAX COMMISSION, Petitioner, v. CITIZEN BAND POTAWATOMI INDIAN TRIBE OF OKLAHOMA.
U.S. BANCORP MORTGAGE COMPANY, Petitioner, v. BONNER MALL PARTNERSHIP.
ARIZONANS FOR OFFICIAL ENGLISH and Robert D. Park, Petitioners v. ARIZONA et al.
Sandra Jean Dale BOGGS, Petitioner, v. Thomas F. BOGGS, Harry M. Boggs and David B. Boggs.
WISCONSIN DEPARTMENT OF CORRECTIONS, et al., Petitioners, v. Keith D. SCHACHT.
Lewis H. GOLDFARB et al., Petitioners, v. VIRGINIA STATE BAR et al.
ALYESKA PIPELINE SERVICE COMPANY, Petitioner, v. The WILDERNESS SOCIETY et al.
UNITED STATES, Petitioner, v. Herman R. TESTAN and Francis L. Zarrilli.
COLORADO SPRINGS AMUSEMENTS, LTD., etc., et al. v. Frank L. RIZZO, Mayor of Philadelphia, et al.
Lawrence CANTOR, dba Selden Drugs Company, etc., Petitioner, v. The DETROIT EDISON COMPANY.
MT. HEALTHY CITY SCHOOL DISTRICT BOARD OF EDUCATION, Petitioner, v. Fred DOYLE.
Harry ROBERTS, Petitioner, v. State of LOUISIANA.
ILLINOIS BRICK COMPANY et al., Petitioners, v. State of ILLINOIS et al.
Marvin MANDEL, Governor of Maryland, et al., Appellants, v. Bruce BRADLEY et al.
LAKE COUNTRY ESTATES, INC., et al., Petitioners, v. TAHOE REGIONAL PLANNING AGENCY, etc., et al.
State of NEVADA et al., Petitioners, v. John Michael HALL, etc., et al.
GREAT AMERICAN FEDERAL SAVINGS & LOAN ASSOCIATION et al., Petitioners, v. John R. NOVOTNY.
Edward W. MAHER, etc., Petitioner, v. Virginia GAGNE, etc.
PENNHURST STATE SCHOOL AND HOSPITAL et al., Petitioners, v. Terri Lee HALDERMAN et al. MAYOR OF CITY OF PHILADELPHIA et al., Petitioners, v. Terri Lee HALDERMAN et al. PENNSYLVANIA ASSOCIATION FOR RETARDED CITIZENS et al., Petitioners, v. PENNHURST STATE SCHOOL AND HOSPITAL et al. COMMISSIONERS AND MENTAL HEALTH/MENTAL RETARDATION ADMINISTRATORS FOR BUCKS COUNTY et al., Petitioners, v. Terri Lee HALDERMAN et al. PENNHURST PARENTS-STAFF ASSOCIATION, Petitioner, v. Terri Lee HALDERMAN et al.
Ronald M. ZOBEL and Patricia L. Zobel, Appellants, v. Thomas WILLIAMS, Commissioner of Revenue, and Alaska.
Kenneth CORY, Controller of the State of California, et al., Petitioners, v. Mark WHITE, Attorney General of the State of Texas, et al.
State of ALABAMA et al. v. Jerry Lee PUGH et al.
William G. MILLIKEN, Governor of the State of Michigan, et al., Petitioners, v. Ronald BRADLEY et al.
CONTINENTAL T. V., INC., et al., Petitioners, v. GTE SYLVANIA INCORPORATED.
FLORIDA DEPARTMENT OF STATE, Petitioner, v. TREASURE SALVORS, INC., etc.
Henry W. KERR et al., Petitioners, v. UNITED STATES DISTRICT COURT FOR the NORTHERN DISTRICT OF CALIFORNIA et al. | 2019-04-24T22:45:31Z | https://www.law.cornell.edu/supremecourt/text/415/651 |
This information-packed episode of LMScast features Chris Badgett of codeBOX discussing Tin Can API, eLearning authoring tools, LRS, H5P, and more with Dennis Hall of Learning Templates, who’s also created the LifterLMS xAPI.
If you’re not technically inclined you’ll still find this discussion informative and easy to understand. You’ll get answers to some basic questions, especially if you want to understand the scope of what LifterLMS xAPI does. Dennis starts with an explanation of what an API is and what it’s for. Basically Tin Can API, the Experience API, and xAPI are all names for the same thing. It’s simply a tool that connects things together.
If you’re new to LifterLMS, it’s a WordPress plugin that makes it easy to create, sell, and protect your online courses. The LifterLMS xAPI is an add-on for your WordPress site that gives you even more functionality. It also removes the need for a programmer to set up the API for you, allowing you to create your learning products and generate reporting with no programming skills required.
Dennis fills in some history on SCORM – the Shareable Content Object Reusability Model – and why it’s being replaced by the xAPI. He tells how xAPI and LifterLMS integrate to access eLearning services, and use communication channels in ways that save bandwidth for mobile devices because a lot of students use those to access your courses.
You’ll learn the difference between a Learning Management System (LMS) and a Learning Record Store (LRS), what their functions are, and how xAPI handles information privacy. Chris and Dennis explain competencies and activities beginning with measurable learning objectives for your curriculum, and how all of that gets reported. And LifterLMS is now the only WordPress-based Learning Management System that supports CASS competency analysis.
LifterLMS xAPI is also able to work with H5P content, giving you rich, visual, web-based, interactive content for your course, lessons, or quizzes. You’ll also get a quick overview of eLearning authoring tools and how they integrate with LifterLMS xAPI. By getting the most out of Tin Can API, eLearning authoring tools, LRS, H5P, and more with Dennis Hall’s LifterLMS xAPI, he has solved a lot of problems and provided new integrations and additional features.
Chris Badgett: Hello, and welcome back to another episode of LMScast. My name is Chris Badgett, and today I’m joined by special guest Dennis Hall from Learning Templates, creator of the incredible LifterLMS xAPI plugin, a companion to LifterLMS that we’re going to get into in this episode. First, Dennis, thanks for coming on the show.
Dennis Hall: Thanks, Chris. Nice to be here.
Chris Badgett: LifterLMS xAPI does a lot of different things, and I really wanted to take the opportunity to talk with you and get some answers to some pretty basic questions for people first coming across this, or for people trying to understand the full scope of what LifterLMS xAPI does. A lot of people listening to this episode already know what LifterLMS is, but in case you’re new, LifterLMS is a WordPress plugin that makes it easy to create, sell, and protect engaging online courses. LifterLMS xAPI is an add-on that you can add to your WordPress site that gives even more functionality, and quite frankly a lot more power and functionality to the core feature set of LifterLMS.
Let’s start at the beginning, Dennis, what is xAPI? Which is also known as the Experience API, and also known as the Tin Can API. If someone came up to you on the street and said what is that, how do you explain it?
Dennis Hall: What xAPI is, or Tin Can, as it’s most commonly referred to, a little history…Tin Can was the original project name that ADL, Advanced Distributed Learning organization, the U.S. government subsidiary. Tin Can was the name of the project that was given to a company called Rustici, who are the owners of SCORM.com, which I’m sure a lot of people are aware of over the years. Tin Can is just a nickname, in reality. It’s kind of stuck with it, but xAPI is the Experience API. You’re correct.
What xAPI is, it is exactly what they say, an API, meaning an application programmer’s interface. The wonderful thing about it is those of us who have developed things against xAPI have taken the programmers out of it. We’ve given you an API where you fill in some information, and that populates the information to be sent to servers and to be transmitted around the world, and to be communicated between you and your course, as well as your Learning Management System and your course. We’ve taken the technical programmer part out of it all, and made it much easier for the end user, the person who has no programmatic skills, to be able to focus on the job that they are good at doing, which is creating their learning products, and generating reporting output that makes sense to them.
Chris Badgett: That’s awesome. You mentioned the word SCORM, and my understanding is SCORM is something that’s dying, or phasing out, being replaced by the xAPI, as the new standard or whatever. For those who are looking at SCORM, or still using SCORM, can you talk about how that’s going away, or what’s new, and how people can think about it? You hear these words, SCORM, and Tin Can, or xAPI sometimes side by side but help us understand the difference.
Dennis Hall: Sure, to understand the difference you have to kind of have been in the industry since the onset of this. Back about ’95, we all started talking about and beginning to work with a specification called AICC. This was the Aviation Industry specification for reporting course materials and reusing courses amongst different platforms. The idea was you could have one course sitting on one server, and you could have many different Learning Management Systems connect to it, and be able to have those users of those Learning Management Systems use that content.
That kind of brought in what we call the SCO, back then though they called it an AU, and Assignable Unit, in reality. An AU was also a kind of file that you configured for AICC to work, but the beauty of it is that you could cross domains in the internet. That really was beneficial, but AICC, from a reporting, or a granular reporting perspective, it just didn’t have enough giddy up to really turn people on enough to go for it. Then came SCORM.
If you recall, I mentioned the shareable content part of AICC, well that got carried into SCORM. SCORM is an acronym for Shareable Content Object Reusability Model, and what that kind of means is that everything in your course is an object, and because it’s in your course, and your course is being used, it’s shareable content, because it’s being used amongst different people. You’re not giving a physical course to each person. You’re hosting it centrally, and having a bunch of users connect to your LMS and use it. It’s shareable.
What is sad about SCORM is one of the first things that ever went away were that AICC model, where you could connect from your domain to another domain, and use the course in the other domain. SCORM lost that right away, and that forced everybody to take that shareable content, and start distributing it amongst all the different LMSes to be used locally. This was a problem for people who wanted to centrally host courses and resell them to different platforms, but it was something, I’m not going to say become liked it. People just succumbed to it, and accepted it for what it was.
That was the problem with SCORM, is that throughout the years it went through four evolutions, and in those four evolutions, essentially people just became more and more apt to succumb to the lesser abilities, let’s call them. SCORM kind of got milked down so much. It’s not uncommon for somebody to expect, Dennis Hall completed course A. Dennis Hall scored 55% on exam A. That was kind of it. ELearning really took a big hit, because eLearning could do so much more, but SCORM was basically killing it.
Then through the different iterations of SCORM, things tended to become more broken. Even to the point where by the third edition of SCORM, if you made a big enough course you could never get a completed on the course, because there was so much information being sent to the LMS, and the LMS wasn’t able to handle it all, so it was losing data. Essentially, in large courses, people weren’t completing courses. I myself have been an instructional designer and courseware developer through this whole evolution. I’ve seen it grow from day one, from the beginning of AICC, even beforehand to be honest. It just got more and more broken as things got along.
Like I say, the only thing that kept it going was the fact that people were expecting less and less, and their expectations were lowered quite a bit. More than a year ago now, the ADL, various working groups, I’m in three of them. I’m in the xAPI working group, as well as the cmi5 working group, as well as the CASS working group. In two of those, xAPI and cmi5, I’m one of the contributing authors to that. There are a number of us in there including Learning Management System vendors who are all in there.
What we’re trying to do in the xAPI working group is we’ve created a specification for the xAPI to be able to send and receive data. We’ve created rules. What type of data? What format of data? What format of information? What kind of details should be in the information? This sort of thing. In the cmi5 working group, what cmi5 is, it is a layer on top of xAPI, that compliments xAPI, and applies a set of rules to Learning Management Systems to be able to use xAPI effectively. It basically determines, for example, what format should the AU, the Assignable Unit, which Assignable Unit kind of means the course. What format of the information should be in the course, and how should the Learning Management System read it?
That’s all the technical stuff. That’s out of the way. Bottom line is though, the announcement that SCORM was no longer being supported, it doesn’t mean that it’s dead. It simply means it’s not going to evolve, and grow anymore. That happened a little over a year ago that that announcement was made. At that time, xAPI had been gearing up for about two years prior to. At that time xAPI was announced as the replacement for SCORM.
Dennis Hall: The beautiful thing about xAPI is that what you had in AICC, what you lost in SCORM, you’ve now regained with even tons more information in xAPI. That’s the whole history in a nutshell.
Chris Badgett: That’s awesome. You’ve been along for the ride through all that, so that brings a lot of depth of knowledge and experience there, in seeing where things have been, and where they’re headed, where the opportunities are, where the problems are.
Dennis Hall: Yeah, you’re right. What’s important, a key word there is where the problems are. What is really important to understand about implementing xAPI is to understand what your objectives are when implementing it. When you want to use xAPI do you have a valid reason? Are you doing it just because it’s the latest greatest thing? That’s not really a good reason. Are you doing it because SCORM is failing you? That’s a better reason. It’s an important reason, but is it still going to serve your needs?
Another thing with xAPI, something that we’re seeing a lot of is eLearning implementations. The thing with eLearning is that unlike LifterLMS, LifterLMS the content’s in the website, where eLearning, the content can be anywhere in the world, as I mentioned with the AICC being brought into Tin Can. What’s really important to understand about that is that here you are. You’re on your mobile device, an iPad, for example. I wouldn’t do learning on a cell phone, but some people might, even. Let’s say you’re on your iPad, there are rules related to browsers in mobile devices.
As an example, when you open up a video in a mobile device it never automatically plays. You always have to tap it to play it. That’s a rule that’s built into all mobile devices, and this is because mobile devices by default will not stream two channels of information simultaneously. They’ll only connect to one thing, and use it, until you intentionally tap something to make it connect to the other thing. Then, it’ll stop communicating with the first thing. They do that intentionally, because the mobile developers have been trying to save bandwidth usage for their users, so they don’t clock up gigabytes of data usage every month. That is the design.
LifterLMS doesn’t have a problem out of the box, because everything’s native in LifterLMS. You’re using one communication channel. As soon as you open up an eLearning course within LifterLMS, your mobile device has to make a choice: eLearning or Lifter? The end. When you tap the eLearning to get it started, you’ve made the choice for the device, and it can communicate to the Learning Management System. Excuse me, it won’t communicate to the Learning Management System.
It’ll communicate to a database called a Learning Record Store. In my case, the ones that I implement, they’re high performance databases. They’re designed to be 8,000 times faster than your typical WordPress database. That is what I provide as a service as well. It’s really critical when you’ve got 100 users that are constantly streaming data in and out of the database, as well as people trying to run reports off the database at the same time. You need the performance. You need the speed, especially when crunching reports.
Chris Badgett: Got you. I just want to say what LifterLMS xAPI does at a high level, and then let’s get into unpacking more of these bits and pieces that people need to understand to see if it’s a good fit for you or not. LifterLMS API makes it possible for you to integrate LifterLMS with an xAPI or Tin Can service. You can manage your LifterLMS competencies and activities, your H5P content, as well as uploaded and linked Articulate, Captivate, or Lectora eLearning course activities. Those are those external courses that Dennis was talking about there.
LifterLMS xAPI does a lot. You may only need certain pieces of this, or you may need it all. You may need everything, and you’re really going big with your eLearning. Circling back to what you were just talking about, Dennis, LifterLMS is a Learning Management System. As you helped me understand, it’s a LCMS, a Learning Content Management System as well.
Chris Badgett: WordPress is a content management system. What is the big difference between an LMS, and an LRS? A Learning Management System versus a Learning Record Store?
Dennis Hall: Good question. A Learning Management System is a system that encompasses everything to do with your users, everything to do with your registrations, everything to do with scheduling, if you’ve got that, and everything to do with serving content to those users based on a set of rules. A Learning Record Store is primarily a database. It’s a place that you send data to. Some Learning Record Stores have reporting ability built into them, where others don’t. There are certain ones that can and can’t provide reports, but that’s all it is. A Learning Record Store is simply that.
However, what happens as the forward facing part of the Learning Record Store is that it receives xAPI data, and it interprets it, and then it stores it appropriately based on how in interpreted the data strings. We won’t get into that technical stuff, but it’s actually you’re sending strings of information to the server, the server interprets, oh I see this, I should put it here. I see that I should put it there. The end.
Chris Badgett: Yeah, and if you’re new to the technical jargon, that’s one of the ways I like to first explain the concept of an API. It’s kind of like a pipe that connects things together.
Chris Badgett: It’s sort of like connecting your LifterLMS site to a Learning Record Store. That pipe is the Tin Can API.
Dennis Hall: That’s correct. One of the things LifterLMS xAPI does is it prepackages everything that the user’s doing, and it prepackages it in an xAPI format, and it sends it to the Learning Record Store, which then unpackages it and reads that information, and stores it in the appropriate location. It is important to understand, by the way, all the data being sent across is encrypted.
Chris Badgett: Yeah, privacy is a big deal. I think one of the things that really helped me understand the difference between a LRS and an LMS too is that an LRS may be receiving data from multiple Learning Management Systems. You may be getting data from some course platform over here. It might be Lifter powered. Something else over here. Whoever owns the LRS for some kind of degree program, or certification, or training objective, the data can be coming in from all kinds of different places.
Dennis Hall: That’s right. You really need a high performance server to handle it all. One other thing to mention, since you were just on that subject … Sorry, go ahead. I lost my train of thought there.
Chris Badgett: In terms of LifterLMS xAPI, I know when you first set it up it asks you which Learning Record Store, or LRS do you want to use, and you’ve got one that you have in there that you recommend, or people could sent it to a different one of their choice. Is that right? Can you help us understand the options around that?
Dennis Hall: Yeah. One of the things with the xAPI’s standard. It is a standard that allows you to connect to any Learning Record Store that is xAPI compliant. In the case of Tin Can, of LifterLMS xAPI, I do have a special key added into mine, so it is best suited to work with the Learning Locker Learning Record Story system. Learning Locker is a project that I’ve done minor development in with that company as well, and it is an open source project out on GitHub. However, the server that Learning Locker sits on is a very, very important architecture that helps Learning Locker to work as fast as it can.
There are a number of other companies out there that do also host their own Learning Record Stores. SCORM.com itself hosts one. There is Saltbox. There is a number of different companies out there. When you connect LifterLMS xAPI to any of those Learning Record Stores, you will need to contact them, because they’ll have to provide you a key separately, much like the user key that is setup in mine. If you go with a Learning Locker provider, then that key will be provided to you as part of the package already. You don’t need to worry about converting, or trying to figure out how to ask them for the key.
There are three pieces of encrypted information typically associated with the Learning Locker setup. One is the LRS key that I just described. The other is your LRS user key, your username, excuse me. Then you’ve got your LRS password. What you receive as LRS key, LRS username, and LRS password already pre-encrypted information. They won’t look like your username or your password. These get repackaged again into further encrypted data. We encrypt the encryptions, and we send that optimized server, or any Learning Locker server, or any Learning Locker type server, let’s say.
Chris Badgett: What about, if we’re sending data over the pipe, what is a LifterLMS competency and activity? These are some types of things that we can communicate to our LRS through the API. What are competencies and activities?
Dennis Hall: Good question. It’d be better probably to start with a learning objective. What is a learning objective? For people who have been developing courses over the years, they understand that learning objectives are statements that define the expected goal of a curriculum, or a module, even, or a course, or a lesson, in terms of demonstrateable skills, or knowledge that will be acquired by the student as a result of the instruction in the lesson, course or module.
Learning objectives are also known as instructional objectives. They can also be known as learning outcomes. In fact, I hear them quite often as learning outcomes more than learning objectives. It seems like a nicer name I think. Another name for them is learning goals. I’ve heard many people call them that. Learning objectives describe what the learner should be able to achieve at the end of this module, for example, and they should be specific. They should be measurable as well. They should be measurable statements written in behavioral terms.
Chris Badgett: What does that mean, behavioral terms?
Dennis Hall: Behavioral terms, an example might be, that is how I was able to identify bacteria, or that sort of thing. Those are learning objectives. Why have I brought that up first? Because the learning objective is one piece of the foundation. The other piece of the foundation is the competency, which will directly relate to the learning objectives. Competency is the capability to apply or use a set of related knowledge, and skills, or abilities. Otherwise known in the industry as KSAs, which you may have heard of. Knowledge, skills, abilities, those create a competency.
Chris Badgett: Because of the geolocator in the phone?
Dennis Hall: That’s right. I went to the top of Mount Everest, and tapped my phone saying I’m here, and when I tapped it it stored an xAPI record, because there was no cell coverage. When I came down off the top of Mount Everest, it connected to the nearest cell tower, connected to my Learning Record Store, and submitted that data. That’s a native function of xAPI.
Dennis Hall: Record stores. That’s something SCORM cannot do, by the way. If you attempt to do that in SCORM, you’ll be dead in the water from the start.
Chris Badgett: Got you. You can send data to your LRS about what people are doing with LifterLMS courses, or lessons, or quiz questions, and these sorts of things, and you can also create competencies that fulfill some kind of learning objective, and pass that data through the API as well.
Dennis Hall: That is what we do. There’s been a couple of fallbacks to xAPI. THey’re not bad things. It’s just that they’re things that surprise people. They’re not used to it. xAPI can send a lot of data. It can fill up your database pretty fast if you let it. What’s important to understand is that you get a lot more data than you did with SCORM. Secondly, xAPI data, out-of-box, xAPI data can look a little bit cryptic. You’re going to see Dennis Hall experienced this eLearning. It’s like okay, well the whole idea behind xAPI is to say the actor did something. Dennis Hall experienced this eLearning. Dennis Hall being the actor, the verb being experienced, this eLearning being the object that he experienced. Sorry, talking about myself in third party. I’ve lost it.
What I’ve done, Dennis Hall experienced this eLearning, it’s just a bit too, let’s call it out there. What would you say if you had completed a specific learning objective in an eLearning course, wouldn’t you rather see something like Chris completed this eLearning, or module one, or Chris was able to complete question three, or this sort of thing. What I’ve done in LifterLMS xAPI is I’ve taken the competency, and assigned it to that learning object, so now when you run a report in the Experience API reports, raw statements we call them, will come out, and by default the ADL verb will be sitting behind the learning object, so when you click on the learning object in a report it’s going to come back and say here’s the ADL verb per course.
What I’ve done is I’ve remapped the information, so that in LifterLMS xAPI, what happens is if you click on the name of the learning object that’s being reported, it will actually map you or redirect you to the competency that you’ve created in LifterLMS. Now you can take a competency, and you can assign it specifically to the start page of a LifterLMS course, to lesson one of a LifterLMS course, to quiz one of a LifterLMS course, or even to question one of a LifterLMS course. Whenever people read a report, they’re going to have a clickable item, and that clickable item will be the name of what the person experienced, the learning object the person experienced.
When they click on the name in a report, it’s going to come up and say, here’s the competency that was associated with it. Otherwise, the only other alternative is to send you off to the ADL server, and you’re going to see what is the definition of course. That’s one of the drawbacks so far, but it’s not a drawback with the specification. It’s simply a drawback with the application of the specification. What I’ve done in LifterLMS as far as I’m concerned is best practice where I’ve directly linked the competency to the learning object.
Chris Badgett: Nice job solving that problem.
Dennis Hall: Yeah, I’ve been, by the way, also given you the ability to rename that experienced item. You can rename it to whatever you want. Dennis Hall jumped off a cliff. Done. As long as you have a learning object called a cliff, and you have a competency saying well I guess he died, whatever the case be. You can put whatever you want, and you can put it in any language you want.
That’s another key thing is the Experience API out-of-box, although the verbs are very flexible, if you use it directly out-of-box you have to assign a language to it. As you know, in WordPress you can have multi-lingual sites, so in that particular case you can actually create a new course in LifterLMS, and you can map new lessons to it in the different languages, and use those same competencies in different languages, because WordPress can serve competencies separately in different languages.
Dennis Hall: The course itself may have to, the lesson may have to get redone, but the competency can be translated in WordPress, dynamically.
Chris Badgett: That’s awesome. We’re still not even half way through it.
Chris Badgett: That’s amazing, and LifterLMS xAPI does a lot. It opens up the door to a lot of avenues. That reporting piece, and the customized view of that is really incredible, and matters to people who want really advanced reporting, and a focus on this type of competency-based learning.
Dennis Hall: That’s it. Competency-based learning is evidentiary learning. That’s what’s really most important about it. If you want your course to be meaningful, and you want to be able to prove that it’s meaningful, set this up, use competencies. They become the documentation to prove the skills, the knowledge, and the ability of the user.
Chris Badgett: I like that.
Dennis Hall: Another thing, earlier I had forgotten my train of thought. I did want to make mention, one of the specifications with xAPI is that the learner owns their data. What’s important to understand about this is that everything I do in a LifterLMS Learning Management System, the administrator at the moment of the system has to be able to export my information out, specifically. Now, it’s all fine that you see Dennis Hall experienced eLearning. That’s not very useful information to a human resources person receiving your XML file, which by the way would be filled with hyperlinks back to the original content, and back to the competency.
LifterLMS is now the only Learning Management System that’s WordPress based that supports CASS competency analysis. What’s really important to understand about this is that when Dennis Hall, or Chris, basically quit their job and say, hey HR give me my learning records, when HR gives them their learning records in an Excel spreadsheet, now Dennis Hall takes this to the new company and basically says, oh you want to know what my competencies are. Here they are, in my Excel spreadsheet. Please import them into your system, so that my human resources information can be updated properly.
Chris Badgett: So their records are portable.
Dennis Hall: That’s correct. In fact, with xAPI that’s the rule, not an option. It’s the rule. The owner owns their data. Now, in this particular version of LifterLMS xAPI I don’t have a front-end data export, so the learner won’t be able to get their own data, so for now they’ll have to ask the administrator. However, I do have a number of planned releases in the future with LifterLMS xAPI, and one of those planned releases are to have front-end shortcodes so the user can get their own data, leaderboards, this sort of thing.
Chris Badgett: That’s awesome. LifterLMS xAPI also introduces the ability to work with H5P content. I’ve been aware of H5P for a couple years now, and my understanding of it is it’s an open source project where you can create these incredibly rich web based, interactive things. It’s very visual. The place I’m drawn to when I think about it is using it for some quizzing, like with really advanced graphics, and non-linear learning situations where you can end up in all kinds of different places. Tell us more about what H5P is in your experience, and how it works with LifterLMS xAPI.
Dennis Hall: Yeah, not a problem. First off, H5P is a non-SCORM, I would put. It is xAPI only, or nothing. You can already use H5P content in LifterLMS, but it’s not going to report anything if you use the content alone. However, what I’ve done with LifterLMS xAPI is I’ve packed, and even preconfigured your H5P xAPI connector in my plugin. When you install my plugin, it’s an optional install of their H5P plugin, but when you install their H5P plugin from mine, I actually preconfigure everything for you so you have nothing to setup. You just install it and you’re done. It works out of the box. Beyond that, as well, I also have a lightbox plugin which I’ll explain later.
The H5P content itself, what H5P Content is, and that’s the name of their plugin, by the way H5P Content. Pretty straightforward. I don’t package that plugin with mine. I only package the connector, and you can actually just do a search in the WordPress plugins directory. In your plugins page you would simply click add new. You’d be immediately taken to the WordPress repository or plugins. You would do a search for H5P. In searching for it the first thing that comes up is H5P Content. You’ll install it. Once you install it you then have a bunch of libraries available, and the libraries, there’s about somewhere in the area of 50 or 60 different libraries that they carry.
Each library is a type of interaction that you can do with H5P products. The content type products that they present you with, there’s tons. There’s image, do hotspots over images, do drag and drop over images, do hotspots over videos, do drag and drop over videos. Basically you can get the idea that the object would be the video, or the image, and the interaction they provide you might be drag and drop, hotspot, multiple choice, pick one, you name it. There’s just tons and tons of different ones. They create very rich interactive content to be used in a LifterLMS course, lesson, quiz, or question, just like my LifterLMS xAPI connects to.
In doing this, when you use LifterLMS xAPI, once you create that content and those interactions using H5P, which is a very simple, intuitive interface, by the way. Actually I drool over it. It’s a beautiful, beautiful product. Once you’ve created that, and it’s in your course, lesson, quiz, or question, it will automatically just start communicating xAPI. With my LifterLMS xAPI, at that point you have a couple of choices. You can turn on or off every single course, lesson, quiz, or question in LifterLMS. You can turn off the xAPI reporting.
Let’s say that I have an H5P content sitting on my course page of LifterLMS for course one, I may only want to report the H5P content, so at that point I simply would turn off the xAPI for the course, but the H5P content will still travel.
Dennis Hall: It will still report. Same thing can happen later on, I’ll explain, with eLearning. Let’s say lesson one in the course has a bunch of learning objectives, and such, and it has no other content. It’s pure LifterLMS content. I may want to turn on xAPI reporting for that, and assign a competency to that as well.
Chris Badgett: You can mix and match.
Dennis Hall: Absolutely. In lesson one, for example, I can turn on xAPI reporting for that, assign a competency to it, as well as apply my own custom verb within the content of lesson one. I can embed an H5P interaction, and I can embed as many eLearning interactions as I wish.
Chris Badgett: That’s awesome. Let’s get into eLearning a little bit, because I think this is kind of confusing for some people. LifterLMS, without all of this, you’re working with lessons, which are kind of like WordPress posts. You can put videos in there. You can embed Vimeo videos, Wistia videos, Youtube videos, you can put text, images, whatever you can think of that you can put on a regular webpage, you can put in a LifterLMS lesson.
Chris Badgett: In the eLearning community, there are some different types of tools out there, and one of the things that I find, just as being a member of the community is there are these people called instructional designers out there, and a lot of them, they’re coming to WordPress, and LifterLMS later, they’re more focused on building eLearning with authoring tools like Articulate, Captive, Lectora, these tools.
What you’ve done is, if somebody builds an eLearning module, which we’ll go over in a little bit, and they want to stick that in a course, or stick that in a lesson, or stick that in a quiz, you can also mix and match with that as well, or have that be the entire course, is this other content, and it’s going to talk through the xAPI. Can you give us a lightening fast tour Dennis of eLearning authoring tools, and how they integrate with LifterLMS xAPI?
Dennis Hall: Yes, the key being xAPI. That is the point of integration. With LifterLMS what I’ve done is I’ve created a form that allows you to either upload your xAPI published, or your Tin Can published eLearning project.
Chris Badgett: You can upload that directly to your WordPress website.
Dennis Hall: That’s correct. You can upload it directly to your WordPress website, or if you wish to run it off a different web server, you can link to it from your website. There’s advantages to doing it either way. For example, if your LifterLMS website, if you want to keep it light and airy, so light and speedy, and fast, and quick for everyone, that’s one of the reasons why I offshore the database, so to speak. I don’t mean offshore literally. I mane that’s why the database isn’t sitting in LifterLMS.
Chris Badgett: The LRS is somewhere else.
Dennis Hall: That’s right. That’s because if we start piling 9,000 records a day into LifterLMS, you’re going to need a bigger server real soon. It is best practice to use a surrogate server for that. I create that service. eLearning, in LifterLMS, excuse me, you have the ability to turn on or turn off reporting of anything that you want granularly. In eLearning you don’t have that choice, unfortunately. What’s going to happen is, as an example in Storyline, hitting page one of your course, it’s going to send two records. The first record saying the course was entered. The second record saying the start page was entered.
You’re going to get a ton of data whether you want it or not, and unfortunately we don’t have control over the way those companies have developed their product. Not without becoming a programmer, and going in and programmatically adding or removing things. We don’t want that, do we? What we want is we want a person to simply upload their course and get it done, the end. In Lifter I give you the granular ability, but in those courses we can’t do that. What you can do is, you can at least turn off your Lifter reporting for that particular course, lesson, quiz, or question that you’ve uploaded a eLearning course into.
The operation of uploading a course is one thing. What’s really cool about the way I’ve done this, by the way, I do smart disk management for the courses. If you upload a course called my favorite course one into LifterLMS, I put it in your uploads folder, in a specific folder called courses, and I always watch that folder. If you later come and update my favorite course one, and call it my favorite course two, what’s going to happen is when you go in to update the course, I’m going to remove all the files, and the folder from my favorite course one, and replace that for my favorite course two, because you’re updating. If you add a new one you can call the new one my favorite course one again if you want.
Then when you delete a course, I delete the course for you as well. You have nothing to do behind the scenes. Everything is done within the update panel, or the update forum. In that forum as well, again future versions, I am going to allow you to remap your course, each course item to a competency in LifterLMS, because today, again, based after the same problem I explained earlier, where as soon as you click the name of that item that was int he course, it’s going to send you off to an ADL page saying a page was viewed. Dennis experienced a page, and it’ll give you this definition of what a page is. Again, I’m going to allow people to remap their uploaded courses to valid competencies within Lifter.
Chris Badgett: That’s awesome. For the uninitiated out there, who hasn’t yet used, Articulate, Storyline, Captivate, Lectora, these types of tools, what can you do with them that you can’t necessarily do like on a LifterLMS lesson WordPress page where you might insert video and text, and audio embeds, and thing like that? What can you do with these tools?
Dennis Hall: Good question. Sorry, I should have respected that question earlier. I did not. Basically, the various Articulate products that are available, the Captivate, and Lectora products that are available today, for the most part what they’re giving you is everyone’s giving you a fairly standardized xAPI output. What they’re doing for you as a courseware developer, they allow you to do things like import PowerPoint, which everybody actually really hates in the industry, but PowerPoint is an important tool to develop with speed the subject matter expert.
However, they allow you to create rich, interactive content, rich interactive media content within a eLearning environment, or a online course environment. Once you’ve created the product that you want, which is your eLearning course, you then publish that from that product as a Tin Can, or xAPI package. Those products then zip that up for you, and put it into a proper format for you to upload into your Learning Management System.
Chris Badgett: That’s awesome. You told me about, and you showed me a feature that was really incredible, that I just want to make sure that the listeners and the viewers here understand. Let’s say I’m building my course platform, and I actually want to bring in courses from somewhere else.
Dennis Hall: That’s a good question.
Chris Badgett: Maybe I work out a licensing deal with them.
Chris Badgett: I’m paying a licensing fee to. Can you tell me how that works, and what that’s all about?
Dennis Hall: Sure, yeah. I did briefly mention that earlier when I talked about uploading courses to a different server. Essentially, in that same upload forum that I was just describing, when you create a new course, or you update a course, let’s say that you had a course locally on your server, you can actually delete that course, and in that same forum you can link the same course title to a course out on a remote server. There’s only two pieces of information that you need to be able to link a remote course.
Information number one is what is the URL to the start page of that course. It’s going to be out on http://www.domain.com/path/two/index.html, for example. That might be the start file of your course that somebody else is allowing you to use, or rent, or whatever it be. After that they need to give you another piece of information, and that is what is the starting activity ID, or the starting ADL activity URL for that. It might be http://adl.net/path/twocourse. Those are the only two pieces of information you need to link to a remote course. Beyond that you’ll have a title that you’ll put in. That title will be reflected in LifterLMS.
After that you’re done. You now have all the foundations set for running local and remote courses such as the old AICC model, that allow you to do this, to use those courses. To use the courses in LifterLMS xAPI, that’s a separate function. What I’ve done is I’ve built in the LifterLMS editor, the course, lesson, quiz, and question editor that is in LifterLMS. By the way, as well as the membership, and non-membership editor, it also has this. No, disregard. It does not. No. It’s only courses, lessons, quizzes, and questions.
In your editor I’ve added a new button to your editor’s button bar, a button called xAPI with square brackets around it. The square brackets denote a shortcode in WordPress. I’ve created a visual button builder that allows you to use images for your buttons. You can even use a combination of image backgrounds, and have borders and such, and reshape the images to circles, or rounded rectangles, or whatever you wish, or you can just color your buttons, and make them look exactly like the Lifter buttons if you wish, as well.
No matter how you do it, you have the ability to create a custom button to launch your eLearning course from a course, lesson, quiz, or question. You would do that by selecting in a dropdown menu the eLearning course title that you’ve given your course. Then you would configure your button, you could click insert, and boom you’ve got a button in your course to launch the eLearning. That brings up that other plugin, the lightbox plugin.
By default, and this is not just with my plugin, it’s with any scenario in WordPress. If you have an external HTML file that you’re pointing to, like in WordPress, if you click on a link it might open up and replace your website, or it might open up in a new window or tab. In Lifter, the way I’ve done it with these if you use the lightbox plugin, it will open up your eLearning course in a lightbox. Now a lightbox is that kind of grey shadowy, that grey border around an HTML cage that you see. Basically you would interact with your course within that lightbox plugin, or within that lightbox.
If you are going to use eLearning, I highly recommend using activating the lightbox plugin that I supply as well, and that is simply so that if you don’t activate it your courses will open up in a new tab or window automatically. The drawback of doing that is that the users will no longer be focused on the content that they launched that product from. If you’ve got, let’s say lesson one has some really important information. Then it tells you watch this tutorial, because it doesn’t have to be a course, right? It can be a tutorial that’s done in Storyline or something, or a video, or whatever, so watch this tutorial about what you just read, or watch this demonstration.
Then you watch that, and you close it, and then you continue reading, and it says, here’s another demonstration on another aspect of what I’ve read as well. You have multiple eLearning inside that content, and that will all open up in lightboxes, and keep you in the content so when you close the lightbox you haven’t lost your place.
Chris Badgett: Fade the background, and give them what they want, and then when that’s done they’re back where they started.
Dennis Hall: No, they’re back to where they left off.
Chris Badgett: Where they left off, yeah. Just to reiterate your point, because I think it’s a really important one, Dennis, is that when we use this word eLearning, or course, that we’re making with these other authoring tools, those don’t necessarily have to be complete end-to-end courses. They could be just one lesson in your LifterLMS course, or they could even be part of a lesson, like you said.
Chris Badgett: You might have a video on your LifterLMS lessons and text, and then you say click this button, and now you’re bringing in this eLearning content that you have either hosted locally or elsewhere, or whatever. It’s amazing. What you’ve done is you’ve opened up the door to craft really intricate learning journeys.
Chris Badgett: With the best tools available out there.
Dennis Hall: Yes. If I may add, by the way, you’ve said something really, really important there. You can break up your eLearning courses. It’s not uncommon, actually, to have an eLearning module that focuses on one learning objective, and has one competency related. Which, by the way, if you do it that way in LifterLMS xAPI, I give you the ability already to remap that default adl.net/path/two/course to one of your competencies already. If you do a single learning objective eLearning, so if you upload or link a single learning objective eLearning, you can already map that eLearning to a competency built in LifterLMS.
Chris Badgett: That’s really amazing.
Dennis Hall: Yeah, so you can already do it. What I plan in the future is that if you have multiple modules, or multiple pages within the eLearning that are reporting xAPI data, in the future you’ll be able to remap all of them to competencies. Because again, the biggest problem the eLearning vendors have is that they don’t map you to anything that actually is meaningful.
Chris Badgett: That’s awesome. Nice job. You’ve solved so many problems, and provided so many integrations, and additional features. It’s really incredible. I know, like when I was first learning about how all this stuff works I had a lot of questions. If you’re listening to this, or you’re watching this, and you want to reach out directly with a question, just go to LifterLMS.com/contact, and we’ll get you your answer there. Also, if you invest in the product, we’re hosting this product that Dennis has made, and the LifterLMS store, and it uses our support system, so if you are using LifterLMS, and it sounds like LifterLMS xAPI is a fit for you, and what you’re trying to do, or you want to try it out and see what you can make with it, we can support you in all the normal ways that you’re used to being supported through the LifterLMS systems, and that sort of thing.
We’re really honored, Dennis, to have you, and LifterLMS xAPI in our store, your decades of experience, and all this knowledge, and seeing the journey of eLearning, and being a developer, and being an instructional designer yourself, and doing client work, you have a really unique insight into creating really effecting Learning Management Systems. Again, we’re honored to have you as part of the LifterLMS community, and thank you so much for coming on the show.
Dennis Hall: Thanks a lot, Chris. Honestly, back at you on that as well. The one thing I’ve found with your team is that you guys are awesome to work with. I really, really appreciate the support that you’ve given me, but as well the support that I see you give to your community. You guys love your community and it shows. It shows big time.
Chris Badgett: I appreciate that. Thank you very much. Dennis Hall, ladies and gentlemen, Learning Templates, and then come find out more about LifterLMS xAPI at LifterLMS.com. | 2019-04-21T04:17:27Z | https://podcast.lifterlms.com/tin-can-api-elearning-authoring-tools-lrs-h5p-dennis-halls-lifterlms-xapi/ |
The human noroviruses are a highly diverse group of viruses with a single-stranded RNA genome encoding a single major structural protein (VP1), which has a hypervariable domain (P2 domain) as the most exposed part of the virion. The noroviruses are classified on the basis of nucleotide sequence diversity in the VP1-encoding ORF2 gene, which divides the majority of human noroviruses into two genogroups (GI and GII). GII-4 noroviruses are the major aetiological agent of outbreaks of gastroenteritis around the world. During a winter season the diversity among the GII-4 noroviruses has been shown to fluctuate, driving the appearance of new virus variants in the population. We have previously shown that sequence data and in silico modelling experiments suggest there are two surface-exposed sites (site A and site B) in the hypervariable P2 domain. We predict these sites may form a functional variant-specific epitope that evolves under selective pressure from the host immune response and gives rise to antibody escape mutants.
In this paper, we describe the construction of recombinant baculoviruses to express VLPs representing one pre-epidemic and one epidemic variant of GII-4 noroviruses, and the production of monoclonal antibodies against them. We use these novel reagents to provide evidence that site A and site B form a conformational, variant-specific, surface-exposed site on the GII-4 norovirus capsid that is involved in antibody binding.
As predicted by our earlier study, significant amino acid changes at site A and site B give rise to GII-4 norovirus epidemic variants that are antibody escape mutants.
The ability of RNA viruses to maintain plasticity as well as functionality in their genome has been well documented as a survival mechanism, allowing RNA viruses to adapt to changes in their environment, maintaining fitness in the viral population . Mutation in vivo can have a number of effects including increasing the virulence of a virus or acquisition of antiviral resistance [3, 4]. An important consequence of the accumulation of point mutations in viral structural proteins is the rise of antibody escape mutants [5–7]. RNA viruses generate this diversity in their genome via the lack of fidelity of the viral RNA-dependent RNA polymerase (RdRp), and the mutants with most increased fitness are selected from the progeny by environmental factors such as the host immune response.
Norovirus is a genus in the Caliciviridae family, that includes pathogens of humans and animals . Human noroviruses are a highly diverse group of viruses with a single-stranded RNA genome made up of three open reading frames (ORFs), . Noroviruses are classified on the basis of nucleotide sequence diversity in the ORF2 gene, which divides the majority of human noroviruses into two genogroups (GI and GII) and approximately 19 genetic clusters within them . The genogroup II-genotype 4 (GII-4) noroviruses have been the dominant circulating strain since the early 1990s , and in 2002 a variant GII-4 norovirus emerged that caused unusually high numbers of outbreaks of gastroenteritis in the summer of 2002, and epidemic gastroenteritis around the world in the winter of 2002/2003 . This variant possessed a 3 nucleotide (nt) insertion in the hypervariable P2 domain of the VP1 protein at position 6265. This epidemiological pattern was repeated in 2006 when another novel GII-4 norovirus variant emerged, however, no insertions or deletions were observed in the genome of this virus (J Gray, personal communication).
Noroviruses are the major aetiological agent of outbreaks of gastroenteritis in the community and in semi-closed settings around the world. During a winter season (September-March), the diversity among the GII-4 noroviruses has been shown to fluctuate, driving the appearance of new virus variants in the population . Studies of the genetic diversity of these viruses have shown that new GII-4 variants appear periodically in the population following evolution of the viruses along neutral networks, and that accumulation of mutations in the hypervariable P2 domain results in antibody escape mutant viruses which go on to cause epidemic gastroenteritis [14–16].
Computer modelling experiments have previously suggested that there are two 3-amino acid motifs (site A and site B) in the hypervariable P2 domain that define the appearance of epidemiologically significant GII-4 variant norovirus strains . Based on these observations, we predicted that these two motifs may be a functional variant-specific epitope that evolves under selective pressure from the host immune response and give rise to antibody escape mutants.
Due to the lack of a tissue culture system and suitable animal models in which to study noroviruses, we synthesised recombinant virus-like particles (VLPs) using a baculovirus expression system based on previously described methods [18, 19]. These VLPs were used to generate monoclonal antibodies (mAbs) in order to test the functionality of site A and site B. We use these novel reagents to provide evidence that site A and site B form a conformational, variant-specific, surface-exposed site on the GII-4 norovirus capsid that is involved in antibody binding, and that as predicted, significant amino acid changes at site A and site B give rise to GII-4 norovirus epidemic variants that represent antibody escape mutants.
Wild-type VLPs were purified from recombinant baculovirus-infected Sf9 cells and were analysed by EM (Figure 1(d)). Negative staining of preparations showed intact VLPs had formed for both strains, and no significant morphological variation was observed within the VLP preparations (Figure 1(d)). Particles were 30-35 nm in diameter, and the surface structure of the particles could be visualised at high magnification (Figure 1(d)). The VLPs were morphologically indistinguishable from native norovirus virions found in clinical specimens, but >10-fold more VLPs were observed per viewing field than are typically observed in clinical specimens.
GII-4 Norovirus Major Sturctural Protein. (a) Schematic representing the norovirus VP1 protein, highlighting the hypervariable P2 domain and putative epitopes Site A and Site B (as described in Allen et al., 2008). (b) Table showing amino acid variation at Site A and Site B in the period 1999-2006, as previously described in (Allen et al., 2008). Strains used in the work described here are highlighted. (c) Model of the norovirus VP1 P domain showing the location of Site A and Site B in the three-dimensional protein (structure from Cao et al., 2007). (d) Electron micrograph showing GII-4v2 VLPs purified from Sf 9 cells, the morphology of which is representative for all VLPs described here. Magnification is 105 000× and VLPs are stained with 1.5% phosphotungstic acid. Scale bar is 100 nm.
The two wild-type expressing plasmid constructs pRN-GII4v0 and pRN-GII4v2 were modified by PCR site directed mutagenesis so that the ORF2 encoded a VP1 protein that was identical to either the GII-4v0 or GII-4v2 parental protein except at either of the putative epitope positions 296-298 (site A) or positions 393-395 (site B), where the protein would be of the heterologous (non-parental) strain (Figure 2). Successful mutagenesis at the target site without alteration of the remaining norovirus insert was confirmed through sequence analysis (data not shown).
Schematic representation of norovirus protein coding region of pRN16 constructs expressing wild-type and hybrid VLPs. Following construction of plasmids pRN-GII4v0 and pRN-GII4v2 expressing wild-type GII-4v0 and GII-4v2 VLPs, respectively, these plasmid constructs were modified by site directed mutagenesis at either putative epitope site A (nt 886-891, aa 296-298), or putative epitope site B (nt 1176-1182, aa 383-395) to generate plasmid constructs that expressed hybrid VLPs. The schematic shows a representation of the region of the plasmid encoding norovirus structural proteins (3'UTR and remainder of plasmid not shown for clarity). PCR mutagenesis was used to generate plasmid constructs that encoded an ORF2 identical to either GII-4v0 or GII-4v2, except at either site A or site B, which was modified to be as equivalent to that position in the heterologous variant. The resulting expressed VP1 protein was a hybrid of the two variants, and so the VLP formed from the hybrid VP1 was antigenically hybrid. Plasmid construct names are given on the left, whilst the hybrid VLPs are represented with VLP names next to them on the right. All GII-4v0 derived regions are shown in solid black, all GII-4v2 derived regions are shown in hatched lines.
All four hybrid VLP-expressing recombinant baculoviruses efficiently expressed VP1 (data not shown). Further, EM analysis of GII4v0/A2B0, GII4v0/A0B2 and GII4v2/A2B0 VLPs formed by mutant recombinant VP1 proteins were morphologically indistinguishable from wild-type VLPs (data not shown). However, the hybrid construct pRN-GII4v2/A0B2 did not form VLPs, despite expressing VP1 (data not shown), therefore the hybrid VLP GII-4v2/A0B2 was not available for subsequent work.
In addition to the hybrid VLPs described above, a reverse mutant construct, pRN-GII4v0/A0B0R, was also generated by back mutation of the hybrid construct pRN-GII4v0/A0B2 by site-directed mutagenesis (Figure 2). This reverted the amino acid sequence at the site B from STA (GII-4v2) back to N~N (GII-4v0). This plasmid was sequenced to confirm the mutation at the target site had taken place, and that no changes had taken place in the rest of the insert (data not shown). The plasmid was used as described to produce recombinant baculoviruses and produce the VLP GII-4v0/A0B0R.
Mice were inoculated with either GII-4v0 VLPs or GII-4v2 VLPs, and five monoclonal antibodies were fully characterised for their isotype, titre and binding specificity (Table 1). Test bleeds from both GII-4v0 and GII-4v2 inoculated mice prior to fusion showed that only a low level of cross-reactivity with the heterologous antigen by ELISA (data not shown).
1Titres were determined by serial dilution between 1:10 and 1:10 000 000 in an EIA. Titres were taken as the reciprocal of the last dilution to give an optical density >0.5 at 450 nm.
Three anti--GII-4v0 mAbs (mAbGII4v0.5, mAbGII4v0.8, mAbGII4v0.10) and two anti-GII-4v2 mAbs (mAbGII4v2.5, mAbGII4v2.6) were characterised for reactivity, isotype and titre. The ability of the five mAbs to recognise their respective homologous antigen that had been chemically denatured was also assessed by ELISA.
Urea treatment of the homologous antigen significantly reduced recognition of the epitope by all of the monoclonal antibodies (Table 1), and urea treatment of the heterologous antigen did not confer recognition (data not shown).
Each of the three anti-GII-4v0 mAbs displayed a slightly different binding pattern, although the data suggested that all three mAbs recognised an epitope formed or influenced by both site A and site B (Figure 3(a)).
Average percent reduction in binding of (a) anti-GII-4v0 and (b) anti-GII-4v2 mAbs to wild-type and mutant VLPs in a cross adsorption ELISA. As described in the Materials and Methods, each mAb was pre-incubated in a blocking step with the antigen indicated on the x-axis, before being transferred to a microtitre plate coated with antigen homologous to the mAbs being tested. Percent reduction in binding was then calculated using a PBS control. Cross absorption assays were repeated 3 times independently and the average data is presented here with bars showing the standard error of the mean. Cartoons representing the antigenic structure of the antigen (as described in Figure 2) are shown above the bars (with corresponding labels below the bars). All mAbs were used at 1:10 000 dilution, except mAbGII4v0.5, which was used at 1:1000.
More than 75% reduction in binding of mAbGII4v0.5 to its homologous antigen (GII-4v0) was observed following blocking with the homologous antigen, whereas no reduction in binding was observed following incubation with the heterologous antigen (GII-4v2). Following replacement of GII-4v0 site A with the heterologous GII-4v2 site A, VLP GII-4v0/A2B0 failed to block any of the binding of mAbGII4v0.5 to its homologous antigen, demonstrating that site A is essential for mAb recognition of the antigen. When the GII-4v0 site B was replaced with the GII-4v2 site B, VLP GII-4v0/A0B2, reduced binding to the GII-4v0 antigen by ~19% indicating that when the homologous site A was intact, partial mAb recognition occurred, but without the corresponding homologous site B, mAb recognition was impaired. Similarly, substitution of the heterologous site B in the GII-4v2 with the GII-4v0 site B (VLP GII-4v2/A2B0) was not sufficient for recognition of this hybrid VLP by mAbGII4v0.5. Importantly, restoring site B to the VLP GII-4v0/A0B2 was sufficient to restore wild-type levels of binding, to >70% reduction.
A 25% reduction in binding was observed following blocking of mAbGII4v0.8 with the homologous GII-4v0 VLP, compared to only 5% reduction in binding following blocking with the heterologous GII-4v2 VLP. Blocking with any one of the three hybrid VLPs resulted in ≤10% reduction in binding; the highest level of reduction following blocking among these VLPs was with the GII-4v2/A2B0 VLP which displays site B from the homologous (GII-4v0) antigen, thereby indicating that mAbGII4v0.8 was able to partially recognise site B, but that complete recognition required the homologous site A to be displayed concurrently. Blocking with the reverse mutant VLP GII-4/A0B0Rrestored binding reduction to 27%, comparable to blocking levels by wild-type GII-4v0. This further supports the observation that both homologous site A and site B must be displayed simultaneously on the virus surface for mAb recognition.
Approximately 68% of mAbGII4v0.10 binding was reduced following blocking by GII4v0 VLP, and only one tenth of this reduction in binding observed following blocking with GII-4v2 VLP. Blocking with any one of the three hybrid VLPs resulted in ≤10% reduction in binding; again the highest level of reduction following blocking with a hybrid VLP was with the GII-4v2/A2B0 VLP which displays site B from the homologous (GII-4v0) antigen, suggesting a role for site B in mAb recognition. Blocking with the reverse mutant VLP GII-4/A0B0Rrestored binding reduction to levels comparable to blocking levels by wild-type GII-4v0, of approximately 70% reduction. This confirmed that both homologous site A and site B must be present for mAb recognition of the antigen.
Both anti-GII-4v2 mAbs behaved the same in competition immunoassays (Figure 3(b)). Blocking of both mAbs with the homologous GII-4v2 antigen resulted in >85% reduction in binding in both mAbs, and blocking with the heterologous GII-4v0 antigen resulted in <2.5% reduction in both mAbs. When blocking was performed using one of the two GII-4v0-derived hybrid VLPs (GII-4v0/A2B0, or, GII-4v0/A0B2), or the reverse mutant VLP, <7.5% reduction in binding was observed in both anti-GII-4v2 mAbs. In contrast, blocking with the hybrid VLP GII-4v2/A2B0 (which is all GII-4v2 except at site B) produced reduction in binding equivalent to that observed with the GII-4v2 antigen of >80% reduction. These data indicated that both the anti-GII-4v2 mAbs recognised an epitope that is variant specific, but is not formed of either site A or site B, alone or in combination.
Efforts to identify sites on the norovirus capsid involved in antibody binding have been hampered by the lack of a cell culture system for human noroviruses , and therefore epitope mapping studies using infectious virus have not been possible. Here we have used VLPs synthesised in the baculovirus expression system (BES) as a surrogate for infectious virus in a mutagenesis study to identify sites on the GII-4 norovirus capsid important in antibody recognition. Previous work has shown that when VLPs expressed in the BES were compared with VLPs expressed in a mammalian recombinant protein expression system, no discernable differences in the biochemistry or structure of the two differently expressed VLPs were observed .
The data presented here show the expression of high yields of VLPs representing two norovirus strains, one from each of the previously identified neutral networks: (i) pre-2002 epidemic, and (ii) 2002 epidemic-200 . These VLPs were used to immunize mice to produce monoclonal antibodies against these strains.
Both the anti-GII-4v0 and anti-GII-4v2 polyclonal antibody responses were generally specific for the homologous antigen, but a low level of cross-reactivity was observed (data not shown). Cross-reactivity is expected in polyclonal serum because the different antibodies present recognise a range of different epitopes, and have different affinities; therefore polyclonal antibodies will, at least in part, recognise a heterologous antigen. However, following sub-cloning by limiting dilution, cross-reactivity was lost as mAbs were isolated. This confirmed the specificity of these antibodies for a single GII-4 norovirus variant strain through recognition of an epitope that was unique to that variant norovirus and offered no cross-reactivity between other GII-4 norovirus variants.
The absence of any cross-reactivity in the EIA between the mAbs and their heterologous antigen also showed that the mAbs were not recognising epitopes from baculovirus proteins or from Sf9 cell-derived proteins. Both antigen preparations were made in the same protein expression system and purified in the same way. Therefore any baculovirus or cell-derived proteins that co-purified with the VLPs were present in both the GII-4v0 and the GII-4v2 VLP preparations used in the immunization of the mice and in the preparation used as antigen in the EIA. Thus any mAb reacting to a baculovirus or cell-derived protein would react equally with both antigen preparations. This is not the case, with all mAbs displaying specificity for the homologous antigen preparation, thereby demonstrating that all five mAbs were raised against norovirus proteins and not baculovirus or insect cell proteins.
Urea treatment of both GII-4v0 and GII-4v2 VLPs revealed the three anti-GII-4v0 mAbs recognised a conformational epitope, whereas the anti-GII-4v2 mAbs recognised a partially conformational epitope (Table 1). Treatment of a macromolecular protein with a chaotropic agent such as 8 M urea will denature the three-dimensional structure of the protein by disrupting the non-covalent intra-molecular interactions such as hydrogen bonding and van der Waals forces. If the mAbs recognised a linear epitope, binding would remain unaffected following chaotropic treatment. However, the epitope recognised by the mAbs must be conformational, as the level of mAb binding to the antigen was reduced following denaturing treatment of the antigen. Demonstrating that the mAbs recognised conformational epitopes was important because site A and site B identified by sequence analysis were shown to be surface exposed loop structures on the virus surface separated by 100 amino acid residues in the linear protein, but in close proximity in the three-dimensional protein (Figure 1(a) &1(c)). Therefore, it was expected that any antibodies raised against these sites would, at least in part, recognise the conformation of the surface structure at these positions, which is why it was important that VLPs were used as the immunogen rather than linear VP1 protein. This was corroborated through the failure to detect a VP1 band in western blots (data not shown).
Site-directed mutagenesis was used to modify the norovirus ORF2 gene in the plasmids pRN-GII4v0 and pRN-GII4v2 at putative epitopes site A (aa296-298) or site B (aa393-395). The aim was to generate both GII-4v0 and GII-4v2 hybrid VLPs which displayed either an heterologous site A or site B. It was predicted that the changes engineered at site A or site B would differently affect the ability of mAbs to recognise the antigen, and so demonstrate the roles of site A and site B as surface-exposed sites involved in antibody binding.
The three hybrid VLPs that were isolated were found to be morphologically indistinguishable from wild-type VLPs as determined by EM, demonstrating that the mutagenesis had no adverse effect on the structural integrity of the VLP. The exception was the hybrid VLP expressed from the recombinant baculovirus BAC-GIIv2/A0B2, which despite expressing VP1 to high levels, did not form VLPs. As no coding errors were observed in the ORF2 gene, and a high level of protein expression was observed by SDS-PAGE, the lack of VLP formation was not due to truncation of the protein, failure of the baculovirus and expression vector to undergo recombination, or failure of the recombinant baculovirus to express the protein. Therefore, it seems most likely that the mutations engineered in the P2 domain were structurally unfavourable and that they either perturb the correct conformation of the protein or interfered with the subunit-subunit interactions, thus precluding particle formation.
It was predicted that the mAbs raised against the GII-4v0 and the GII-4v2 antigens would recognise a site formed of both site A and site B, or would recognise a site formed of one of these sites alone. This was tested in a cross absorption EIA using wild-type VLPs, hybrid VLPs, the reverse mutant VLP and the five mAbs.
All three anti-GII-4v0 mAbs recognised an antigenic region formed or influenced directly by both site A and site B, as replacement of either of these sites abolished recognition of the GII-4v0 antigen by the mAbs. This observation was supported by the data from the reverse mutant VLP. The GII-4v0/A0B2 VLP failed to block binding of the anti-GII-4v0 mAbs to the GII-4v0 antigen, but reverse mutation of site B in this antigen back to GII-4v0 concurrently restored the ability of the antigen to block mAb binding. The conclusion that the anti-GII-4v0 mAbs require both site A and site B for antibody binding reflects predictions made using bioinformatics data . It was noted that epidemiologically significant variant strains appeared in the population following a cluster transition event in which biochemically significant amino acid substitutions (or insertions/deletions) were observed at site A and site B concurrently which itself suggested that both site A and site B are required for defining epidemiologically important strains and allowing GII-4 noroviruses to evade immunity existing in the population.
The back mutation of the hybrid GII-4v0/A0B2 at site B created the VLP GII-4v0/A0B0Rthat had twice undergone site-directed mutagenesis at site B, so that it was structurally and antigenically identical to the wild-type GII-4v0 antigen. This experiment confirmed: (i) that the site-directed mutagenesis process had no effect on the integrity of the antigenic properties of the particle, other than those created by the targeted mutation, and, (ii) that recognition of an unrecognised hybrid antigen by a mAb could be restored by replacement of the mutated site, thus demonstrating that the mutated site was necessary for antibody recognition of the antigen.
The anti-GII-4v2 mAbs recognised only the GII-4v2 VLP and the GII-4v2/A2B0 VLP, therefore demonstrating that these mAbs recognise either an epitope that is dependent on site A being in the structural context of the GII-4v2 antigen, but is independent of site B, or, an epitope that is formed of neither site A nor site B. The former is difficult to evaluate because the VLP GII-4v2/A0B2 was not available, but the latter could be investigated by construction of a GII-4v2 hybrid VLP with site A and site B from GII-4v0, which if recognised by the mAbs, would demonstrate that the mAbs bind a site that is neither site A nor site B. Conversely, if such a VLP was not recognised, this would demonstrate that site A and site B were important for antibody binding, and more detailed mutagenesis studies where individual amino acid residues in the GII-4v2 VLP were mutated would aid in revealing the residues critical for antibody recognition. Whether the five mAbs described here recognise the same or different epitopes remains to be tested in blocking EIAs.
In this study, we have used several well characterised experimental systems in conjunction with in silico models, to identify sites on the GII-4 norovirus capsid that are important in antibody recognition. The use of antigenically hybrid VLPs to study capsid-antibody interactions was used as a surrogate for infectious virus because there is no cell culture system available for these viruses, and our approach of systematic mutation of VLPs led to the identification of two 3aa sites on the surface of the capsid required for antibody binding. Whether the regions identified in this work represent neutralisisng epitopes remains to be investigated, but these investigations remain hampered by the lack of a replicative in vitro system or suitable animal model. It would also be interesting to determine whether the mAbs described here could interfere with the ability of VLPs to interact with histo-blood group antigens (HBGAs) when used in a VLP-HBGA binding assay .
Two faecal specimens were selected from outbreaks that had been characterised by PCR as being caused by a GII-4 norovirus at the Enteric Virus Unit, Centre for Infections, Health Protection Agency, London, UK. The two viruses were: (i) a GII-4 norovirus circulating before the 2002 epidemic, classified as a variant 0 (GII-4v0) virus; and, (ii) a GII-4 norovirus circulating after the 2002 epidemic, and classified as a variant 2 (GII-4v2) virus. Samples were prepared as 10% suspensions in balanced salt solution (Medium 199, Sigma, Dorset, UK) prior to nucleic acid extraction.
Total nucleic acid was extracted from a 250 μl aliquot of the 10% faecal suspension using a guanadinium isothiocyanate/silica method as previously described . Extracted nucleic acid was incubated at 42°C for 60 minutes with 50 pmol of poly(T)-TVN primer in Tris-HCl buffer, pH8.3, 5 mM MgCl2, 1 mM each dNTP, and 200 U SuperScript® III reverse transcriptase (Invitrogen, Paisley, UK).
The genes ORF2 and ORF3 encoding the major structural protein VP1 and the minor structural protein VP2, respectively, and the 3' untranslated region (3'UTR), were amplified by PCR using primers ORF1/2-F1 and TVN-linker. The resulting amplicon 3'ORF1+ORF2+ORF3+3'UTR, was either 2513 bp or 2516 bp in length, depending on the strain. Reactions were performed using High Fidelity PCR System (Roche Diagnostics Ltd, Burgess Hill, UK). PCR amplified amplicons were purified either from solution using Montage® PCR Filter Units (Millipore, Watford, UK), or from agarose gels using Geneclean® Spin Kit (Qbiogene, Cambridge, UK). Both were used as according to manufacturers' instructions.
Sequencing PCR was performed using 10 pmol of primer and 100 fmol template DNA. All sequencing was performed using GenomeLab™ DTCS - Quick Start Kit (Beckman Coulter, High Wycombe, UK) according to the manufacturer's instructions, and a CEQ8000 automated sequencer (Beckman Coulter).
Nucleotide sequence contigs were generated from trace data using the Assembler tool in BioNumerics v3.5 (Applied Maths, Kortrijk, Belgium). Multiple alignment and phylogenetic analysis was performed using appropriate algorithms in BioNumerics v3.5 (Applied Maths). Amino acid sequence data was deduced from nucleotide data and analysed using BioEdit , and also using BioNumerics v3.5 (Applied Maths).
Each of the purified 3'ORF1+ORF2+ORF3+3'UTR amplicons was cloned into the vector pCR2.1-TOPO® (Invitrogen) according to the manufacturer's instruction. The 3'ORF1+ORF2+ORF3+3'UTR amplicon was then modified by PCR using primers deigned to: (i) remove the partial 3'ORF1 sequence at the 5' end of the amplicon; (ii) include two restriction enzyme sites at each end of the amplicons in order to allow for directional cloning into vector pRN16; and, (iii) modify the translation initiation context of ORF2 to match that of the baculovirus polyhedrin gene (PH). The GII-4v0 amplicon was modified as follows: 5'-A-Stu I-Sac I-PH-ORF2-ORF3-3'UTR-Xba I-Stu I-A-3'. The GII-4v2 amplicon was modified as follows: 5'-A-Stu I-Kpn I-PH-ORF2-ORF3-3'UTR-Xba I-Stu I-A-3'. The vector pRN16 contains a region of the Autographa californica nuclear polyhedrosis virus (AcMNPV) around the polyhedrin gene (ORF7 (735)) which overlaps the essential ORF8 (1629) gene. pRN16 was produced by ligating the Bst XI/Hin dIII polyhedrin promoter-polylinker fragment from pAcCL29.1 into Bst XI/Hin dIII cut pBacPAK8 (BD Clontech). After digestion of both inserts and vector pRN16 with the appropriate restriction enzymes ligation was performed using T4 DNA ligase (Fermentas, York) to produce the plasmids pRN-GII4v0 and pRN-GII4v2.
Positive clones were grown overnight in a 50 ml LB broth culture containing 50 μg/ml ampicillin, and the plasmid isolated using a plasmid preparation kit (Plasmid Midi Kit, QIAGEN, West Sussex, or SNAP Midi-Prep Kit, Invitrogen) according to the manufacturer's instructions.
Wild-type sequences for GII-4v0 and GII-4v2 VLPs were mutated in the P2 domain at site previously identified as forming a putative epitope (Figure 1(a)-(c)). Plasmids pRN-GII4v0 and pRN-GII4v2 were mutated in a site specific mutagenic PCR reaction at either a 9 nt site at positions 886-894 (site A), or a 6 or 9 nt site (depending on the strain) at positions 1176-1182 (site B) from the GII-4v0 sequence to the GII-4v2 sequence, or vice versa (Figure 2). For this, the GeneTailor Site-Directed Mutagenesis System (Invitrogen) was used according to manufacturer's instruction, using a touchdown PCR method to mutate and amplify the plasmids. Mutated plasmids were transformed into DH5αT1RE. coli cells (Invitrogen) and purified using SNAP Midi Prep Kit (Invitrogen) according to manufacturer's instruction.
Purified plasmids were used to generate recombinant baculoviruses as has been previously described . Following recombination, a clonal population of recombinant baculoviruses was obtained by plaque purification. The resulting recombinant baculoviruses expressed either GII-4v0 VLPs (BAC-GIIv0) or GII-4v2 VLPs (BAC-GIIv2). Plaque purified viruses were used to seed stock cultures of each virus, and these stocks were titred by plaque assay.
Suspension cultures of Sf 9 cells were infected with either BAC-GII4v0 or BAC-GII4v2 at a moi of 2-3 and incubated at 28°C for 48-72 hours. Virus-like particles were purified from the intracellular phase by treatment with phosphate buffer containing 1% IGEPAL (Sigma Aldrich) and sequential centrifugation steps for clarification, and finally through 15%-60% sucrose cushions to concentrate the VLPs. Fractions were collected and analysed by SDS-PAGE on a 12% polyacrylamide gel (NuPAGE kit (Invitrogen), according to manufacturer's instruction) and electron microscopy (EM).
BALB/c mice were inoculated subcutaneously with 100 μg of either wild-type GII-4v0 or wild-type GII-4v2 VLPs in Freunds incomplete adjuvant in order to produce mAbs. After boosting the mice fortnightly on a further four occasions, the spleen cells were harvested and fused with mouse myeloma cells (NSI) by standard procedures .
The fused cells were dispensed into 96 well tissue culture plates and cultured in RPMI1640+GlutaMAX media (Invitrogen), supplemented with 2% hypoxanthine-thymidine (HT) (Invitrogen), 1% oxaloacetate-pyruvate-insulin (OPI) (Sigma) and 1% antibiotic-antimycotic (AbAm) (Invitrogen). Ten to 14 days post fusion, supernatants from the fusions were tested for antibodies to GII-4v0 and GII-4v2 by EIA as described below. Hybridomas secreting norovirus variant-specific antibodies were then cloned twice by limiting dilution.
Microtiter plates (Greiner Bio-One, Stonehouse) were coated with either GII-4v0 or GII-4v2 VLPs at a concentration of 1 μg/ml diluted in PBS + 0.08% azide at 4°C. A 100 μl aliquot of test supernatants were diluted between 1 in 100 and 1 in 10000000 in PBST, and detection was performed using a rabbit anti-Mouse IgG-HRP conjugate antibody (Dako, Cambridgeshire) at 1 in 4000 dilution in conjugate diluent (Microimmune) and TMB Substrate (Europa Bioproducts, Cambridge).
A 100 μl sample of culture supernatant from each hybridoma was added to coated microtiter plates and antibody isotype determined using a goat anti-mouse IgG1a, IgG2a, IgG2b, IgG2c, IgG3 or IgM (Jackson Laboratories, Maine, USA) antibody, diluted 1 in 2000 in conjugate diluent (Microimmune). Detection was performed using rabbit anti-goat HRP-conjugate diluted 1 in 20000 in conjugate diluent (Microimmune) containing mouse serum (Sigma-Aldrich, Dorset, UK) and TMB Substrate (Europa Bioproducts).
The EIA was performed as described above, but before the addition of the mAb to the plate, the VLP antigen bound to the plate surface was treated with either 8 M urea in PBS or PBS for 1 hour at room temperature. Wells were then washed 3 times with PBST and the EIA performed as described above.
In the competitive immunoassay, monoclonal antibodies were diluted in PBS 1 in 1000 - 1 in 10000 and pre-incubated with either the homologous or heterologous wild-type VLP at a concentration of 1 μg/ml, one of the antigenically hybrid VLPs at 1 μg/ml, or PBST as a control. Pre-incubated monoclonal antibodies were then added to microtiter plates coated with 1 μg/ml of the homologous antigen (as described above) to which the monoclonal antibody was raised. The monoclonal antibody was then allowed to attach, and detected with an anti-mouse HRP conjugate antibody in an EIA as described above. Results are shown as per cent reduction in binding of mAb to homologous antigen (ODtest) compared to level of binding in PBST control (ODPBST): % reduction in binding = ([ODPBST - ODtest]/ODPBST) × 100.
The authors are grateful to Ian Jones (University of Reading) for the gift of BAC10:KO1629 and pAcCL29.1. This work was supported by the European Commission, DG Research Quality of Life Program, under the 6th Framework (EVENT;SP22-CT-2004-502571).
DJA participated in the design of the experiments, conducted the experiments, and drafted the manuscript. RN participated in the design of the experiments, provided reagents and expertise for production of the VLPs, and editing of the manuscript. DS participated in the design of the experiments, provided reagents and expertise for production of the monoclonal antibodies, and editing of the manuscript. JJG participated in the design and coordination of the study, analysis of the data and editing of the manuscript. PR provided reagents, participated in the coordination of the study and editing of the manuscript. MIG participated in the design and coordination of the study, analysis of the data and drafting and editing of the manuscript. All authors read and approved the final manuscript. | 2019-04-19T04:37:31Z | https://virologyj.biomedcentral.com/articles/10.1186/1743-422X-6-150 |
Brexiteers like Boris Johnson inhabit an outdated form of sovereignty. A new realm of power - regulation - demands shared authority and is the EU's greatest achievement. Britain helped create it and can't leave it.
Leviathan T-shirt thanks to Red Bubble T-Shirts.
Regulation, reinforced by human rights, has become a new sphere of government. It is now as essential to modern society as executive power, legislative authority and courts of law. The way we experience this is also novel. It does not stem from the influence of politicians, the role of authority whether national or local, or fear of justice. These familiar locations of power continue, but a new force has joined them as our intimate lives have become strangely politicised, from our health and diet to our metadata. The famous frontispiece of Hobbes’s Leviathan shows the people inhabiting the ruler. Today, rules have entered the bodies of citizens - and we want to know who is in charge of them and whether they enhance or imprison us.
Brexit forces into the open this change, which has been underway since the 1970s. In the UK, those who support Leave have failed to understand the epochal significance of its development, while those who back Remain have failed to articulate it. The European Commission, too, does not grasp its centrality. Brussels as well as Brexiteers are captives of 20th century notions of sovereignty and its unsustainable illusions of grandeur - illusions that are now being tested to their destruction, most immediately with Brexit.
I stumbled across its significance of regulation and am only beginning to get a measure of it. Denunciation of the EU’s over-regulation was the starting point of the long campaign against British membership. Now, a revealing analysis in openDemocracy reports staggeringly high rates of popular support in the UK for European levels of regulation. They run at between 70-80% - incorporating large majorities of those who voted to Leave. While the big boys bang on about sovereignty, regular people, women somewhat more than men, prefer regulation. Brexit has a weird, old-fashioned veneer because it is so male-dominated and self-important, giving the issue its end of epoch feel. The campaign against it risks being drawn into similar routines and perhaps recognising the centrality of regulation can help prevent this.
The significance of regulation came home to me when I recently attended a meeting with a senior member of the Cabinet who is an influential Brexiteer. The UK government will leave the EU, he said confidently, and no longer submit to the ECJ, the European Court of Justice. However, it would seek 'association agreements' with respect to nuclear materials, air travel, pharmaceuticals, automobiles and chemicals. Such agreements would have ECJ oversight. All international agreements necessitated arbitration, he told us, helpfully. The rules would be accepted at every point in the production process. When someone said such ongoing arrangements would come at a high cost, he nodded assent. In effect, the Brexiteer told us, all our manufacturing needs to be within the aegis of the EU’s regulated space.
Shortly after Open Europe, which is directed by Brexit-supporting Henry Newman who once worked for Michael Gove, published Striking a Balance, a report that recommends an across-the-board agreement on these lines. Its justification: “The EU is our most important goods’ market and the most highly-regulated sectors – electrical, automobiles, and chemicals – are the areas which we trade most with the EU and are growing the fastest”. Unlike Boris Johnson, who I'll come to in a moment, Brexiteers who study the evidence want the UK to be in the Single Market for goods. The government will apply “to stay in the European standards system for industry products and services”.
It is easy enough to ask, as we should, what, then, is the point of Brexit? Another good question is whether the EU will agree to the request. I want to ask why even passionate Brexiteers now see no way out of the EU’s regulated space, certainly in traded goods. The crux of the answer is that that there is no way out of regulation.
By regulation I don’t just mean high profile financial regulation. I mean its ongoing, background role in ensuring the quality of the air we breathe, the medicines we take, the food we consume and the safety of the flights we board. You could undertake the enormous costs of building custom checks for goods going between the UK from the EU. But what is the point, if you then have to recreate and duplicate inside the UK the entire apparatus of regulations, with their ongoing autonomy from parliamentary 'sovereignty'? The idea that once the UK left the EU Britain could ‘do away’ with regulation from Brussels, because it is mostly unnecessary, has proven to be an utter fantasy. Britain’s wannabe Donald Trump, Nigel Farage, told the BBC, “we will finish up perhaps in an even worse place than we are now because we won’t be free to de-regulate”. But no modern democracy would wish to deregulate. It is not the road to freedom. And as the UK government is learning, public opinion will not let it deregulate. This is a fundamental lesson of Brexit.
The lesson is related to, but goes further than, Will Davis's notable response to the referednum result in 2016. Drawing on David Graeber's The Utopia of Rules, Davis emphasised that in an important way "capitalism is regulation" and concluded that the ideology of Brexit is illusory.
In the UK, these dire, Brexit-times have bred impatience, shallowness and lack of reflection. I want to resist these and examine an activity which may seem petty and irritating but isn’t. A misconception needs to be undone, an everyday prejudice that certainly had me in its grip, and has blinded us to a reality that cannot be escaped. To comprehend why I will start with a glance at the conceptual inheritance embedded in the notion of sovereignty itself. It makes for a long article but the reward is that I will show it is impossible to ‘take back control’ in the way the Leave campaigners promised. They are living in the past. It is desirable and possible for countries to retain lots of democratic legislative, executive and judicial independence within the European Union. But with respect to the new, fourth branch of government we are hard-wired into a union of regulation. Something that is also, and not incidentally, to our huge mutual, personal and bodily benefit.
The dominant, early modern justifications of state power, from to Bodin to Hobbes, were concerned with the absolute nature of sovereignty, how to justify it, exercise it and ensure consent. In the eighteenth century the concept of the separation of powers was developed, most notably by Montesquieu. He looked at the nature of government not from the point of view of the ruler but from that of property owners. They needed good, strong government to ensure their rights. They also needed to preserve their privileges from the danger of such government becoming a tyranny over them. Montesquieu's solution was to elaborate on the way government involves three forms of activity: the legislative, the executive and the judicial, and to argue that their seperate autonomy was essential for the preservation of liberty. Each would check the others and thereby protect society from arbitrary power. Thus the executive (whether a monarch or those ruling in a monarch’s name) could not tax or expropriate except with the agreement of the parliament or assembly and only then within the rule of law.
The extreme nature of the separation of powers in the United States proved exceptional. Even there, they overlap and interact. Congress approves presidential appointments to the Supreme Court. Currently it does so on party lines and as a consequence the court has become politicised - in effect its independence is diminished more than in many European constitutions.
The practical reality of the three functions became the matrix for describing other law-based systems. In Britain, Bagehot, in his famous mid-19th century account of what he called The English Constitution, praised the efficient way the Cabinet 'fused' executive and legislative power, so that members of the legislature exercised executive government. The legacy of this undivided sovereignty remains central to the trauma of the Brexit referendum. In practical terms, the Victorians feared the consequences of the all-powerful fusion, should the extension of the franchise bring the unwashed to power. They ensured the independence of the executive arm by creating a permanent civil service that could not be replaced by an incoming government. But the mentality of parliamentary absolutism defined the horizons of the British system. In 1885, in what became its defining tome, The Law of the Constitution, A.V. Dicey described it as "the despotism of the King in Parliament". He summarised a tradition that goes back to Hobbes, whose Leviathan in the same famous frontispiece holds the public sword "unconstrained". To this day this remains, "the very definition of sovereignty" in the United Kingdom. We have not left centuries of history behind us.
Not so in most of Europe, where the earlier tradition of constrained power re-emerged in the codified constitutions of the later 20th century, creating a tide of protection and extending the rights of citizens. In a grim article in Prospect, Vernon Bogdanor analyses and laments the UK's looming loss of rights if it abandons the 'protected' constitutional model of the EU to revert back to Hobbes. It is a traditional argument well put but insufficient. Today, we are surrounded by a new kind of agency that does not oversee the exercise of power, judge who breaks the law or administer the armed forces or public services. Instead these agencies regulate.
If you embrace the Hobbesian, Westminster notion of the state, as Brexiteers do, then power is zero-sum. Either one has it or the other does. In contrast, the powers of regulation are an exercise in mutual collaboration with the aim of collective gain. The process is win-win not win-loose. For the Anglo-British this cannot define the nature of power - because sovereignty cannot be shared, it can only be singular. There are endless examples of this taken-for-granted assumption across the commentariat, both Remainers and Leavers. To take an example at random, Oliver Wiseman, the editor of CapX website, says he prefers "the return of powers from an undemocratic supranational organisation to a democratic national government”. The assumption: that power is something you have or do not have and it can be returned. But in many fields there is no such possibility. The power of regulation resides in relationships that are negotiated. The process needs to be democratised but it can't be 'returned'. The underlying premise of Brexit is that sovereignty is simple. It is not. If it ever was, it isn't simple now. It is complex, multi-layered and in the age of corporations no longer something nation states can monopolise over their territory. Hence Brexit cannot be 'Brexit', as in Boris Johnson's call for a "full British Brexit". Sovereignty is no longer a meal we can eat alone.
I owe much of my thinking about what has happened to Frank Vibert, author The Rise of the Unelected and The New Regulatory Space, Reframing Democratic Governance. He describes how over the last half-century unelected bodies, from economic regulators, to science and medical councils, and now digital watchdogs, backed by a new range of auditors and ‘risk managers’, have proliferated. Democracies need regulation for a wide variety of reasons that have grown out of an increasingly complex, science-based, long-range market-place. New relationships are being created between the state and the market, while ethical questions of safety, accountability, privacy and consumer and employee rights have emerged. The internet and the explosion of digital platforms has intensified the process greatly.
Regulation goes back to the first British Factory Acts. It was strongly developed in the USA in the New Deal to rein in business. In 1991, Cass Sunstein wrote a pioneering account of this in After the Rights Revolution, Reconceiving the Regulatory Space and attempted to set out legal principles to govern regulation within the framework of the US constitution. This year, Paul Tucker, who was deputy director of the Bank of England, published a massive, thoughtful account, Unelected Power: the quest for legitimacy in central banking and the regulatory state. He argues that it is dangerous for democracy if regulation over-reaches itself to become a fourth branch of government and he sets out principles to ensure it remains accountable. His arguments are echoed by David Currie, outgoing chairman of the Competition and Markets Authority. In a valedictory lecture he emphasised how its regulatory power is wholly independent of parliament and ministers and is deployed “even when no one is breaking the law” to investigate whole markets (such as the price and practice of funerals). Yet because its authority is set out by parliament and subject to judicial review, Currie sees it as subordinate to the traditional structures.
A parallel example would be the way ‘cyber-space’ has now added a new dimension to land, sea and air, without replacing them. We live in the same physical world as the twentieth century but not in the same way.
Regulation has become a parallel form of authority over how we live. This has enormous dangers. We now need to ensure it answers to citizens democratically; which in turn presents a new kind of constitutional challenge that will not be met by traditional political responses. Otherwise, our democracy, such as it is, could be replaced by hi-tech dependency that subordinates us to a networked ‘social-credit’ regime of the kind being pioneered in China to pre-empt democracy there.
With the danger comes the possibility of a more human, decentralised self-government. That is for the future. Here, I simply want to examine what it means in the present; starting with three perspectives: that of the law, for a single industry and for us as individuals.
As of the date of a Brexit, the process of rulemaking and enforcement within these expert entities will not stop, and indeed should not stop, since new dangers will be identified, new products will be proposed, new licensing requirements will emerge and adverse events about existing products will be reported. To take one example, pharmaceuticals are today subject to successive tests in the laboratory, then on animals, then on healthy human volunteers, then on selected patients in order to demonstrate safety and efficacy. Once approved, the performance of the medicine is regularly monitored and apparent problems (adverse health events) reported, for corrective action to be taken. Animal feed in line with the advice of the Scientific Committee on Animal Nutrition is subject to comparable but lighter rules, as are food additives and cosmetics.
It seems that the EU has in this way developed over 11,000 regulations, set over 60,000 standards and its different agencies have taken over 18,000 decisions on interpreting regulations and laws. Forrester notes that it could take ten years to incorporate them into British law, if each is accorded scrutiny. This alone shows that a process has been taking place that is beyond the reach and capacity of traditional legislatures. The result was acknowledged by the prime minister in her Mansion House speech in March when she finally set out ambitions for Brexit, “the UK will need to make a strong commitment that its regulatory standards will remain as high as the EU’s”.
The continuous development of the rules that we need, to manage the dangers of science-based progress that we enjoy, can’t be legislated by traditional parliamentary institutions or overseen by traditional executive power. Regulation is an ongoing process of investigation, consideration and enforcement, different from both while it also has a quasi-judicial role. This is now integral to the everyday life of government in an age of international trade. We live in a regulated world.
A lucid, two-page letter in December last year explains why we live in a regulated world, from the viewpoint of just one critical industry. It is addressed to Michael Gove as the Secretary of State for the Environment. The author is Steve Elliott, Chief Executive of the UK’s Chemical Industries Association, a sector, he points out, that is “the UK’s largest manufacturing export earner”.
Ten years ago, the EU created REACH (Registration, Evaluation, Authorisation and Restriction of Chemicals), whose landing page explains its regulatory aims and justification. When it was set up, Elliott admits, the industry “was very concerned about the regulatory/testing costs”. Now, he reports, while imperfect and in need of changes, they have embraced it. It has worked, and is setting global standards that customers want. He makes a strong “plea” that the UK remains in REACH, sketches some of the chilling costs of leaving, and points out that if it does, given the huge importance of the EU market, his members have to respond to “two regulatory bodies”. This would make a “mockery” of the “regulatory simplification” promised by Brexit.
Why two? Because here in the UK the chemical industry needs and desires regulation and would have to create its own version of REACH: “our industry would wish to highlight that it recognises the need for robust regulation. We are a high hazard sector and it is only right that we are regulated accordingly, giving confidence to our workforce, our local communities and consumers of our products”.
In terms of what passes for the debate about Brexit, it is important to register that there has been no serious, counter-argument to the detailed, reasoned case, based on the realities of regulation. No one, therefore, can be in any doubt about the imperative need for a regulatory regime outside normal, parliamentary legislation and the impossible costs, practical and financial, of attempting to duplicate one. No one, that is, unless you are Boris Johnson oblivious to evidence. It is striking, watching Johnson in action, how he is unable to move on from the referendum campaign of 2016, that he led. You would expect after two years that his advocacy of Brexit would be more than hot air. Instead, it is as if he already knows that it was the high-point of his influence and he clings to its tropes and his now wearisome bonhomie. In a diatribe to fellow MPs, leaked to Buzzfeed, the man who is its Foreign Secretary attacked his own government’s negotiations in case they end up, as he knows they must, with the UK “locked in orbit around the EU…and not having freedom with our regulatory framework”. The casual suggestion that Britain can benefit from the “freedom” to regulate for itself shows Johnson’s lack of seriousness. This is confirmed by an article in the Sun on the second anniversary of the Referendum. Johnson demands, "the freedom to bust out of the corsets of EU regulation and rules - to do things our way" and not "some perpetual pushme-pullyou arrangement".
There is not a scintilla of evidence that he has read the letter from the Chemical Industries Association or similar ones from every sector of industry, or from Japanese and European foreign investors, with respect to regulation, or even that he absorbed what the prime minister said in her Mansion House speech when he sat in front of her. Gove at least appears to have registered the evidence. Yet Brexit is personified by Johnson more than anyone.
What does regulation mean for us as individuals? I’ve cited various experts and regulators and quoted a judge and the spokesman for the chemical industry. All this associates regulation with top-down authority. But the strength and vitality of the regulatory transformation of government is rooted in popular demand. There are two reasons why this is not obvious. Wealthy, speculative enemies of good government have funded the populist drumbeat attacking ‘regulations’ as ‘elitist’. Second, in our everyday lives, while we worry about the purity of what is sold to us, we only think about regulation when something goes wrong. This needs to change. We need to be able to challenge and improve regulation when it is clumsy, stupid or disempowering - to do so we need to make regulation democratic.
Today, we rely on regulation. Back in the mid-twentieth century Britain if you wanted a take-away meal you might go to a locally owned chippy and pay cash. Today, you are just as likely to order and pay for it over the phone or even online, from a pizza chain. In doing so you have a set of expectations. Even if these do not include concern for working conditions in the kitchens and for the delivery workers, as they should, you will certainly expect that your card details are secure and the food healthy. The latter is especially important as those fullfilling your order may be temporary employees with no direct responsibility for the content of what you are eating. You do not want state surveillance of your activity. But in the background you expect it to have ensured oversight of banking and payment systems and rules about what goes into our food.
We expect official standards to be in operation in the background of our everyday lives in a way that is historically novel. Even for simple activity. Previously if you were poor you wrapped a cloth around your hand to take something out of the oven, should you be cooking for yourself and your family. Now we buy oven gloves. We do not expect these to melt or burn easily. If they contain synthetic materials these must not be emit toxic fumes if singed. If you want free trade in oven gloves they could be made anywhere. Standards are required so that wholesalers know that even the cheapest are minimally safe. This requires regulation.
In Trump’s United States, the corporate lobby holds sway. It has just been reported, the chemical industry has “scored a big win” and persuaded the Environment Protection Agency that when it assesses the use of dangerous chemicals it will “exclude from its calculations any potential exposure caused by the substances’ presence in the air, the ground or water’”. Think about that. However callous the USA, at some point its victims will capture popular sympathy when it suffers its version of Grenfell Tower, which now stands as a witness to the consequence of permissive deregulation. As the fridge caught fire in Flat 16 of the fourth floor of Grenfell Tower on the 14 June 2017, it sucked a whirlwind of inadequate, flawed, ill-enforced regulation and cuts in fire-brigade risk assessment and enforcement, into a murderous inferno. It was nothing to do with the EU but it would never have happened had the EU set the UK’s building standards and their implementation.
“The root cause of this shift was simply that there was – and indeed still is – no public appetite for a deregulatory agenda. Our own polling with Opinium has found widespread public support for some of the most controversial EU-derived employment, environmental and financial legislation… Renewable energy targets – another bugbear of earlier Eurosceptics – are endorsed or considered too low by 74 per cent… more than 80 per cent of the public are opposed to lowering food safety standards. When confronted with this wall of public opinion, it is no surprise that leave campaigners adapted their position as the referendum date neared”.
The anti-EU campaign is one of the strangest on record. It began by demanding an end to European regulation while increasing trade with the EU. Its triumph has led it to embrace less trade with the EU while retaining its level of regulation! But when it comes to 80% you can’t argue with “the people’s will”. Or as Theresa May put it in har Mansion House speech that Johnson praises but ignores, in "areas like workers’ rights or the environment, the EU should be confident that we will not engage in a race to the bottom in the standards and protections we set. There is no serious political constituency in the UK which would support this – quite the opposite".
fundamental misunderstanding [is] about the single market, ironically since Britain was in large part its architect. The core of that misunderstanding is to regard the single market as an economic entity or international trade area whereas, in fact, it is more precisely a regulatory entity and area. It is this which has enabled the EU to dismantle non-tariff barriers to trade, including trade in services, in a way that goes beyond anything that exists anywhere else in the world. But, inevitably, this entails a shared legal and political infrastructure. How else can market-wide rules and regulations be made and enforced? The failure to understand this basic definitional fact, allied with the ‘in 1975 we were told it was just a trade bloc’ myth, gave rise to all of the ‘bendy banana’ type stories that ended up with the ‘take back control’ slogan of 2016.
The correct way to think of the EU in economic terms is as a “regulatory union”, with the appetite and ability to extend its rules extraterritorially: the so-called Brussels effect. The EU is a superpower in no other respect. But in this critical one, it is. And the idea that, on its own, the UK, can compete with massive regional trading blocs – the EU, the US, China – as a standard setter, on industrial goods to data, is an illusion. And leaving a regulatory union, including a Customs Union is really much more difficult than leaving a free trade area.
We have to go further. The way to think about the EU in terms of constitutional sovereignty is as the European union of regulation. This is its core achievement and greatest attainment. It is so fundamental that whether or not the Euro survives, and however much the Union may fail on critical issues like migration, it is not going to break up. It has achieved an enormous, ongoing material and human advance by responding to the need for the new and now essential domain of government.
Why hasn’t the significance of regulation for the EU been recognised? Routledge have just published a densely researched Handbook on Brexit, edited by Patrick Diamond, Peter Nedergaard and Ben Rosamond. It has 23 scholarly articles and aims to set out a “systematic academic overview” of the Brexit process. They encompass the special character of the British state, the English and Irish questions, the role of the city of London, the flaws of the EU and the need to rethink theories of its nature. But regulation only figures as an aspect of financial policy for the City of London. The respected Centre for European Reform published a 50 page overview of how to Relaunch the EU in November last year. It is sober, thorough and addresses the need to make the EU more responsive. But it does not mention regulation or the need to make this accountable. The arguments that Vibert has developed remain peripheral to mainstream thinking.
There is a prejudice against regarding regulation as anything other than a secondary activity or an add on. This extends back to the origins of the EU’s creation of itself as a regulatory space in the 1980s. In his classic account of the EU, The Passage to Europe, Luuk Van Middelaar recounts that when Jacques Delors was appointed President of the Commission in 1984 he was ambitious to create a sovereign Europe. He toured the capitals of the then EU to see if they would support a unified army, a common currency, or institutional reform. Instead, they only shared an interest in an improved internal market. Quotas and tariffs had been banned but a “maze” of rules and regulations prevented trade. A disappointed Delors accepted what he could get. He applied the EU’s approach pioneered by its founder Jean Monnet, aptly described by Perry Anderson as “incremental totalization”. Delors proposed an 8 year timetable of 300 legislative measures each member state should adopt to create what we now know as the Single Market. The Commission’s paper justified this to itself, explaining, “Economic integration has to precede European union”. As Middelaar dryly comments, “Europe was escaping into low politics again, while longing to engage in high politics”.
Regulation was regarded as the dull but necessary preparatory work of the kitchen. The justification for it was the future feast in the dining room of global sovereignty. This may still be the hope for some. But the feast was and is a fantasy. Democratic nation-states are not going to fuse into a superstate. As the current President of the Commission, Jean-Claude Juncker, has just emphasised with respect to Italy, if only to shield the EU from responsibility for it, “A country is a country, a nation is a nation. Countries first, Europe second.” But meanwhile, in the kitchen, something else has been cooking, an autonomous continental-wide system of regulation that now provides many essential safeguards for Europe’s economies and consumers, whose standards for hazardous products and materials are becoming a benchmark around the world.
Regulation is the Cinderella of the Union.
Regulation is the Cinderella of the Union. It is despised by the stepmothers of the media, and obliged to undertake the routine chores while the Euro and its ugly sisters enjoy the silk sheets of endless attention. But midnight has struck for the ball of ever-closer union and super-statehood. On whose feet will the glorious slippers of the European Union fit, if not regulation?
What are the principles we need to ensure regulation is answerable to us as citizens? Paul Tucker sets out some bold ones for first order agencies like the Bank of England, including clear mandates set out by parliaments. All bodies that undertake regulation should be independent of those whose activities they regulate. This might seem obvious, but regulatory capture is often the name of the game – especially when it comes to sweetheart auditing. The greatest recent scandal dramatically confirms the life and death need for robust regulation, outside of political control in an age of corporate power. The Volkswagen emissions disaster saw the German company sell eleven million cars that filled cities around the world with lethal nitrogen oxide fumes. Fortune published a gripping description of how this was permitted by the crony networks of German politics. At one point it describes how regulation was “watered down to the point of meaninglessness...[when] the German government amended its rules so that inspections of emissions performance would be based solely on readings from a car’s own ‘onboard diagnostic’ system, effectively ceding total control to the automakers”. It was also a grotesque failure by the EU to ensure independent oversight of testing.
Another principle is that every agency should have a duty to explain itself in clear language to the public as well as the workforces and businesses directly affected by it. Such reports should also be subject to open challenge and questioning. Regulation must be answerable and should relish explaining itself, as a rational form of policy making with the public interest at heart. Only if different national publics are able to see that continental-wide regulation makes sense for them and is rooted in their own interests, will it be experienced as a gain of control and democratic mastery.
An additional principle is needed to build on this. Regulation should protect and encourage diversity and empower responsible judgment - and not create costs that only corporations can fulfil. Like nature, progress consists of generating an abundance of variety. Sometimes the EU does achieve this. Thus its regulations for Protected Designations of Origins, EU 1151/2012 covers nearly 1,500 food products, from Stilton to Parma ham within the EU and without, to ensure that no description can suggest that products “originates in a geographical area other than the true place of origin...”.
The democratic politics of regulation has yet to begin, outside of the Green movement. There is much to learn. But the fundamental point is that regulation must be brought out of the kitchen to be recognised as an extension of our democratic interests and intelligence, rather than being caricatured as the negation of self-government. For this to happen, the European Union and its Commission need to abandon their presumption that their calling is to replace national governments. Instead of regarding it as the dirty-work preparing the foundations for a super-state, regulation needs to be treated as the EU’s towering, irreplaceable achievement. One that assists national governments. On behalf of its member states the EU has created the new domain of sovereignty – regulation - with huge savings and advantages for all. Its accumulation of agencies, rules, and decision-making may seem to Brexiteers like the mere threads tying down the British Gulliver. But they are neither Lilliputian in strength nor chains of restriction: they are the inescapable and potentially liberating liaisons of a union of regulation. A union that empowers citizens across the continent, a union from which Britain should not wish to escape and, as we are now witnessing, cannot.
Last month I published an open letter to my fellow Remainers in the UK about how to win the civil war that has broken out over Brexit. Millions of UK voters said Basta – enough! – when asked whether they wanted things to continue as they are. This was captured by the slogan 'Take Back Control'. To combat this we need a positive story about EU membership that engages with sovereignty and immigration as well as the combattive one attacking the oligarchs who back Brexit. This is not difficult for me because, while I'm critical of the EU, I regard myself as an English European. I delight in Europe and take an interest in how it and the UK are governed. When I wrote The Lure of Greatness in the aftermath of the referendum I forensically examined the decomposition of the British constitution thanks to the Brexit crisis and how resolving this is central to overcoming Brexit. But the vast majority of my compatriots including most of those who voted Remain don't yet share my interest in sovereignty and the constitution.
Why, then, do millions show such stalwart, unwavering desire to repair the breach with the EU, while they remain indifferent to its institutions? Why do they regard Brexit as bonkers when they care little for Brussels and have no interest in how it works, apart from perhaps regarding it as tiresome and self-important? Something practical and not at all about the high institutions must be going on which has normalised living as part of the European Union. Something like the widely shared interview with a van driver who rang James O’Brien’s call-in programme and explained how Brexit would destroy his livelihood. Although no one uses such a mouthful, he was singing the praise of its shared regulatory space. Maybe, I thought to myself, I too have got too caught up in traditional notions of high politics and sovereignty while the nature of government has moved on.
The defining ideologist of Brexit is the Daily Mail. It describes the main motive for leaving the EU as, “a deep-seated human yearning to recover our national identity and independence”. Must it be the case, then, that those of us who voted Remain are indifferent to, or have no yearning for, national identity and independence? I think not. I claim that we are more free in a fundamental way as persons - as English, Scottish, Welsh, Irish and British persons - inside the EU. Our liberty is enhanced within it, for all the dangers. You could answer that it is a false binary: that we can enjoy both patriotism and partnership, national identity and international regulation. Indeed, but such an answer takes a side. The spirit of Brexit insists on a single priority. For the Daily Mail our national identity and independence are being lost and must be “recovered”. It sees mass migration and the European Court of Justice as invaders that have penetrated our national space. It demands they be repelled to save our country and its great institutions. If judges show themselves to be “enemies of the people” and peers of the realm have become “traitors in ermine” they merely confirm how far subversion has reached.
The Prime Minister shares this view. In her first speech to a Conservative Party conference as its leader she warned, “if you believe you’re a citizen of the world, you’re a citizen of nowhere”. This is the Daily Mail, Brexit point of view: our national identity is singular. The opposite, pro-European point of view has just been powerfully described by David Marquand: all of us have multiple identies. How, then, is it possible to share more than one identity and live with others who have their multiple allegiances - and not fall into the vertiginous vacuum of nowhere? How can the country – any country – hold together, if its people are not joined by the same, single “deep-seated, human yearning”? The answer is that regulation and human rights make multiple identities nationally feasible, by providing a practical framework for living together. They could hardly be more important for us.
This is the second in a mini-series. The first is on the Brexit civil war. Next, The Brexit breakdown. | 2019-04-23T21:58:51Z | https://www.opendemocracy.net/en/opendemocracyuk/why-brexit-won-t-work-eu-is-about-regulation-not-sovereignty/ |
Symbioses with beneficial microorganisms constitute the universal and ecologically highly effective strategy of adaptation of plants towards nearly all types of environmental challenges. Representatives of many groups of fungi and bacteria participate in plant-microbial symbioses (PMS) wherein they can colonize the plant surfaces, tissues or intra-cellular compartments using two basic adaptive strategies: nutritional and defensive. Construction of niches for hosting the symbiotic microbes involves the complicated developmental programs implemented under the joint control by plant and microbial partners and based on the cross-regulation of their genes.
Legume plants (family Fabaceae) are known to form symbioses with extremely broad range of beneficial soil microorganisms (BSM), representing examples of almost all plant-microbe mutualistic systems. Different groups of beneficial microbes improve host mineral nutrition, acquisition of water, promote the plant development and offer protection from pathogens and pests. For ecology and agriculture, the most important beneficial legume symbioses are arbuscular mycorrhiza (AM) and root nodule (RN) symbiosis. These symbioses demonstrate high level of genetic and metabolic integrity, compared with other interactions of legumes with plant growth-promoting rhizosphere bacteria (PGPR) and/or beneficial endophytic bacteria.
High integrity of AM and RN symbioses implies highly specific mutual recognition of partners, formation of special complex symbiotic compartments and integration of partners’ metabolic pathways. In the symbioses, legume plant plays a role of the organizing center of the system as it performs functions of coordination and regulation of all developmental processes. During last decade, a significant progress has been achieved in revealing the genetic bases of symbioses formation and functioning, so the knowledge of the plant genetic control over symbioses can effectively facilitate breeding new varieties of legumes that are needed for modern sustainable agriculture. In this chapter, we describe the present state of the developmental genetics of legume symbioses and depict the potential to organize the multi-component symbioses to be used for optimizing the broad spectrum of plant adaptive functions and to improve the sustainability of legume crop production.
Leguminous plants are able to grow in the soil/substrate without any combined nitrogen due to the fixation of atmospheric nitrogen by symbiotic nodule bacteria (collectively called rhizobia). In collaboration with rhizobia, legumes make a large contribution to the global nitrogen balance in natural and agricultural ecosystems . Nitrogen fixation occurs within special plant organs, root nodules (in some associations stem nodules are also formed). Development of these organs represents a well-organized process based on the tightly coordinated expression of specialized symbiotic plant and bacterial genes. The legume nodules provide an ecological niche for bacteria, as well as structure for metabolic/signal exchange between the partners and for the control of symbionts by the hosts .
Family Fabaceae contains 17000-19000 species divided between three sub-families (Caesalpinioideae, Mimosoideae and Papilionoideae) and more than 700 genera of world-wide distribution . With a single exception (Parasponia: Ulmaceae), the ability for symbioses with rhizobia is restricted to Fabaceae, although in eight related dicotyledonous families (Rosid I clade) an ability to form nodules with the nitrogen-fixing actinomycete Frankia is known .
By contrast to legumes, their nitrogen-fixing microsymbionts do not constitute a taxonomically coherent group of organisms. The majority of rhizobia belong to the α-proteobacteria assigned into the Rhizobiaceae family solely on the basis of their ability to nodulate the legumes (e.g. Azorhizobium, Bradyrhizobium, Mesorhizobium, Rhizobium, Sinorhizobium). Recently some β-proteobacteria (close to Burkholderia, Cupriavidus, Pseudomonas and Ralstonia) and even some γ-proteobacteria have been discovered that can form nitrogen-fixing nodules with the legumes . All these bacteria vary enormously in their overall genome organization, location of “symbiotic” (sym) genes and their molecular organization and regulation [6, 7].
Root-nodule symbiosis is well known as highly specific plant-microbe interaction. According to the early surveys of symbiotic specificity , legumes were suggested to comprise a range of taxonomically restricted cross-inoculation groups within which the free cross inoculation occurs, while the species from different groups do not cross-inoculate. The best studied examples of this classification are represented by four cross-inoculation groups: “Trifolium – Rhizobium leguminosarum bv. trifolii”, “Pisum, Vicia, Lathyrus, Lens – R. leguminosarum bv. viciae”, “Galega – R. galegae”, “Medicago, Melilotus, Trigonella – Sinorhizobium meliloti, S. medicae”. However, it was demonstrated later [9, 10] that such strictly defined specificity is limited to the herbage papilionoid legumes growing in temperate zones and representing the “Galegoid complex”.
The specificity of legume-rhizobia interactions is expressed just during the pre-infection stage when rhizobia recognize the roots of appropriate host plants and colonize their surfaces. The interaction starts when the root-excreted signals, in particular, flavonoids, activate the rhizobial nodulation genes (nod/nol/noe) . These genes control the synthesis of lipochitooligosaccharidic (LCO) nodulation factors (Nod factors, NFs) which induce the early stages of RN symbiosis development [12-14]. NFs represent the unique group of bacterial signal molecules not known outside legume-rhizobia symbiosis. They are among the most potent developmental regulators: their effect is expressed at concentrations of 10–8 – 10–12 M only. The core structure of these molecules, common for all rhizobia species, consists of 3-6 residues of N-acetylglucosamine and of a fatty acid (acyl) chain. The type of symbiotic specificity is dependent mainly on the chemical modifications in NF structures . However, a sufficient role in the host specificity of RN symbiosis may also be implemented by the interactions between bacterial surface molecules (some polysaccharides and proteins) [15, 16] and the lectins located on the root hair surfaces .
The main enzyme of nitrogen fixation in nodules is a nitrogenase that has a complex structure [18, 19]. Synthesis of nitrogenase (the enzyme catalysing reduction of N2 into NH4+) and other proteins involved in nitrogen fixation is induced in bacterial cells after they differentiate into a specific form called bacteroids. Bacteroids are embedded into a membrane structure named symbiosome, which formation as well as bacteroid differentiation is induced by plant . These symbiosomes are organelle-like units of plant cell responsible for nitrogen fixation [21, 22]. Peri-bacteroid membrane (PBM) that surrounds bacteroids is an active interface of RN symbiosis where exchange of metabolites between symbionts occurs .
A pronounced differentiation is typical for rhizobia-infected plant cells, such as an increase in internal membrane structures participating in the PBM formation and biosynthetic processes. Polyploidization and chromatin decondensation are typical for these cells correlating with an elevated transcription activity . Biochemically plant cell differentiation is expressed as a de novo synthesis of many proteins including leghaemoglobin and nodule-specific isozymes of carbon and nitrogen metabolism . Leghaemoglobin binds oxygen actively ensuring its transport towards symbiosomes (which are characterised by the intensive respiration necessary to support energy consuming nitrogen fixation) and microaerobic conditions inside the nodules (required for the nitrogenase activity). The carbon and nitrogen metabolic enzymes responsible for the energy supply to nitrogenase and for the assimilation of fixed nitrogen are nodule specific . Organic nitrogenous compounds formed from N2 fixation are transported to the upper parts of the plant either as amides (mainly asparagine (Asn), but also glutamine (Gln)) or as ureides (allantoin and allantoate), so that legumes can be classified as amide or ureide exporters according to the compounds they use for the mobilization of fixed nitrogen .
Rhizobial cells also undergo differentiation, but its level varies in different legume species. The terminal bacteroid differentiation (when bacteroids increase their size and DNA content and lack the capacity to divide) is specific for legumes belonging to the inverted repeat–lacking clade (IRLC) such as Medicago, Pisum, or Trifolium, whereas bacteroids in the non-IRLC legumes, such as Lotus, show no sign of terminal differentiation as they maintain their normal bacterial size, genome content, and reproductive capacity . The same rhizobia strains that form symbiosis with both IRLC and non-IRLC legumes have different bacteroid differentiation fates in the two legume types. It was demonstrated that in Medicago and probably in other IRLC legumes, the nodule-specific NCR peptides act as symbiotic plant effectors to direct the bacteroids into a terminally differentiated state . Possibly, IRLC legumes use nodule-specific NCR peptides to dominate the endosymbionts: NCR peptides interfere with many aspects of the bacteroid metabolism to allow the efficiency of the nitrogen fixation process to be optimized, for example, by stimulation enlargement and polyploidization of bacteroids . Also, the peptides could be part of a mechanism to avoid the “cheating” of rhizobia that could use host resources to accumulate carbon storage compounds instead of fixing nitrogen , which is often observed in the non-IRLC legumes but not in the IRLC .
It was also found that nodules where terminal bacteroid differentiation takes place are more efficient in terms of energy use. Oono and Denison reported that legume species with terminal bacteroid differentiation (such as peas (Pisum sativum L.) and peanuts (Arachis hypogaea L.) invest less in nodule construction but have greater fixation efficiency when compared to species with reversible bacteroid differentiation (such as beans (Phaseolus vulgaris L.) and cow peas (Vigna unguiculata (L.) Walp.). This effect is probably due to genomic endoreduplication of the bacteroids and full contact of single undivided bacteroid with peribacteroid membrane (some reproductive bacteroids can lose contact with PBM after they divide). Still, this is not known if these useful features of terminal bacteroids differentiation in some legumes could be transferred into other legume species. In work of van de Velde et al. , expression of NCR genes in nodules of Lotus japonicus (Regel.) K. Larsen (with normally reversible bacteroid differentiation) was sufficient to induce bacteroid morphologies reminiscent of terminally differentiated bacteroids of Medicago truncatula Gaertn. But, no positive effect on nitrogen fixation efficiency was reported, probably because there are much more regulatory genes needed to make bacteroids work propertly in such a heterologous system.
Arbuscular mycorrhiza (AM) is formed by at least 80% of contemporary terrestrial plants with fungi of phylum Glomeromycota. The Glomeromycota are unique as the only monophyletic mycorrhizal fungus lineage that has co-evolved with land plants throughout their history. They are obligate biotrophs that colonize plant roots obtaining photosynthates, such as carbohydrates (hexoses), and niches for both their growth and reproduction. The AM is evolved more than 400 million years ago and was considered to play a decisive role in plants achieving a terrestrial existence [32-34]. The AM is supposed to be “the mother of plant root endosymbioses” . Since legumes originated long after AM, about 60 million years ago , it may be assumed that all of them have the potential to produce this type of symbioses. Lupinus is the only known genus where this ability had apparently been lost [37-39].
Specificity of AM symbiosis is relatively low . Symbiosis establishment starts with molecular dialogue between the partners. Plant roots release sesquiterpenes (also known as inducers of parasitic plant seed germination) as well as different phenolic compounds, including flavonoids, which induce fungal hypha growth and branching [40, 41]. Similar to rhizobia, AM-fungi produce signal molecules termed Myc factors (mycorrhization factors) , which can be recognized by the plant. They are a mixture of several lipochitooligosaccarides, the structure of which is close to that of rhizobial Nod factors, but is presumably more universal for different plant-fungus combinations . Both sesquiterpenes and Myc factors are released constitutively and in the absence of physical contact with symbiotic partner .
The AM-fungi penetrate the root to colonize inner cortical cells. Plant plays an active role in fungus hosting inside the root tissues using cellular mechanisms similar to those used during rhizobial invasion, such as nucleus reposition, cytoplasm aggregation, special cytoskeletal tunnel assembly and symbiotic membrane formation (reviewed in: ). A special intracellular compartment of AM providing tight metabolic exchange between the partners is arbuscule, which is highly branched fungal hypha surrounded by membrane of plant origin similar to symbiosome of RN symbiosis [35, 46].
Inner-root and outer parts of mycelium remain bound with arbuscules and are a single continuum via which the fungus is able to translocate mineral nutrient and water from the soil into the root system . Thus, well developed AM-symbiosis allows plant growing well in nutrient-poor and drought-affected soils, increases its resistance against pathogens and pests and heavy metals, and improves soil structure (see below).
Phosphorous (P) is one of the mineral nutrients essential for the plant growth (constituting up to 0.2% of the dry weight of the plant cell) and development. It plays the diverse regulatory, structural, and energy transfer roles and consequently is required in significant amounts [48, 49]. The plants can acquire soluble forms of phosphorous directly from soil through the plant specific phosphate transporters (PTs). The dominant available forms in soil (orthophosphate ions, Pi) are very poorly mobile because of the abundance of cations such as Ca2+, Fe3+ and Al3+ . In such environments where inorganic phosphorous is the predominant form in soil, a range of root adaptations, most of them primarily involved in mobilization and assimilation of phosphorous, are described including plant dependence on arbuscular mycorrhizas (see for review: [34, 51]). In most cases there is a preferential uptake via fungal hyphae (the mycorrhizal uptake pathway) . Studies employing radioactive tracers to track hyphal Pi uptake from soil have shown considerable AM contributions to phosphorous uptake [53-55]. The process involves several fungal transport systems some of which have an extremely high affinity for Pi .
After transporting into hyphae, the major part of Pi is polymerized by polyphosphate kinase into polyphosphates (poly-P), the linear chains of Pi. The granules rich in poly-P together with phosphorous-containing esters are packed into the cylindrical vacuoles which are transported along the hyphae by tubulin fibrils. After reaching the arbuscules, phosphorous compounds are destroyed by phosphatases and the released Pi cross the partners’ interface [56-58]. The arbuscule is the site of phosphate transfer from fungus to plant. It is well documented that plants possess many classes of phosphate transport proteins, including those which are expressed only in AM symbiosis [59-61]. It was discovered that five plant and one fungal PT genes are consistently expressed inside the arbusculated cells . A plant phosphate transporter MtPt4 was shown to be expressed specifically on the peri-arbuscular membrane in Medicago truncatula .
The mycorrhizal Pi uptake pathway is controlled by the plant host. Many results suggest that the plant phosphorous status is a major regulator controlling induction/repression of plant PT genes at both the soil-root interface and the inner-root symbiotic interface [63-65]. It was shown that high phosphorous concentrations counteract the induction of the mycorrhizal Pi transporter genes by phospholipid extracts from mycorrhizal roots containing the mycorrhiza signal lysophosphatidylcholine . The efflux of Pi probably occurs in coordination with its uptake and the fungus, on its side, might exert the control over the amount of Pi delivered to the plant .
Although Pi acquisition receives more attention, the important advances in investigations on nitrogen uptake by AM-fungi have been made in recent years. AM-fungi directly uptake ammonium (NH4+), nitrate and amino acids with preference to NH4+ . The first step in the nitrogen uptake requires the activity of specific transporters located at the interface between the soil and extraradical mycelium. A fungal transporter gene (GintAMT1) involved in the process and having high affinity with NH4+ was characterized .
Inorganic nitrogen that was taken up by the extraradical mycelium should then be incorporated into the amino acids and translocated to the intraradical mycelium, mainly as arginine (Arg) since this is the predominant free amino acid in the external hyphae . The glutamine synthetase/glutamate synthase (GS/GOGAT) cycle is possibly responsible for a subsequent NH4+ assimilation in AM extraradical hyphae [70, 71], although the involvement of glutamate dehydrogenase has not been experimentally excluded. Arg similar to Poly-P is stored and is translocated along hyphae in vacuoles and is later released to the plant apoplast .
A mycorrhizal-specific NH4+ transporter LjAMT2;2 has been revealed recently in transcriptomic analysis of Lotus japonicus roots upon colonization with Gigaspora margarita. The gene has been characterized as a high-affinity AMT belonging to the AMT2 subfamily. It is strongly up-regulated and exclusively expressed in the mycorrhizal roots, but not in the nodules, and transcripts have preferentially been located in the arbusculated cells .
The plants colonized by AM-fungi have been demonstrated to manifest an increased resistance to attack of some pathogenic microorganisms, such as fungi, nematodes, bacteria, phytoplasma, and plant viruses (reviewed in: ) as well as to plant feeding insects [74, 75]. However, it is still unknown whether such increased resistance to pathogens is a consequence of improved plant overall fitness or it is due to the specific defense responses induced by AM-fungi.
Actually, a range of processes occurring as a result of pathogen invasion (plant defense responses) also takes place in mycorrhized root tissues. They include the signal perception, signal transduction and defense-related gene activation [76-80]. The elements of hypersensitive responses have been observed to take place at both compatible and non-compatible combinations of plants with AM-fungi; reactions similar to the “oxidative burst” are typical for AM during fungus penetration into the epidermal cell . In AM, as in other compatible biotrophic interactions, the defense-like response appears to be weak and occurs transitorily during the early phases of colonization, suggesting that the suppression of plant defense responses by the fungal signals may contribute to successful, compatible AM fungal colonization [76, 82]. AM-fungi are known to alter both constitutive and induced defenses in foliar tissues [83-85].
Drought stress is a major agricultural constraint in the semi-arid tropics. In most cases symbiosis with AM-fungi has been shown to increase host plant growth rates during drought stress and plant resistance to drought. Several mechanisms explaining this phenomenon have been proposed: an influence of AM on plant hormone profiles, increasing intensity of gaseous exchange and photosynthesis in leaves, direct water transport via fungal hyphae from soil into the host plant, enhanced water uptake through improved hydraulic conductivity and increasing leaf conductance and photosynthetic activity, nitrate assimilation by fungal hyphae, enhanced activity of plant enzymes involved in defence against oxidative stress, plant osmosis regulation, and changes in cell-wall elasticity (reviewed in: [86-89]).
The AM fungal hyphae grow into the soil matrix and create conditions conducive to the formation of microaggregates and then their packing into macroaggregates due to production copious amounts of the glycoprotein glomalin [90, 91]. Through AM-fungi-mediated effects on soil structure, it seems logical to suggest that AM colonization of a soil might affect its moisture retention properties and, in turn, the behaviour of plants growing in the soil, particularly when it is relatively dry .
AM-fungi were found to play an important role in heavy metal detoxification and the establishment of vegetation in strongly polluted areas (see for review: ). Fungal strains isolated from old zinc wastes also decrease heavy metal uptake by plants growing on metal rich substrates, limiting the risk of increasing the levels of these elements in the food chain . Phytoremediation of metal contaminated areas attracts the increasing interest as a cheaper alternative to chemical methods, more friendly for environment and nondestructive to soil biota. The effectiveness of the bioremediation techniques depends on the appropriate selection of both the plant and the fungal partners. Plants conventionally introduced in contaminated areas disappear relatively soon, while those appearing during natural succession are better adapted to harsh conditions. Much more stable are plants that appear on the wastes spontaneously, but, it takes a long time till they establish and form stable communities. Symbiotic partners selected on the basis of such research are often the best choice for future phytoremediation technologies [93-96]. Introduction of plants from xerothermic grasslands into the soils contaminated with industrial metal rich wastes is supposed to be a new solution for waste revegetation . Further improvements can be obtained by optimization of diverse microbiota including various groups of rhizospheric bacteria and shoot endophytes .
Plant Growth Promoting Rhizobacteria (PGPR) are the taxonomically diverse group including different bacteria (Arthrobacter, Azospirillum, Bacillus, Enterobacter, Pseudomonas, Paenibacillus, Streptomyces) and even some archaea . The PGPR are inhabitants of soil in the vicinity of plant roots and are dependent on consuming root exudates. Many PGPR are able to attach to root surfaces and to AM and other fungal hyphae. The PGPR provide several benefits affecting the host plant either directly (due to mineral nutrient improvement and stimulation of root development) or indirectly (due to defence of plants from soil-borne pathogens and improving host tolerance to abiotic stresses).
Similar to rhizobia, Azospirillum possess nitrogenase and therefore is able to fix atmospheric nitrogen. In the early papers, plant growth promoting activity was attributed mainly to associative nitrogen fixation. A broad distribution of cereal-Azospirillum associations was identified (reviewed in: ). It was demonstrated later, however, that a partial role in these plant–PGPR associations was due to phytohormone auxin (indole-3-acetic acid, IAA) synthesis which improves the root growth and assimilatory capabilities and hence aids nitrogen uptake by plants. In spite of absence of the visible anatomic differentiation in root-Azospirillum associations, its development involves a range of molecular interactions some of which may be common to endosymbiotic associations with rhizobia. Moreover, there is a visible taxonomic relatedness between Azospirillum and Bradyrhizobium genera. Thus, azospirilla and those slow-growing rhizobia might originate from a common Azospirillum-like ancestor (see for review: [101, 102]).
Many PGPR are able to solubilize sparingly soluble phosphates, usually by releasing chelating organic acids. Phosphate solubilizing bacteria (PSB) have been identified, but their effectiveness in the soil-plant system is unclear. The ability of an inoculated PSB to supply phosphopous to plant may be limited, either because the compounds released by PSB to solubilize phosphate are rapidly degraded or because the solubilized phosphate is re-fixed before it reaches the root surface .
The best studied examples of bacteria providing efficient defense from phytopathogens are: Pseudomonas (P. fluorescens, P. chlororaphis, P. putida), Bacillus (B. cereus, B. subtilis) and some Serratia (e.g., S. marcescens) species. Many of these bacteria are capable of preventing attacks by pathogenic fungi, nematodes and bacteria [98, 104, 105]. Diverse mechanisms may be involved in host protection offered by PGPR.
The best studied mechanism is the competitive exclusion of pathogens often related to their direct suppression by the bacterial antibiotic substances: phenazine-1-carboxamide, 2,4-diacetylphloroglucinol, kanosamine, oligomycin A, oomycin A, pyoluterin, pyrrolnitrin, xanthobaccin, zwittermycin A, volatile dyes (HCN) and cyclic lipopeptides [98, 104, 105].
An important mechanism for the suppression of pathogens by biocontrol microbes may result from competition for iron or other metals, that involves bacterial siderophores which may possess much greater affinities for ferric ions than those for fungal siderophores [104, 105]. The value of siderophores in biocontrol effects under natural conditions is predominantly associated with their ability to induce forms of systemic resistance in plant [98, 106].
Competitive exclusion of pathogens by PGPR is best achieved when the bacteria exhibit high root-colonizing activity. Application of the technique of genetic labeling with Green Fluorescent Protein (GFP) suggested that these bacteria do not regularly colonize the root interiors, and only rarely they can be observed inside the outer root tissues . Most PGPR cells are concentrated on the root surface where the micro-colonies [98, 104] or bio-films are formed . Since the interactions of plants with root-associated bacteria are not specific, the bacteria will colonize the roots of a broad spectrum of hosts. Specificity of the defensive association may be expressed however, at the point when antimicrobial compounds are being synthesized and this does not always correlate with bacteria taxonomy; many strains of Bacillus and Pseudomonas which possess plant-protective properties have close relatives amongst phytopathogenic types [106, 108, 109].
Microscopic observations demonstrated that suppression of fungi may be correlated with bacterial attachment to pathogen hyphae. As a result of this attachment, some PGPR strains commence their biocontrol functions by behaving as hyper-parasites of pathogenic fungi. This suppression may be related to the production of bacterial enzymes which destroy the pathogen cell walls [104, 105, 110, 111].
Sometimes the biocontrol activities of PGPR do not correlate with intensive colonization of host roots and plant protection results from only a small number of bacteria cells. This occurs when PGPR inoculation induces the systemic resistance mechanisms that make the root non-accessible by pathogens. Initially this effect of PGPR was called ISR (Induced Systemic Resistance) and was attributed exclusively to nonpathogenic systems ; SAR (Systemic Acquired Resistance) reactions, by contrast, were considered to be typical for the interactions with plant pathogens. Nevertheless, it was later found that the reactions of both types occur in either pathogen or nonpathogen systems and are distinguished by the nature of their endogenous elicitors (reviewed in: [106, 113]). The conventional SAR reaction is characterized by an accumulation of salicylic acid as signal molecules and pathogenesis-related proteins (PR-proteins), whereas ISR reaction is based on signal transduction pathways regulated by jasmonates and ethylene. The systemic defence responses of both types may be elicited exogenously by PGPR cells attached to the roots or penetrating their outer tissues. Some molecules produced by PGPR (cell wall and cyclic lipopolysaccharides, flagella components, exoenzymes, phytohormones, type III secretion system (TTSS) effectors, siderophores, salicylic acid, and toxins) may be perceived by the plant and elicit a defensive response .
It has been reported that PGPR which produce an enzyme which is involved in the catabolism of 1-aminocyclopropane-1-carboxylate (ACC) – the ACC deaminase, can lower ethylene concentration in a developing or stressed plant, protecting it against the deleterious effects of ethylene induced stress and facilitating the formation of longer roots [114, 115]. This demonstrates that ethylene is negative regulator of plant interaction with PGPR.
Despite relatively low specificity of plant associations with PGPR, plant genotype has been shown to influence their effectiveness (i.e. genetic integration exists between the partners), and a series of genome loci (QTL) was identified controlling its quantitative variation [106, 116, 117]. The most pronounced plant species-specificity has been observed in the manifestation of ISR reactions caused by PGPR [118, 119].
Both highly effective direct promotion of plant growth and biocontrol may be due to an ability of the host to regulate PGPR functions by modulating the composition of root exudates. Root-excreted organic acids, but not sugars, are optimal for support of different types of PGPR [120-122]. Additionally, some plants (including the legumes, pea and alfalfa) regulate their PGPR functions by exudating specialised signals from the roots which mimic the bacterial “quorum sensing” regulators required for root colonization and antifungal activities . These observations suggest that improvement of biocontrol functions in root-PGPR associations may be achieved via manipulations with the bacterial and plant host genotypes.
Healthy naturally propagated plants grown in the field or in pot cultures are colonized by populations of endophytic bacteria. The spectrum of endophytic bacteria isolated from the roots of various plants covers a wide range of species; representatives of the genera Pseudomonas, Bacillus or Streptomyces are most frequently encountered as endophytes (reviewed in: ). Newly developed molecular methods enable complete analyses of the diversity of culturable and non-culturable bacteria . Most of the known genera include some phytopathogenic endophytes. Endophytes and pathogens both possess many similar virulence factors (reviewed in: ).
Some endophytes are seed-borne, but others have mechanisms for colonizing plants that have yet to be elucidated . Although there are occasional poorly substantiated reports of intracellular colonization of bacteria providing a consistent and effective increase in the productivity of crops, it is still considered that the intercellular apoplastic space is the most suitable niche for endophytes . It is suggested that many bacterial ‘endophytes’ may not colonize the living tissues, but occupy protective niches in dead surface tissues or closely adhering soil of rhizosheaths. Consistent entry of endophytes into living root tissues in the field is supposed to require a bacterial capability to hydrolyse the hydrophobic incrustations of the walls of epidermal, hypodermal, endodermal, and other cortical cells .
Plant associations with endophytic bacteria can increase plant growth and promote general development or improve plant resistance to pathogens and other environmental stresses enhancing the host’s ability to acquire nutrients, or by production of plant growth-regulating, allelopathic or antibiotic compounds [127, 129]. Sometimes improved plant resistance can be linked to induced systemic resistance caused by bacterial elicitors coming from the endophyte .
It is necessary to study the natural associations between bacterial endophytes and their hosts for the purposes of employing such systems most productively in sustainable agriculture . Delivery of endophytes to the environment or agricultural fields should be carefully evaluated to avoid introducing plant, animal and human pathogens .
Microorganisms in the rhizosphere are under the influence of root exudates and plant as a whole as well as of interspecies interactions with each other. Many fungi including AM-fungi can interact with different bacterial species which frequently attach to fungal mycelium (reviewed in: [103, 132, 133]). For those bacteria known to stimulate mycelial growth of mycorrhizal fungi and/or enhance root mycorrhization the term ‘mycorrhiza-helper-bacteria’ has been proposed [133, 134]. Particularly, the bacteria may encourage growth of AM-fungi at the perisymbiotic stage of development, which precedes the establishment of a direct contact of the microsymbiont with the plant root [103, 135]. On the other hand, AM-fungi directly modify the environment due to mycelial exudation , forming the so-called ‘mycorrhizosphere’ . In addition, the stimulation of root exudation as a result of interactions with AM-fungi leads to qualitative and quantitative changes of the bacterial community in the rhizosphere (reviewed in: [103, 132]).
Synergistic effect between RN and AM symbioses of legumes was described by many authors [95, 138-142]. AM formation is known to promote nodule development and nitrogen fixation by rhizobia, in particular, by means of improvement of mineral (predominantly phosphorous) host plant nutrition (see for review: ). AM-fungi also manifest synergism during interactions with PGPR (both indigenous and introduced), which perform biocontrol, nitrogen fixation, and phosphate mobilization during double and complex inoculation [103, 132]. The synergetic effect of plant inoculation by rhizobia and PGPR (Azospirillum, Bacillus, and Pseudomonas) is well known. In particular, it is associated with PGPR production of indole-3-acetic acid, which encourages nodule formation [103, 143]. Triple inoculation of a model legume Anthyllis cytisoides with PGPR, AM-fungi and rhizobia was shown to be the most effective approach for revegetation in mediterranean semi-arid ecosystems .
Thus, the potential of microbial synergism allows us to speak about high prospects of biotechnologies focused on creation multicomponent symbioses (MCS) that increase the fertility and quality of agricultural legume and nonlegume crops. At the same time, the results of experiments with plant symbioses with AM-fungi, rhizobia and PGPR, including multimicrobial systems, show the important role of physiological and genetic adaptation of microorganisms to local environmental conditions [92, 94, 95, 144]. Hence, during the development of such biotechnologies, it is recommended to use a complex of local microbial isolates adapted to particular environmental conditions.
The complex developmental processes which lead to the formation of intercellular and sub-cellular symbiotic compartments in RN and AM symbioses are controlled by both macro- and microsymbiont. Genetic systems of the symbionts are highly integrated, because some genes and gene products of one partner can switch certain genetic programs in another partner, still the development and function of the symbioses is reliant to the greatest extent on the plant. Developmental genetics of RNS is now well described because both plants and nodule bacteria can be subjected to genetic analysis during nitrogen-fixing nodule formation and functioning. There has been less investigation of AM systems. Mainly this is due to the difficulties encountered in culturing AM-fungi, caused by their obligate symbiotic lifestyle and impossibility of using selective media. Additionally, genetic analysis of AM fungi is more complex because of their heterokaryotic nature and lack of sexual process [34, 145].
The plant genes involved in development of RN and AM symbioses may be divided into two groups, according to approach which was used for the gene identification. The first group, Sym genes , had been identified with the use of formal genetic analysis (started from selection of plant mutants defective in nodule development). The other group of genes comprises nodulins (from nodule) , mycorrhizins (from mycorrhiza) [148, 149], and symbiosins (from symbiosis) [149, 150]. These genes were identified by molecular genetic methods, through identification of proteins and/or RNAs synthesized de novo in root nodules (nodulins) or roots colonized by AM fungi (mycorrhizins). The genes whose expression is induced during the development of both endosymbioses, RNS and AM are called symbiosins .
Genes of these groups are suspected to play different roles in the processes which may be referred collectively as “management of microsymbionts” inside plant roots. Specifically, the products of some nodulin genes represent the structural elements of newly constructed temporary compartments developed during symbiosis . The other nodulin genes may play essential roles in modulating the hormonal status of the developing nodules [152, 153]. Resently, in silico and microarray-based transcriptome profiling approaches have allowed identification of nodulins, mycorrhizins and symbiosins, which are being activated in response to an AM fungal signal, or by either rhizobial or AM fungal stimulus, respectively . Several hundred genes were found to be activated at different stages of either symbiosis, with almost 100 genes being co-induced during nodulation and in AM formation. These co-induced genes representing the common evolutionary bases of AM and nodular symbioses can be associated with those cellular functions which are required for symbiotic efficiency, such as the facilitation of nutrient transport across the perisymbiotic membranes that surround the endosymbiotic bacteroids in root nodules and the arbuscules in AM roots . However, it should be remembered that although most of the nodulins/mycorrhizins/symbiosins were already cloned and sequenced, functions for many of them have been identified only preliminary using the sequence data of the encoding genes and location of the gene products in the symbiotic compartments.
Still, most of nodulins, mycorrhizins and symbiosins seem to play a subordinate role in the regulatory scheme of symbiosis, nevertheless being indispensable for its functionality and stability. In turn, the major, regulatory role in realization of symbiotic programmes is to be assigned to Sym genes. These genes, in contrast to nodulin genes, are usually not expressed outside symbiotic structures and there are many examples of the high functional and sequence homologies between them in different legumes. First genes of this group had been identified using the spontaneous mutants from natural legume populations and afterwards using the experimentally induced mutants defective in nodulation or nitrogen fixation (Nod– and Fix– phenotypes) . Afterwards, it was demonstrated that mutations in some of these genes also affect the ability of plant to form AM . The presence of such common genes necessary for both AM and RN symbioses development suggested that both endosymbioses were more closely related than it was suspected before. The cloning and sequencing of the common symbiotic genes helped to understand that AM and RN symbioses share the overlapping signaling pathways, which probably were established during evolution the AM symbiosis and was recruited afterwards into the RN symbiosis development .
The large sizes of genomes of crop legumes (e.g. soybean Glycine max (L.) Merr. and pea) in which the formal genetics of symbioses was initially developed, as well as low capability for genetic transformation, complicate greatly the cloning of symbiotic genes, analysis of their primary structures and the gene manipulations. Therefore, in early 1990s the new legume species, Lotus japonicus and Medicago truncatula [157, 158] have been introduced in studies as model plants. These species are characterized by small genomes (470 – 500 Mb; ) and can easily be genetically transformed [158, 160-162]. In addition, the short lifecycle and high seed productivity made them attractive and convenient model objects for studying molecular bases of RN and AM symbioses.
Genetic analysis in model legumes as well as in crop legumes was started with experimental mutagenesis. Large-scale programs of insertion, chemical and X-rays mutagenesis, performed by different research groups, resulted in generation of numerous symbiotic mutants in L. japonicus and M. truncatula [163, 164] which allowed researchers to identify and characterize a series of Sym genes. The genes involved at the initial stages of nitrogen-fixing symbiosis (early Sym genes) were of primary interest, allowing dissection of the mechanisms by which the NF signal is perceived and transduced by host plants . It turned to be that after the perception of NF, the nodulation process follows the same signalling pathway as AM does, with slight differences, though.
The data obtained during the last fifteen years allowed reconstruction the symbiotic signaling pathway which starts in RN and AM symbioses with recognition the Nod and Myc factors, respectively, and goes on as the signal transduction inside the root. In legumes Nod and Myc factors are most likely perceived by specific receptor complexes . The receptor for NF is considered to be a heterodimer composed of at least two LysM containing receptor kinases [166-168]. Alike, receptor for Myc factor (which is not known yet) also supposed to be consisted of similar receptor kinases, or even include one or more kinases participating in Nod factor signaling . The system of receptor kinases perceiving signal molecules of microsymbionts seems to be complicated, with some receptor complexes being necessary not only for starting the interactions, but also on later stages, during penetration bacteria into the root cortex through root hair. Moreover, some receptor kinases could non-specifically bind Nod and Myc factors, which results in intensified growth of lateral roots [43, 169]. Probably, the diversity of receptor kinases should complement the variability of soil microorganisms and increase the specificity of interactions with mutually beneficial ones.
After the first step of reception of Nod or Myc factor, the symbiotic signal is being transmitted to the common pathway, named Common Symbiosis Pathway . The first player in this pathway is LRR-receptor kinase, or SymRK (symbiotic receptor kinase), which is required for both RN and AM symbioses development [171, 172]. The ligand for this receptor kinase is not known yet. Interestingly, the activity of this kinase is also required for proper progression of late symbiotic stages, at least for rhizobial infection . SymRK kinase domain has been shown to interact with 3-hydroxy-3-methylglutaryl CoA reductase 1 (HMGR1) from M. truncatula , and an ARID-type DNA-binding protein . These results suggest that SymRK may form protein complex with key regulatory proteins of downstream cellular responses. Symbiotic Remorin 1 (SYMREM1) from M. truncatula and SymRK-interacting E3 ligase (SIE3) from L. japonicus have also been shown to interact with SymRK [176, 177].
The symbiosis receptor kinase SymRK acts upstream of the Nod and Myc factor-induced Ca2+ spiking in the perinuclear region of root hairs within a few minutes after NF application . Perinuclear calcium spiking involves the release of calcium from a storage compartment (probably the nuclear envelope) through as-yet-unidentified calcium channels. To date it is known that the potassium-permeable channels might compensate for the resulting charge imbalance and could regulate the calcium channels in plants [179-183]. Also, nucleoporins NUP85 and NUP133 (to date described only in Lotus) are required for calcium spiking, although their mode of involvement is currently unknown. Probably, NUP85 and NUP133 might be a part of specific nuclear pore subcomplex that plays a crucial role in the signal process requiring interaction at the cell plasma membrane and at nuclear and plastid organelle-membranes to induce a Ca2+ spiking [184, 185]. Recently, the third constituent of a conserved subcomplex of the nuclear pore scaffold, NENA, was identified as indispensable component of AM and RN endosymbiotic development .
The calcium spiking is characteristic for both RN and AM symbioses formation . These Ca2+ spikes are supposed to activate a calcium- and calmodulin-dependent protein kinase (CCaMK) that is also required for NF signaling and AM development . This kinase contains an autoinhibition domain, removing of which leads to a spontaneous activation of downstream transcription events and induction of nodule formation in the absence of rhizobia . Thus, CCaMK appears to be a general manager for both symbioses activating different cascades of signaling for N2-fixing symbiosis and AM in response to different Ca2+ spiking, because the next steps of nodulation signaling are independent from those of AM: the mutations in downstream Sym genes do not change the mycorrhizal phenotype of the legume. Interestingly, mutations in any Sym genes do not influence the defense reactions, suggesting that signaling pathways of mutualistic symbioses and pathogenesis are sufficiently different.
The calcium-calmodulin-dependent protein kinase (CCaMK) is supposed to be also involved in legume interactions with PGPR and/or endophytic bacteria as it was shown using inoculation of M. truncatula by P. fluorescens that MtDMI3 gene (encoding for CCaMK) regulates intercellular root colonization by bacteria as well as expression of some plant housekeeping genes known earlier as mycorrhizins .
The CCaMK is known to form a complex with CYCLOPS, a phosphorylation substrate, within the nucleus . cyclops mutants of Lotus severely impair the infection process induced by the bacterial or fungal symbionts, and are also defective in arbuscule development . During RNS, cyclops mutants exhibit the specific defects in infection-thread initiation, but not in the nodule organogenesis , indicating that CYCLOPS acts in an infection-specific branch of the symbiotic signaling network . Cyclops encodes a protein with no overall sequence similarity to proteins with known function, but containing a functional nuclear localization signal and a carboxy-terminal coiled-coil domain.
It is supposed that CCaMK with help of CYCLOPS probably phosphorilates the specific transcription factors already present in cell: NSP1 and NSP2, which influence the changes of expression in several genes related to the symbiosis development [192, 193]. The activity of these proteins leads to the transcriptional changes in root tissues, for instance, increasing the level of early nodulins ENOD40, ENOD11, ENOD12, ENOD5, which are known to be the potential regulators of infection thread growth and nodule primordium formation [165, 194, 195). Also, the changes in cytokinin status of plant are detected, followed by up-regulation of genes encoding for RN symbiosis-specific cytokinin receptors [196-198]. Moreover, transcription regulators NIN and ERN are to be induced specifically downstream of the early NF signaling pathway in order to coordinate and regulate the correct temporal and spatial formation of root nodules [199-202].
The presented genes are responsible for the signal cascade which is aimed to induce the nodulin, mycorrhizin and symbiosin genes responsible for building the symbiotic structures and implementing their biochemical functions. It is supposed that the signaling pathway did not appear de novo in legumes when they become able to form nodules, but was developed from already existed system of AM formation into which the novel, nodule-specific genes were recruited. Still, new genes had been involved in RN symbiosis development, especially those encoding the receptors recognizing hormones (e.g. cytokinins) and hormone-like molecules (Nod factors).
Autoregulation of symbiosis development is an important process that takes place after successful mutual partners’ recognition and signal exchange. For RN symbiosis, it is considered that legume host controls the root nodule numbers by sensing the external and internal cues. A major external cue is the soil nitrate, whereas a feedback regulatory system in which earlier formed nodules suppress further nodulation through shoot-root communication is an important internal cue. The latter is known as the autoregulation of nodulation (AON), and is believed to consist of two long-distance signals: a root-derived signal that is generated in infected roots and transmitted to the shoot; and a shoot-derived signal that inhibits nodulation systemically [203, 204]. Therefore, AON represents a strategy through which the host plant can balance the symbiotrophic N nutrition with the energetically more “cheap” combined N nutrition.
Recent findings on autoregulation of nodulation suggest that the root-derived ascending signals to the shoot are short peptides belonging to the CLE peptide family [205, 206]. The leucine-rich repeat receptor-like kinase HAR1 of Lotus and its homologues in M. truncatula and P. sativum (SUNN and Sym29, respectively) mediate AON and also the nitrate inhibition of nodulation, presumably by recognizing the root-derived signal [207-210]. Other genes, like ASTRAY, KLAVIER and TML in Lotus, and RDN1 in M. truncatula, are also supposed to play a sufficient role in AON [211-214].
Very little is still known about the plant regulation of mycorrhization process. In split-root systems on alfalfa (Medicago sativa), inoculation of one half of a split-root system with the fungus Glomus mosseae significantly reduced later AM colonization on the other half. A similar suppressive effect on mycorrhization was observed after inoculation with Sinorhizobium meliloti . Furthermore, prior addition of purifed rhizobial Nod factors on one half signifcantly reduced mycorrhization on the other half of the split-root system, and reciprocally, prior mycorrhization on one side suppressed nodule formation on the other side of the split-root system. Together these data point to a common autoregulation circuit for both symbioses . It was suggested that Nod factor signaling, as well as mycorrhizal Myc factor signaling, induces expression or post-translation processing of CLE peptides, which likely function as ascending long-distance signals to the shoot . Also, it was demonstrated that mutations in HAR1 of Lotus and corresponding orthologues in other legumes increase both nodulation and mycorrhization suggesting the shared role of these orthologous genes in controlling the rate of root colonization by microsymbionts. Thereby, not only the local signal transduction (CSP) but the systemic autoregulation is common for the RN and AM symbioses.
The next-coming step of development the genetics of symbioses is studying gene networks on intergenomic level, i.e. the coordinated expression of plant and microbe genes. For AM, with use of the new molecular approaches, in particular transcriptomics, a series of AM fungal genes has been identified, having altered expression levels during the AM formation [216-219]. Still it is not well studied at which stages of fungal-plant interaction the complementary partners’ genes are induced or repressed, and so the use of plant mutants impaired at different steps of AM development might be a challenging approach to reveal the pattern of plant and fungal genetic cooperation . The same research aimed at identification of plant-rhizobial gene interactions with the use of plant and microbe mutants is also in progress.
It has been recently observed that Medicago truncatula showed significantly lower efficiency of nitrogen fixation than its close relative Medicago sativa L. . The number of nodules formed on the roots of M. truncatula was less than that of M. sativa, and the nitrogen fixation measured on plants at the beginning of flowering (as well as specific N2 fixation (µgN h-1 mg nodule-1)) was significantly lower. The reasons for the low efficiency in nitrogen fixation were partially a result of low relative efficiency (electron allocated to N2 versus H+), and slow nitrogen export from nodules in M. truncatula when compared to M. sativa. This might be connected with a low malate concentration in the nodule tissue of M. truncatula, and thus insufficient carbon provision for asparagine formation (fixed nitrogen is to be added to malate to form asparagine) . Therefore, Sulieman and Schulze suggest that improvement the malate formation in M. truncatula nodules could help improving the effectiveness of nitrogen fixation.
According to these data, genes encoding for enzymes of malate synthesis should be good candidates for markers to be used as selection and breeding aimed at improvement of symbiotic properties in M. truncatula. But, in different species potential markers of symbiotic effectiveness could be found among genes of different functional groups. Our original data on sequencing alleles of symbiotic genes in pea (Pisum sativum) varieties with different symbiotic effectiveness suggest that polymorphism of genes belonging to CSP does not correspond to symbiotic properties of pea varieties analysed (Zhukov V.A., unpublished results). Perhaps, good candidates for markers of symbiotic effectiveness could be found during large-scale screening by transcriptome sequencing in different pea genotypes, which is now underway in our laboratory.
An existence of plant genes [148, 150, 222] and their molecular products common for both AM and RN symbioses led to a conclusion that system of legume symbiotic genes should be considered as a single whole, controlling the development of a tripartite symbiosis (legume plant + AM fungi + rhizobia). This fact along with the demonstration of synergistic activity in beneficial soil microbes (reviewed in: ) and a suggestion that plant genetic systems controling the development of RN and, probably, of some other beneficial plant-microbe associations evolved on the basis of that of AM have great importance for the application of tripartite or even multi-partite symbiotic systems in low-input sustainable environmentally-friendly agrotechnologies.
The use in sustainable agriculture of inocula based on beneficial soil microbes as described above allows the improvement crop productivity with decreased doses of mineral fertilizers and pesticides (reviewed in: [224, 225]). These days the majority of commercial inocula contain pure cultures of single microorganisms and only occasionally multiple combinations. There are several objections to the use of mono-inoculation. Firstly, endemic microbial communities are stable and the introduced microbe may be allowed to occupy a very small niche in the whole community or even get lost in a first week after introduction. Secondly, genetic material in microbes is very plastic, and consequently strains introduced into natural ecosystems can rapidly lose their beneficial traits. Thirdly, the existence of microbial cooperation in the rhizosphere as well as in natural synergistic associations of different microbes including those between AM fungi and their endocellular or superficial symbionts [103, 132] question the possibility and expediency of applying mono-inoculants and even use of the term ‘mono-inoculation’ itself. Finally, plants possess relatively stable genomes and this fact contributes significantly to the effectiveness of symbiosis . Therefore, for industrial plant production in sustainable systems we should use plants having highly effective interactions with all kinds of beneficial soil microbes, which can encourage the development of multiple niches hosting microbes and regulating their activity. For this it is necessary to develop new multi-component microbial inocula which increase the content and biodiversity of beneficial soil microbes in agricultural land.
There is experimental evidence of the effectiveness of simultaneous inoculation of legumes with AM fungi and nodule bacteria leading to increased productivity and quality of the yield, e.g. groundnut , pea [139-141, 227], albaida (Anthyllis cytisoides) , and soybean . The effect achieved equalled or exceeded that achieved with mineral fertilizers [140, 141, 227]. The effect also exceeded that of mono-inoculation with AM fungi or with rhizobia either in model experiments or under field conditions [139, 140, 142]. In long-term experiments in a desertified Mediterranean ecosystem, it was found that simultaneous inoculation with AM fungi and rhizobia enhanced the establishment of key plant species and increased soil fertility and quality; increased soil nitrogen content, organic matter content, and soil aggregate hydrostability and enhanced nitrogen transfer from nitrogen-fixing to non-fixing species associated with the natural succession of the plants .
There is an example of application of triple inoculum (AM fungi, rhizobia and PGPR) to the legume A. cytisoides which was successful only when the microorganisms used were isolated from local environment . In collaboration with an innovation company “Bisolbi-Inter” (Russian Federation) the All-Russia Research Institute for Agricultural Microbiology (ARRIAM), Saint-Petersburg, Russian Federation, has developed technology for the production and application of a new multifunctional biopreparation BisolbiMix containing a complex of the most effective isolates of endosymbiotic microbes (AM fungi and rhizobia) and associative bacteria (PGPR) from the collection held at ARRIAM. A non-sterile substrate-carrier which is derived from washing-filtration by-products of a sugar-beet factory contains its own microbial community including all the above groups of beneficial microbes. The preparation can be formulated into a seed dressing (not effective for all the crop plants tested) or granules. The efficacy of BisolbiMix was demonstrated in field trials with legumes, e.g. pea or non-legumes such as wheat, pumpkin and potato (Chebotar V.K. et al., unpublished results). The use of microbial formulations containing rhizobia for non-legumes seems to be sensible because it is known that nodule bacteria which do not form nodules on a non-host legume as well as non-legume roots can operate as PGPR [229, 230]. Thus, the selection of rhizobia with both PGPR activity and efficient symbiotic nitrogen fixation should be advantageous in crop rotations or intercropping systems using legumes and non-legumes.
It is possible, therefore, to develop effective multi-microbial inoculants, but it is necessary to use local communities of beneficial microbes because this exploits the natural biological and genetical adaptations of the partners to their environment [94, 231].
During development of plant-microbe systems for low-input sustainable ecologically friendly plant cultivation it is necessary to be guided by conclusions of EC experts about global productivity of legumes (http://www.grainlegumes.com/aep/; http://ec.europa.eu/research/biosociety/food_quality/projects/002_en.html) for sustainable agriculture. The use of legumes in agriculture is leading to: improved soil fertility and increased diversity of crops and soil microbial communities; reductions in the use of non-renewable natural resources; decreased negative effects from intensive agrotechnologies on the natural environment due to decreased requirement for mineral fertilizers and pesticides and decreased production of animal protein and associated wastes; local production of pollution-free food and forage; and a more stable income for the agricultural producers. This is why it is necessary to breed legumes which have highly effective interactions with beneficial soil microbes.
For more than twenty five years the authors’ laboratory has specialized in the genetics of plant-microbe interactions using pea (P. sativum L.) as a model plant. Our experience for improving the effectiveness of beneficial plant-microbe systems with pea is consequently given as an example. At the same time, the authors’ team knows only single record of other activity of this nature: genetic variability of onion (Allium spp.) has been shown with respect to its responsiveness to AM fungi inoculation which indicate that onion breeding for improving efficacy of associations with AM fungi is possible . The necessity for this sort of plant breeding is also considered, mainly with respect to the effectiveness of RN symbiosis [233-236].
A high level of genetic variability was demonstrated in analyses of the symbiotic effectiveness under double inoculation with AM fungi and nodule bacteria of 99 land-races and outclassed heritage cultivars of P. sativum from the collection N.I. Vavilov’s All-Russia Research Institute of Plant Industry, Saint-Petersburg, Russian Federation, of different geographical origin [139, 141]. In a few genotypes considerable increases in plant dry weight (about 300 %), seed productivity (more than 650%), phosphorus and nitrogen content (more than 900 and more than 300 %, respectively) were observed. The most promising highly symbiotically effective genotypes and those with low symbiotic potential were included in the Pea Genetic Collection (ARRIAM) to be used for experiments studying the functioning of tripartite/multipartite symbiosis. Types identified as highly symbiotically effective genotypes were involved in breeding programmes to create commercial pea cultivars with great potential for interactions with beneficial soil microbes (in collaboration with All-Russia Institute of Leguminous and Groat Crops (ARILGC), Orel, Russian Federation).
The most promising highly symbiotically effective pea genotypes previously selected and different commercial pea cultivars created without consideration of symbiotic effectiveness were involved in three-year field trials (Orel district) . Seed productivity and plant dry weight were chosen as the main criteria for the evaluation of symbiosis effectiveness in legume crops. The double (actually multiple, see above comments on the nature of AM fungi) inoculation was shown to increase seed productivity and plant dry weight in most of the pea genotypes studied and sometimes this could exceed the effect of mineral fertilizers. The effectiveness of legume breeding to improve the symbiotic potential of legume cultivars was proven therefore under field conditions and the genotypes to be used in such breeding programmes were identified. The genotype K-8274 (non-commercial) was selected as a standard of symbiotic effectiveness. Additionally, it was demonstrated that highly effective genotypes can be also found among commercial pea cultivars created without consideration for effectiveness of interactions with beneficial soil microbes. Taking into account that most commercial legume cultivars have accidentally lost their abilities for symbiotrophic nutrition without selective pressure during breeding of intensive crops, the latter constitutes a very important finding for plant breeders and gives them the possibility for concurrent generation of cultivars with required pea plant architecture, other agriculturally important traits and high effectiveness of interactions with all types of beneficial soil microbes in a single breeding programme.
In order to cultivate plants with improved symbiotic potential a special breeding nursery was created in the experimental trials ground of ARILGC on land where for the 5 years before nursery establishment mineral fertilizers had not been applied. To reduce the incidence and severity of root pathogens a 6-field crop rotation was used where cultivation of winter wheat was followed by peas. The multi-component preparation BisolbiMix was used for the inoculation of test plants.
Using the breeding nursery as well as a breeding protocol developed from long-term collaboration of ARRIAM with ARILGC the first (in the whole history of legume breeding) pea cultivar “Triumph” having increased potential of interactions with beneficial soil microbes was intentionally created . It arose as a result of crossing a commercial cultivar ‘Classic’ (donor of agriculturally important traits) and the genotype K-8274 (donor of symbiotic effectiveness trait) and subsequent individual selection of genotypes with high productivity and capacity for supporting various beneficial microbes.
The cultivar “Triumph” is of middle stem height, semi-leafless and has stable productivity under different climate conditions, it is comparatively resistant to root rots and pests. Its productivity is not lower than those of the productivity standards for Orel district using the conventional production technologies and 10% greater in comparison with the standard cultivars when inoculated with BisolbiMix. As a result of two-year state trials (2007-2008) the productivity of “Triumph” was shown to be comparable with those of standard regional cultivars enabling recommendation for commercial cultivation in the Central region of Russian Federation (unpublished results). Thus, the innovative concept of the authors’ research team for plant breeding (applicable not only for legumes, but also for non-legumes) is bearing its first fruits.
Intimate associations of beneficial soil microbes with the host plants described above in detail are applicable in sustainable crop production if taken either separately or in combination. Many authors are now recognizing the need for using the multi-microbial plant inoculants and the advantages of using the indigenous plants (or varieties of local breeding) and microbes.
The authors’ team proposes its own concept which offers fundamentally new approaches to plant production. Firstly, it is necessary to consider plant genetic systems controlling interactions with different beneficial soil microbes in unison. Secondly, plants used as a component of this complex plant-microbe system controlling its effectiveness should be bred to improve the effectiveness of interactions with all types of beneficial soil microbes. Increases of plant biomass production due to plant-microbe symbiosis should be used as the main parameter for an evaluation of plant effectiveness in interactions with beneficial soil microbes. The plant production should be done with inoculation composed of multi-component microbial inocula consisting of AM fungi, rhizobia, PGPR and/or beneficial endophytic bacteria. Finally, taking into consideration the importance of legumes for global agriculture, greater emphasis should be placed on plant-microbial systems in the development of low-input agro-biotechnologies enabling wider cultivation of leguminous crops.
Molecular markers are considered to be a convenient tool to facilitate breeding via MAS (marker-assisted selection) approach. But, search for suitable markers that are associated with symbiotic effectiveness trait is rather complicated problem. To our knowledge, there was no direct link between sequences of symbiotic genes and symbiotic effectiveness, and there are only a few examples of successful use of QTL analysis in legumes to trace loci associated with some symbiotic traits in pea and Lotus . So there’s a gap between molecular genetic bases of symbioses development, from one side, and effective functioning the symbiotic systems in field conditions, from the other side. In our opinion, substantial improvement of methods of molecular genetics and bioinformatics, such as next-generation sequencing and proteome analysis, could help to build a bridge between fundamental and applied science in this area, and to improve the sustainability of the legume crop production.
We thank Dr. Margarita A. Vishnyakova (N.I. Vavilov All-Russia Research Institute of Plant Industry, St-Petersburg, Russian Federation), Dr. Tatiana S. Naumkina (All-Russia Institute of Legumes and Groat Crops, Orel, Russian Federation) and Dr. Vladimir K. Chebotar (“Bisolbi-Inter” Ltd., St-Petersburg, Russian Federation) for the long-term collaboration in the fields of legume breeding and microbial inocula development. We are also grateful to Victoria Semenova (Komarov Botanical Institute, St-Petersburg, Russian Federation) for critical reading the manuscript. This work was supported by the grants of RFBR (10-04-00961, 10-04-01146, 12-04-01867), Grant to support leading Russian science school (HIII–337.2012.4) and Governmental contracts for research with Ministry of Science and Education of Russian Federation (II1304, 16.512.11.2155, #8109). | 2019-04-26T00:56:01Z | https://www.intechopen.com/books/plant-breeding-from-laboratories-to-fields/breeding-to-improve-symbiotic-effectiveness-of-legumes |
Indoor and outdoor air pollution are leading threats to human health (World Health Organization, 2006a, p. 87). Air pollution is produced by the natural or human-caused release of harmful contaminants into the atmosphere (World Health Organization, 2014). Air pollution is a global issue, affecting individuals across all countries and socioeconomic groups (World Health Organization, 2016a). The EPI uses three indicators to measure air quality: household solid fuel use, PM2.5 average exposure, and PM2.5 exceedance.
Particulate matter (PM) exposure is associated with significant adverse health effects (Kloog, Ridgway, Koutrakis, Coull, & Schwartz, 2013; World Health Organization, 2016a). These particulates can penetrate the human lung, leading to higher incidences of cardiovascular and respiratory disease (Goldberg, 2008). Recent research suggests that around five million people die prematurely every year due to air pollution, accounting for approximately one in every ten deaths annually (World Bank & Institute for Health Metrics and Evaluation, 2016). Reducing air pollution levels globally can therefore improve human health today and in future generations.
Household solid fuels. We measure household air pollution as the health risk posed by the incomplete combustion of solid fuels, using the number of age-standardized disability-adjusted life years (DALYs) lost per 100,000 persons due to this risk.
PM2.5 exposure. As a measure of chronic exposure, we use the population-weighted average ambient concentration of PM2.5 in each country.
PM2.5 exceedance. As a measure of acute exposure, we use the proportion of the population in each year that is exposed to ambient PM2.5 concentrations that exceed WHO thresholds of 10, 15, 25, and 35 micrograms per meter cubed (µg/m3) (World Health Organization, 2006a). These four proportions are averaged to produce a summary of the distribution of exposure levels in the country’s population.
Air pollution’s widespread and substantial effects on human and environmental health make it an issue of global concern. Exposure to airborne pollution is the fourth leading cause of premature death globally (World Bank & Institute for Health Metrics and Evaluation, 2016, p. 22). According to a recent study conducted by the World Bank and the Institute for Health Metrics and Evaluation (IHME), approximately 5.5 million people die prematurely from air pollution each year (World Bank & Institute for Health Metrics and Evaluation, 2016, p. 22). Most of these deaths stem from respiratory diseases; even in small amounts, air pollution may reduce the quality of one’s overall health (Goldemberg, United Nations Development Programme, United Nations, & World Energy Council, 2000; World Bank & Institute for Health Metrics and Evaluation, 2016; World Health Organization, 2006a).
While air pollution consists of a mix of different pollutants, particulate matter (PM) is among the deadliest (World Health Organization, 2016a). Fine PM is defined as 2.5 microns or less in diameter (PM2.5). PM2.5 is small enough to lodge into human lungs and has the potential to cause serious heart and lung disease (Goldberg, 2008). As seen in Figure 5–1, PM2.5 pollution affects all people. Young children, pregnant women, and the elderly are especially vulnerable. The World Health Organization (WHO) reports that acute respiratory infections are the second-largest cause of death in children under five (World Health Organization, 2017a).
Map 5–1. Disability-Adjusted Life Years lost due to PM2.5.
Household solid fuel use emits significant amounts of particulate matter. Household air pollution (HAP) occurs from the incomplete combustion of solid fuels, which is predominantly from biomass burning, such as wood, crop wastes, charcoal, coal, and dung, in households (Bonjour et al., 2013; World Health Organization, 2006b, 2016b). In poorly ventilated households, the incomplete combustion process produces a substantial amount of particulate emissions, which causes significant amounts of age-standardized disability-adjusted life years (DALYs) worldwide, as seen in Map 5–2 (Desai, Mehta, & Smith, 2004, pp. 8–10). The World Health Organization (WHO) estimates that incomplete combustion in these households can have fine particle concentrations up to 100 times higher than acceptable levels (World Health Organization, 2016a). Reducing air pollution in the home will bring substantial health and development benefits.
Map 5–2. Disability-Adjusted Life Years lost due to household air pollution.
Environmental: Air pollution harms the environment many ways. Pollutants can mix in the air or with rain and accumulate on plants, soils, and water. Examples of such impacts are discussed in Table 5–1.
Table 5–1. Environmental impacts from air pollution.
Source: Chislock, Doster, Zitomer, & Wilson, 2013; Environmental Protection Agency, 2017; Environmental Protection Agency, 2017b; Pope & Dockery, 2006.
Acid rain is precipitation that contains significant amounts of nitric and sulfuric acids. These acids are formed through nitrogen oxides and sulfur oxides that are released into the air (Environmental Protection Agency, 2017b).
Eutrophication is a process in which excess nutrients exacerbate blooms of algae in water. The increase in algae blooms have the potential to kill fish and cause a loss of plant life (Chislock, Doster, Zitomer, & Wilson, 2013).
Ground-level ozone can lead to decreases in crop and tree productivity, abridged growth of trees, and a greater susceptibility of plants to disease and pests (Pope & Dockery, 2006).
Haze is caused when sunlight comes into contact with pollution particles in the air, reducing our visibility (Environmental Protection Agency, 2017).
Social: Impacts from air pollution have serious consequences for public health and well-being. Adverse health effects occur from exposure to pollutants even at lower concentrations (World Health Organization, 2014, p. 1). In 2013, WHO’s International Agency for Research on Cancer established that outdoor air pollution is carcinogenic to humans (World Health Organization, 2013, p. 1). In combination, PM2.5, nitrous oxides (NOX), and volatile organic compounds (VOCs) interact to form ground-level ozone, which is a highly toxic and reactive pollutant (World Health Organization, 2017c). Sulfur dioxide (SO2) and NOx can transport far distances and react in the atmosphere to form very fine nitrate and sulfate particles (Lockwood, 2009). The burden of air pollution is thus a major challenge to sustainability.
Economic: Air pollution has significant costs for society by damaging people’s health. According a joint study conducted by the World Bank and the IHME, air pollution cost the global economy approximately US$225 billion in 2013 alone due to lost labor, and about US$5 trillion per year as a result of productivity losses and a degraded quality of life (World Bank and Institute for Health Metrics and Evaluation, 2016, pp. 50, 52).
The pervasive social and environmental impacts of air pollution make it an important marker for sustainable development across all levels of economic development. The drivers behind pollution differ by economic structure, however, and developing countries have different problems than developed countries. Air pollution is an important indicator for environmental quality and public health in developing regions, as economic expansion contributes to higher pollution levels (World Bank and Institute for Health Metrics and Evaluation, 2016). Differences in the sources and severity of air pollution across country income groups require different solutions. Some nations, for example, should prioritize access to clean fuels, while others should concentrate efforts on emissions abatement in key sectors.
In order to improve public health and well-being, access to clean and affordable energy is necessary, especially for women and children in developing regions (Desai, Mehta, & Smith, 2004). Globally, almost three billion people continue to depend on solid fuels for cooking and heating (World Health Organization, 2014), including 90% of the rural sub-Saharan African population and 75% of the rural population in China and India (Pachauri, Rao, Nagai, & Riahi, 2012). Women and children experience the highest exposure levels from HAP due to their customary household roles (Pachauri & Rao, 2013; World Health Organization, 2014, p. 1). Data further suggests that exposure to HAP during pregnancy increases the risk of still birth, early birth, lower birth weight, and stunting of children (World Health Organization, 2017c).
Air pollution is both directly and indirectly related to numerous Sustainable Development Goals and Targets.
Climate and Clean Air Coalition to Reduce Short-Lived Climate Pollutants (CCAC): The CCAC was launched by the United Nations Environment Programme along with six countries to raise awareness and reduce short-lived climate pollutants in order to protect health, agriculture, and the environment. http://ccacoalition.org/en.
Global Alliance for Clean Cookstoves (GACC): The GACC is a non-profit organization operating under the UN to improve indoor air quality. One of the groups key objectives is for 100 million homes adopt clean stoves and fuels by 2020. http://cleancookstoves.org/.
Sustainable Energy for All (SEforALL): SEforALL was launched by the UN and works to ensure universal access to modern energy services, double the global rate of improvement in energy efficiency, and double the share of renewable energy in the global energy mix by 2030 (Sustainable Energy for All, 2017). http://www.se4all.org/.
United Nations Environment Programme (UNEP): The UNEP is the agency within the UN to coordinate and implement environmental actions. As one of their many duties, the UNEP works to implement the SDGs. https://www.unenvironment.org/.
United Nations Children’s Fund (UNICEF): UNICEF’s environment team works in over 190 countries and territories to improve the lives of children globally. https://www.unicef.org/environment/.
World Health Organization (WHO): The WHO is a specialized agency of the UN working on international health initiatives. One of WHO’s health topics of focus is the public health impacts of air pollution. http://www.who.int/topics/air_pollution/en/.
Clean Cooking Forum 2017 (CCF): The UN Foundation’s Global Alliance for Clean Cookstoves held its forum in New Delhi, India in October 2017 (United Nations Foundation, 2016). http://www.cleancooking2017.org/.
Global Platform on Air Quality and Health (Global Platform): The Global Platform is WHO’s collaboration with organizations working to implement and monitor air pollution abatement strategies. The Global Platform convened in 2014 and 2015 to “systematically consolidate data on air quality and health by bringing together information on air pollution exposure from different sources” (World Health Organization, 2017b). The final reports of these consultations are expected to be released soon. http://www.who.int/phe/health_topics/outdoorair/global_platform/en/.
Global Strategy for Women’s, Children’s and Adolescents’ Health, 2016–2030 (The Global Strategy): The Global Strategy is a collaboration led by the WHO working to put women, children and adolescents at the center of the SDGs. The Global Strategy focuses on improving access to clean sources of household energy. http://www.who.int/life-course/partners/global-strategy/global-strategy-2016-2030/en/.
WHA68.8: Health and the environment: addressing the health impacts of air pollution: Delegates at the World Health Assembly adopted Resolution WHA68.8 to address the impacts of air pollution, identifying air pollution as the world’s largest single environmental risk. http://apps.who.int/gb/ebwha/pdf_files/WHA68/A68_R8-en.pdf.
The WHO and the United Nations Children’s Fund’s Global Action Plan for the Prevention and Control of Pneumonia and Diarrhea (GAPPD): The program’s goal is to achieve universal access to drinking water in both health care facilities and homes by 2025. A core focus of the initiative is on improving indoor air quality (World Health Organization, 2016b, p. 7). http://www.who.int/maternal_child_adolescent/documents/global_action_plan_pneumonia_diarrhoea/en/.
One of the salient characteristics of air pollution is its spatial distribution. Once emitted, air pollution is capable of travelling long distances. Pollution is often not confined to any one country. Harms to both people and nature, therefore, have the potential to occur far from where the pollutants are initially discharged (World Health Organization, 2016b). Since the impacts from air pollution are widespread and broad, it would be helpful to obtain data connecting emissions, ambient concentrations, and consequent harms to human health.
Estimates of air pollution exposure vary by data collection technique. Air quality is measured by both satellite and ground-based methods (Engel-Cox, Kim Oanh, van Donkelaar, Martin, & Zell, 2013). Ground-based measurements are generally taken where a higher number of populations are exposed to PM2.5, which provides accurate data for local planning purposes (Engel-Cox et al., 2013). Ground-level measurements, however, are not taken in much of the world, with especially few measurements in many low-income areas (Hsu, Reuben, Shindell, de Sherbinin, & Levy, 2013, p. 562; Institute for Health Metrics and Evaluation & Health Effects Institute, 2017, p. 5). Satellite-based measurements provide estimates in areas where no ground-based measurements are obtainable (Engel-Cox et al., 2013, p. 585). Satellite monitoring can therefore provide a more complete air pollution picture globally. Synthesizing these two methods may environmental and public health practitioners with a more comprehensive measurement of air quality globally.
We focus on three indicators of exposure to air pollution, measuring PM2.5 and HAP. These indicators capture a substantial portion of the global variation in health impacts due to air quality, either because of the direct threat posed by these pollutants or because they are correlated with threats posed by other pollutants (World Health Organization, 2016b).
Box 5–1. False data and reporting distorts pollution estimates.
Despite the significant advances made in air quality monitoring technologies over the past 50 years (Engel-Cox et al., 2013), unreliable data continue to pose serious concerns for quality analysis. Without reliable data and information, environmental protection agencies will not have an appropriate gauge of local circumstances, cannot undertake appropriate pollution (and emissions control) benchmarking, and thus will not be positioned to make informed policy decisions.
Data reliability issues – problems with false reporting – are particularly acute Russia and China. In June 2017, seven staffers of the Environmental Protection Department in China’s Shaanxi Province were accused of tampering with air quality monitors and changing readings to show decreased levels of PM2.5 and sentenced to over one year of prison (Connor, 2016; Shepherd, 2017). Major coal-dependent areas within China have admitted to falsifying data about their GDP, making trends about emissions intensity difficult to interpret. For example, Inner Mongolia inflated data for, “added value of industrial enterprises of a certain scale,” by 40% in 2016. Liaoning province revealed they faked data for five years, while Binhai included the commercial activities of companies only registered in the area for tax purposes in their GDP (Zhang, Pong, & Hornby, 2018). According to China’s latest environmental protection law, which entered into force in 2015, anyone found guilty of altering air quality data will be held as accountable for the damages of the pollution they permit to occur (Ministry of Environmental Protection, 2016; Reuters, 2016). China’s leadership on improving data accuracy as a foundation for improved air quality shows that progress can be made – and that public health gains can be quickly achieved by addressing pollution problems more forthrightly.
HAP use is a significant environmental risk factor. Incomplete combustion of solid fuels produces a substantial amount of particulate emissions worldwide (World Health Organization, 2006a, 2017a). Humans exposed to HAP at high concentrations often suffer significant, negative health effects (World Health Organization, 2006b, pp. 62–66). Because exposure to HAP is often higher than other forms of air pollution, reducing the use of household solid fuels may improve human health to a greater degree than other air pollution abatement efforts (Goldemberg et al., 2000). The household solid fuel indicator is measured in DALYs lost due to HAP per 100,000 persons.
The DALY rate from household solid fuel use comes from IHME’s Global Burden of Disease (GBD) study available at http://www.healthdata.org/gbd. Data are gathered through nationally reported household surveys that estimate the proportion of household solid fuel as the predominate fuel source in a country (Bonjour et al., 2013).
Despite the strong relationship between the use of household solid fuels and health outcomes, our metric has multiple limitations. The limited knowledge regarding the size of the population exposed to various sources of air pollution, as well as imperfect data for the burden of air pollution-related diseases, are two of the primary reasons why multiple assumptions are necessary. Furthermore, standardization and double-counting issues, which emerge from the differing quality of data across countries, further complicate efforts to construct a global inventory or comparison of air pollution data. Finally, the type of predominant air pollution varies by regions. In urban areas, outdoor air pollution is the primary concern. Conversely, in rural regions, HAP is the more predominant issue.
Box 5–2. India’s LPG connection scheme.
Over the last decade, approximately 800 million people have gained access to improved cookstoves, largely due to efforts in China and Brazil (Pachauri, Brew-Hammond, et al., 2012, p. 1419). These countries have been successful in transitioning to cleaner fuels because of strong government commitments to both the distribution and the improved affordability of stoves. The Chinese government, for example, has committed to providing all citizens with a basic standard for living, establishing local energy offices that provide training and installation support (Pachauri, Brew-Hammond, et al., 2012, p. 1437). Similarly, the Brazilian government has implemented policies that use targeted financial assistance to support access to liquefied petroleum gas (LPG) for low-income families (Lucon, Coelho, & Goldemberg, 2004).
Building on the efforts of China and Brazil’s historic gains in access, the Government of India has made a concerted effort to expand access to modern cooking fuels. India has the world’s largest population without access to modern energy services. Over 800 million people rely on traditional biomass for cooking (Bhojvaid et al., 2014). The Pradhan Mantra Uijwala Yojana (PMUY) is a welfare scheme launched by the Government of India to provide 50 million LPG connections and stoves to below-poverty line (BPL) women by the year 2019 (Jacob, 2017). The scheme, which entered the implementation stage in March 2016, operates through a direct benefits transfer. Eligible women can apply for a LPG connection by submitting an application along with proof of identity and a bank account. When an application is approved, the applicant receives a direct transfer of funds straight into her bank account, which she may then use to purchase her LPG connection (Government of India, 2016).
India is nearly half way to its 2019 target of 50 million stoves. As of May 2017, over 20 million families had signed up for LPG connections (Mishra, 2017). A survey undertaken in 12 districts in Uttar Pradesh after the program was implemented showed that PMUY has helped save women an average of one to two hours per day that was previously used to collect fuels for cooking and heating the household (Mishra, 2017). In implementing this policy, the Government of India has made a concerted attempt to address the needs of BPL households and women. If its goals are realized, PMUY has the potential to positively impact the lives of millions of BPL households by providing them with access to safe, affordable cooking technologies and fuels.
Both chronic and acute PM exposure are associated with significant adverse health effects (Kloog, Ridgway, Koutrakis, Coull, & Schwartz, 2013; World Health Organization, 2016a). While chronic exposure is the biggest danger to mortality, exposure to high concentrations of PM2.5 in short intervals can also aggravate both lung and heart conditions. These acute pollution events degrade human quality of life, increase hospital admissions, and cause premature death (World Health Organization, 2006a).
We use two indicators for PM2.5: exposure and exceedance. Exposure to ambient air pollution is represented by population-weighted annual average concentrations, which take into account the proportions of the population living with different levels of pollution.
PM2.5 exposure. This indicator is a measure of the average amount of fine particulate matter in micrograms per cubic meter. PM2.5 average exposure serves as a measure of the amount a person would be exposed to on a typical day in their country (Engel-Cox et al., 2013).
PM2.5 exceedance. This indicator is a measure of the weighted average of the percentage of the population exposed to elevated levels of PM2.5, by measuring instances when PM2.5 concentrations exceeded 10, 15, 25, and 35 μg/m3, which are the WHO’s air quality guidelines and interim targets (World Health Organization, 2016a).
Table 5-2. WHO PM2.5 Guidelines.
WHO Air Quality Guidelines provide a basis for global limits on air pollutants that pose significant human health risks. Guidelines are available for particulate matter, ozone, nitrogen dioxide, and sulfur dioxide to help countries measure and monitor their progress over time. However, almost 90% of the world’s population currently live in areas that exceed WHO thresholds for air pollution (World Bank & Institute for Health Metrics and Evaluation, 2016).
Data for population-weighted exposure estimates of PM2.5 come from a synthesis of multiple datasets. The satellite-derived measurements were gathered by van Donkelaar et al. (van Donkelaar et al., 2016)and based on data obtained from the Tropospheric Emissions Monitoring Internet Service (TEMIS). Population data were obtained by the Earth Observing System Data and Information System, Gridded Population of the World, v4 at the NASA Socioeconomic Data and Applications Center (SEDAC) hosted by the Center for International Earth Science Information Network (CIESIN) at Columbia University’s Earth Institute (Center for International Earth Science Information Network - CIESN - Columbia University, 2016).
Data for these indicators are generated using satellite observations combined with ground-based measurements to correct for any potential bias. Using this method allows the PM2.5 indicators to be generated across countries and on a global scale (de Sherbinin, 2015). Population-weighting allows regions with higher air pollution and more individuals nearby to signify higher overall averages (de Sherbinin, 2015). Values are available from 2008–2015 for 228 countries and territories.
Ideally, monitoring data for PM2.5 would be collected throughout the year over numerous years. Most countries globally, however, do not operate robust systems of air quality monitoring stations, so other methods for measuring air quality are needed to provide a reliable view of pollution levels worldwide (Engel-Cox et al., 2013; Institute for Health Metrics and Evaluation & Health Effects Institute, 2017, p. 5). For these areas, satellite measurements are used to estimate exposures to PM2.5 (World Health Organization, 2016a).
Many factors make it hard to compare measurements of PM2.5 across multiple countries, including the locations of measurement stations, differences in measurement methods, and differences in the duration of air pollution measurement records. For example, if measurements were only taken for a portion of the year, the reported data may differ from the actual annual averages (van Donkelaar et al., 2016). Further, measurement issues could arise if monitors are disproportionately affected by one source of pollution (Brauer et al., 2016).
Box 5–3. Air pollution leads to as many premature deaths in India as in China.
Premature deaths from air pollution in China have begun to stabilize, while India has seen a steady rise in air pollution levels and PM2.5-related deaths – see Figure 5–1. Both trends are significant. China and India combined made up approximately 52% of the 4.2 million deaths globally in 2015 (Institute for Health Metrics and Evaluation & Health Effects Institute, 2017, p. 8).
Figure 5–1. Annual deaths attributable to PM2.5.
China has taken several steps over the past ten years to reduce the number of deaths related to air pollution. Among other policy initiatives, the country restricts traffic flow and construction activities during time periods with heavy pollution. One of the most heavily polluted cities in the world, Beijing, broadcasted a ‘red alert’ pollution warning level for the first time in 2015, which forced the government to implement policies to limit the human exposure to dangerous pollution levels (British Broadcasting Corporation News, 2016). Due in part to government regulation, China has made substantial progress implementing effective policies that target air pollution.
Meanwhile, India has made little progress reducing air pollution levels (Rowlatt, 2016). In November 2017, the government in Delhi declared a state of emergency. Particulate matter levels reached recorded highs of 969 ug/m3 (for real-time updates, the US embassy’s air quality index can be accessed at http://aqicn.org/city/delhi/r.k.-puram/). The WHO considers anything over 25 ug/m3 to be unsafe (World Health Organization, 2006a). To put this into perspective, news sites were reporting that breathing the air in Delhi was “equivalent to smoking 44 cigarettes a day” (Wu, 2017). Arvind Kejriwal, Delhi's chief minister, even described the city as “a gas chamber” (Kejriwal, 2017). Blaming farmers who clear fields by burning crops, Kejriwal went on to say, “[e]very year this happens during this part of the year. We have to find a [solution] to crop burning in adjoining states” (Kejriwal, 2017).
Like Beijing, the government in Delhi has started to implement policies targeting their air pollution levels. These strategies include shutting down schools and suspending construction projects (Institute for Health Metrics and Evaluation & Health Effects Institute, 2017; World Bank and Institute for Health Metrics and Evaluation, 2016). If appropriate measures are enacted, India can learn from the success of the actions taken in China to decrease the levels of air pollution.
Air quality remains a prominent risk to both public health and the environment. Countries can improve the overall health of their population by reducing exposure to air pollutants. Pollution is particularly severe in places such as India and China, where greater levels of economic development contribute to higher pollution levels (World Bank and Institute for Health Metrics and Evaluation, 2016).
Table 5–3. Global trends in Air Quality.
Note: Metrics are in units of age-standardized Disability Adjusted-Life Years lost due to each risk. Current refers to the most recently available data, and Baseline refers to historic data approximately ten years previous to Current.
At the global scale, DALYs lost due to air pollution have declined over the last decade. Global trends, however, hide regional inequalities. Air pollution in many low-income and developing countries, however, is higher due to a greater use of household solid fuels for cooking and heating homes (Desai, Mehta, & Smith, 2004). Conversely, most high-income and developed countries see small effects from household solid fuels. Countries with continued high scores, such as Australia and Barbados, show long-term commitments to reducing the levels of air pollution. Large populations, however, still experience severe impacts stemming from poor air quality, notably in India, China, and Pakistan – see Table 5–5.
Table 5–4. Leaders in Air Quality.
Changes in global air quality over the course of a decade reveal important regional trends. Our results find that most European, North American, and Latin American countries have comparably higher scores, that we may associate with lower pollution levels and lower DALY rates. Many Central and South American countries, for example, have implemented successful fuel switching campaigns aimed at reducing household air pollution. Smart subsidies and other forms of financial assistance are key components of policies on LPG access, including Brazil and Peru (Lucon et al., 2004).
Table 5–5. Laggards in Air Quality.
Nearly all countries at the lower end of the global ranking are African or Asian nations. The most significant decrease in air quality and global air quality ranking over the past ten years has occurred in Singapore. Singapore’s score dropped by almost 30 points, causing them to fall 111 spots in our ranking. While Singapore received high scores for household solid fuels both in 2016 and in 2005, their substantially lower scores for PM2.5 exposure and exceedance account for significantly decreased air quality scores. In 2015, fires swept through Indonesia causing the most significant reason for Singapore’s drop in ranking (Weisse & Goldman, 2017). The Ministry of the Environment and Water Resources has reported that, over the past two years, Singapore has not met its PM2.5 target, PM10 target, and ozone target, and is not are not on track to meet WHO’s air quality targets by 2020 (Othman, 2017). In speaking about Singapore’s current trajectory, Masagos Zulkifli, Singapore’s Minister of Environment and Water Resources, emphasized that Singapore is committed to findings ways to address air pollution. “Unfortunately if you look at our trajectory, we are not meeting our targets and therefore we need to do more to ensure that our air pollution issue is being addressed” (Othman, 2017).
While neither leaders, nor laggards, countries in the Middle East, such as Bahrain, Iraq, Kuwait, Oman, Saudia Arabia, and United Arab Emirates, experienced the most substantial increases in their scores over the past decade due to decreasing levels of air pollution-related DALYs. Bahrain and Iraq improved their air quality and thus increased their scores most significantly, jumping up in the rankings by 47 and 46 places, respectively. Our World in Data reports that one reason DALY rates have substantially improved are the effects of increased wealth and quality of life in the region (Ritchie & Roser, 2017).
Our findings illustrate the impacts of air pollution on human health globally. Increasing our knowledge on the links between air pollution and disease is fundamental to reduce the public health burden worldwide, and we can begin to lessen the effects of air pollution (Institute for Health Metrics and Evaluation & Health Effects Institute, 2017).
Desai, M. A., Mehta, S., & Smith, K. R. (2004). Indoor smoke from solid fuels: assessing the environmental burden of disease at national and local levels. Geneva [Switzerland: Protection of the Human Environment, World Health Organization.
Goldemberg, J., United Nations Development Programme, United Nations, & World Energy Council (Eds.). (2000). World energy assessment: energy and the challenge of sustainability. New York, NY: United Nations Development Programme.
World Health Organization (Ed.). (2006a). Air quality guidelines: global update 2005: particulate matter, ozone, nitrogen dioxide, and sulfur dioxide. Copenhagen, Denmark: World Health Organization.
World Health Organization (Ed.). (2006b). Fuel for life: household energy and health. Geneva: World Health Organization. | 2019-04-25T03:05:31Z | https://epi.envirocenter.yale.edu/2018-epi-report/air-quality |
A ' DEW-POND is an impervious or watertight hollow artificially excavated on a hill-top, deriving its main supply of water from dew, fog, and mist. It is obvious that every pond must receive a greater or less amount of rainfall, but a real dew-pond does not depend chiefly on that source. Neither is it largely fed by surface drainage, least of all by springs.
The name dew-pond is in common use, and is favoured by writers on the subject ; nevertheless, it is partly a misnomer. Dew is an inadequate factor in keeping the ponds full, it is more or less universal throughout a given area, and it affects lowland ponds as well as those of the uplands. Correct notions on this point are desirable, especially if we accept the modern theory of the formation of dew.
Dr. John Aitken, in an address delivered before the Royal Society of Edinburgh in 1885, described a series of elaborate and careful experiments made by him in order to ascertain the origin and nature of dew. His conclusions were partially opposed, or at the least supplementary, to those of Wells, whose theory of dew,1 propounded in 1814, had been accepted by all subsequent writers. Dr. Aitken claimed, with some reason, to have demonstrated that the greater part of a deposit of dew is formed of night vapour that has just risen from the ground, and has been trapped and condensed by grass and other objects in its course up-wards.2 This theory, supported by many careful experiments, is, at any rate, worthy of careful consideration, for, if correct, it would imply that a portion of the water of a dew-pond is derived from the pond itself by previous evaporation. To this extent the popular idea of the source of supply of dew-ponds is plainly erroneous.
Dew, as we shall shortly see, adds its quota to the supply of the pond, but if this moisture first rises as vapour—a vapour which from accidental circumstances, such as the advent of a slight breeze, may not be laid down as dew—a more comprehensive name must be sought for the ponds. Dew is believed to be deposited without the aid of a cloudy intermediary, the vapour from which it is condensed existing in an invisible state. Again, dew and fog may occur together, and when there is fog hanging over the hills there is generally dew on the grass. The heaviest dew, however, would not deposit from one to two inches of water on the grass, an amount which has been recorded as the rise in level of a dew-pond in a single night.
Mr. G. Dines, as quoted by Mr. E. A. Martin, concluded, as the result of observations, that the average annual deposit of dew on the surface of the earth actually falls short of 1.5 inches (see footnote to Table of References, Chapter XIV). Moreover, high downs are much exposed to wind, and dew is with difficulty formed under windy conditions, because the moving air does not remain long enough in one place to allow condensation to take place.
In Wiltshire, I have observed that the peasants talk of a ' mist-pond '. An old labourer of eighty, who, until five or six years ago, lived near Worms Heath, Surrey, applied the same term to the pond there. ' Mist-pond ' is also reported from Kent.3 Mr. F. J. Bennett has suggested ' mist-and-rain-pond ', which has the merit of preciseness, but the demerit of length. Even then, ' mist ' must be held to include ' fog ' also. In any event, while we continue to use the name dew-pond, we should remember its draw-backs.
As to geographical distribution, the dew-ponds occur most generally on the Chalk Downs of the South and South-East of England. They abound in Sussex and Hants, and are not uncommon in Berks. and Wiltshire. The example illustrated (Fig. 27) is from Surrey. No dew-ponds seem to have been reported from Hertfordshire, but structures by some considered quite analogous, have been noticed on other geological formations in Warwick and Suffolk. Records have been also garnered from the South of Portugal.4 Marshall, in 1798, noticed Yorkshire ponds which had some likeness to our Southern ones.5 The Lincolnshire wold farmer of to-day secures reserves for a dry season by the construction of a huge tank of galvanized iron. Much further information and more extensive records concerning distribution are desirable, but meanwhile it is essential to remember, especially when we discuss the question of age, that absence of dew-ponds in one district and presence in another tells neither way. Other places, other modes ; and this diversity may be as true of water-supply as the variety of contemporary dwellings, customs, and occupations.
if a little poetical licence be allowed for unfed ' (not visibly fed). At first thought, the replenishing of a pond during a drought, and the actual diminution which sometimes occurs during a moderately rainy season, are startling and paradoxical facts.
The site having been selected, earth is scooped out, much in excess of the requirements. A coating of dry straw is laid over the bottom. Then follows a layer of well-chosen, finely-puddled clay, and over this, again, stones are closely strewn. Lastly, the margins are effectively protected by well-beaten clay.12 The writers lay stress upon the dry straw as an essential part of the structure. Independent inquiry, however, shows that the use of straw is far from being general. I have even heard its employment strenuously denied, but, as with other sweeping statements, some qualification must be made. Where straw is used—if it be still used, it doubtless assists the puddling process, by toughening the clayey floor, and by permitting of expansion and contraction without any cracking of the material. Unhappily for theories, the premiss is not always clear. Messrs. Hubbard make the straw to be the bottom layer ; other writers place it as a middle bed.
Much to our loss, White of Selborne gives no account of the making of a dew-pond, but Marshall, who wrote a little later (1798), speaks of the Drinking Ponds ' of the Surrey Downs and describes their construction. Each bason ', as he calls it, was lined with a coat of chalk, six or eight inches thick, beaten down with rammers. Next, a grout or batter, com-posed of pounded chalk and hot lime, was evenly spread over the hollow, to a thickness of half an inch. Two or three other coats were then usually applied, to ' glaze ' the bottom and prevent the ravages of worms. Marshall adds that these sheep ponds should be railed in so as to keep off cattle and horses.19 The method just described differs largely from that given by Messrs. Hubbard, but a survival, or recurrence, of this mode of construction is seen in the cemented or concrete-faced ponds now becoming common. Mr. C. J. Cornish records a dew-pond with a concrete bottom, situated on the Brightstone Downs in the Isle of Wight, which has never run dry for thirty years. Edward Lisle (d. 1722) recommends that artificial ponds should have four equal slopes, and should be ' covered with a gravel or a mortar earth, four or five inches on the tops, which, cattle treading in, will cement with the clay, and bind . . .' This idea of the results of treading is erroneous, but Lisle also advised that the pond should have ' shade ' to prevent the cracking of the clay.
Just noticing, as we pass, the allusion to straw, one may observe that the supply from rain-flow would be wash ', that is, mud and water, and this, in time, would tend to choke up the hollow. The best dew-ponds are said to be those of the Sussex Downs, near the sea ; these ponds get the full benefit of sea-fogs, and the first draught of the moist South-West winds.
Let us next see if there is unanimity concerning the source of the bulk of the water of these ponds. In other words, are they Mist-ponds or Rain-ponds ? Mr. Slade, in the little treatise before quoted, boldly avers that Rain is the main, if not the whole source of the pond's supply ' 24 And again, Heavy rains increase the value of the rainfall '—a safe statement, surely—' while minor neither increase nor diminish it.' He appends numerous tables of observations upon which his conclusions were based, as well as some graphic representations of the fluctuating supply. In view of more recent experiments, one is driven to believe that there must have been some serious error which vitiated most of Mr. Slade's experiments. Indeed, at the end of his tractate he seems to reveal a little misgiving on his own part, for in a footnote this remark occurs, The annual condensation [presumably by the water of the pond] will be found to bear but a small ratio to the annual rainfall.' 25 Such a statement cannot be accepted as axiomatic. It does admit the agency of fog, but depreciates, on inconclusive evidence, as will be shown, its total effect. It should also be added that Mr. Slade's experiments appear to have been concerned chiefly, if not entirely, with one pond.
Aitken's teaching about rising vapour seems here to get support.
That twinkle into green and gold."
Mr. Clutterbuck gives calculations for ascertaining the volume of the unseen supplies of water, but as he assumes an average daily amount to be consumed by each member of the flock, his conclusions are necessarily faulty, and of vagrant interest only.
It will, however, be worth while to step outside the strict limits of our investigation, and ask what explanations of the principle of dew-ponds have been put forward. This done, we must return to our real inquiry, the age and origin of the ponds.
Surely the straw must ultimately become wet under any conditions, be the clay rammed never so tightly. Springs may be neglected, as being unusual. Would it not be possible for the straw to get sodden by hydrostatic pressure from below ? We remember, too, that some authorities make the straw the middle layer, not the bottom, as in Messrs. Hubbard's plan. Moreover, as a fact, the tread of animals penetrates the clay crust, and the pond, though impaired in efficiency, yet continues to serve for years. What, too, of those ponds, evidently the majority, in which straw is not used ? Neither Marshall nor Jefferies mentions straw ; inquiry to-day traces it only doubtfully in most districts. Theories based on the non-conductivity of this material could therefore, at most, give only a partial solution ; where the straw is absent, they are worthless. Dry straw, indeed, as already noted, is said by Mr. Collett to be employed by the Berkshire craftsmen when lining the pond at the present day.33 Clutterbuck also mentions straw, though he describes its purpose differently. Speaking of the making of a pond, he remarks, ' As the portions are finished, they are protected from the action of the sun and atmosphere by a covering of straw.' 34 This seems to refer to a temporary loose bed of straw placed over the crust until nightfall arrives and the pond is to start its history.
Clutterbuck tells us that when all is finished water is introduced by artificial means. If obtainable, he advises piled-up snow as the readiest and least expensive method of securing a start ; wattled hurdles should be erected to encourage, during a snowstorm, the requisite drifting.35 A century ago, Davis recorded this filling with snow ; the after-supply, he asserted, is kept up by clouds and dew.
In the neighbourhood of Calcutta ice is obtained by placing porous earthenware pans of water in an earth cavity lined with rice straw. The straw seems here to have some value.
A third hypothesis, propounded in 1900 by Mr. A. Marshall, teaches that there is a difference of electric potential, and therefore an attraction is set up between the innumerable particles of fog-water and the summit of the hill on which the pond is situated. Mr. Marshall suspended two porcelain basins, alike in all respects, by silk threads over a spot on the South Downs. An upright sheet of copper was placed in each basin. One basin was allowed to remain insulated by the silk thread, but the other was earth-connected by wire. During the night of April 1, 1899, when a thick mist prevailed, the bathe the insulated ' screen ' received 155 c.c. of water, the other, with the earth-connected screen, collected 18.0 c.c. The insulated apparatus tended to get an electrical charge from the particles of moisture, therefore the attraction was less than in the apparatus earth-connected. The result was the more remarkable, as the silk soon became saturated, rendering the insulation imperfect.37 I quote Mr. Marshall's account, adding the simple comment that it seems to furnish a probable, though only partial, explanation of the phenomena.
To test the ' distilling ' power of trees, Mr. C. J. Cornish placed two vessels out of doors on a dewy evening. One was put under a cherry-tree in full leaf, and the other on stone flags away from trees. The latter vessel would be affected by dew and by the more limited condensation only, the former received the drippings from the cherry-tree. In the morning the vessel under the tree was found to contain twice as much water as the other.40 In the Indian jungle, amid dews and mists, water patters from the trees like rain. Briefly, the predilection of the flock-master for a co-operating tree seems to be justified by results, and we may conclude that trees enhance the efficacy of the pond.
A few additional considerations are worth submitting. Wells cites experiments performed by Six, showing that there is a fall in temperature of 1° F. for an ascent of 250-300 feet." Closely connected with this fact, no doubt, is the increase of rainfall in elevated regions, amounting to 3 or 4 per cent. for every 100 feet of rise 42 Again, as noted by Miall, the evaporation on high grounds, owing to the diminished temperature, is less than on low lands." There are times, too, as Baldwin Latham observes, when the water in a pond at great elevation seems to be in direct communication with the clouds, though the sky around is quite clear."
The theoretical aspect of dew-ponds has no* been treated with a fullness which may be pardoned in view of the scanty and little-known references to the subject in our scientific literature. We must now return to the high road of our mental journey.
We have seen that some of the dew-ponds are modern constructions. We now ask, Are all dew-ponds of recent date ? Mr. Slade, referring to examples in his own district of Wallingford, asserts that dew-ponds were not known there till about the year 1836.45 Thomas Davis notices them in Wiltshire thirty-five years earlier. Mr. Clutter-buck states that in one known instance the increase in the number of dew-ponds has been a matter of definite arrangement between landlord and tenant.46 This, of course, merely proves that dew-ponds are made at the present day.
Beyond the early eighteenth century, records do not seem to be available. Folk-memory is wanting, or is, at any rate, bemused by educated influence. If the dew-ponds actually existed at any period previous to the ' wool-growing ' centuries—the fifteenth and sixteenth—their introduction perhaps followed a disconnecting gap. Something of this kind, we have seen, appears to have occurred in connexion with linchets and chalk-wells. It is true that agricultural methods change slowly, and there is a possibility that a few of our extant dew-ponds are survivals from early times, and have been again and again repaired. Bearing in mind the shifting of the old population from the hills to the vales as the woodlands were cleared, I should nevertheless doubt whether the present ponds antedate the period of the Mediaeval sheep-masters. Valley pastures are usually well watered, but when the wolds and downs again came into use as sheep-walks, ponds would be essential accessories.
Yet there is a likelihood that dew-ponds of some kind were known to our ancestors of the Neolithic and the Bronze Ages. First, there is forced upon us an a priori probability, amounting almost to conviction, that excavations of this nature must have been known and utilized. Water was needed. Depressions are discoverable in the ground near old settlements, and are not always of the hut-circle type.
The primitive settlers of the hill-tops, who have bequeathed to us their camps, barrows, and cultivation terraces, had, above all things, an imperative need of a constant water-supply. To state an example : Within an area of 160 square miles on the South Downs, Mr. A. H. Ahicroft has counted sixteen prehistoric forts, belonging to the Neolithic and Bronze periods ; the number was doubtless once greater. In the absence of direct and positive evidence, we are justified in pursuing the exhaustive or eliminative method of inquiry.
Years ago, when General Pitt-Rivers was examining Winklebury, he was struck by the absence of any visible signs of a water-supply. The nearest place where water can be obtained in modern times is at the foot of the hill, 850 yards to the West of the camp.52 A spring on the plain below is traditionally said to have been used in the Middle Ages. Could such sources have been satisfactory in Neolithic times ?
We remark, first, that the interior division of the camp was considered by Pitt-Rivers to have been reserved for cattle. The theory that such forts as Winklebury were refuges for men and their herds in times of strife may be indeed taken as rightly well-trusted. But it must not be overlooked for an instant that ancient herdsmen would require water for their flock at all times, in peace or in war. Water must therefore have been found for oxen and sheep as well as for tribesmen.
Setting aside the need of adequate supplies for grazing animals, let us admit that a permanent investment of a refuge-fort was an unlikely event. We still have to meet the fact that neither man nor beast can live many days without water, much less could warriors so deprived keep up physical strength for defence. Nor would the quantity of water required be small.
Did the inhabitants carry into the camp a supply sufficient for two or three days ? This is doubtful ; first, a hostile inrush would permit little preparation, and secondly, primitive skin bottles and earthenware pans would hardly meet the demand. No ; rather is it a modern question which says, Whence shall we bring water? Primitive man went where the water existed, or could be readily obtained. We may be sure that not even under the severest stress would he live on the hill-tops unless he could easily satisfy this first necessity.
Did wells, yet undiscovered, exist within the entrenchments ? We know that Normans, Saxons, and Romans were in the habit of sinking wells. Yet few Roman examples have been discovered on the Chalk Downs. I think that the reason is obvious. The requisite depth of bore would be almost prohibitive of attempts at this kind of work.
In his long and painstaking explorations at Cranborne Chase, General Pitt-Rivers discovered no wells on the high ground near the crest of the hills at Rotherly (Wilts.). On the lower levels, at Woodcuts, over the Dorset border, the spade exposed two wells, one of which was proved to be of Roman date by the finding of the remains of a Roman bucket at the bottom. This well was 188 feet in depth.53 Holes or ' put-logs ', 12 inches apart, were cut into the sides of the shaft." The shallower well, driven to a depth of 136 feet only, showed no sign that water had been reached.
A modern Woodcuts well, sunk from a level 77 feet below the site of the ancient borings, yielded no water until the rock had been drilled to a depth of 211 feet. And to-day, the only sources of water in the Chase, wherever there are no wells, are dew-ponds and the roofs of buildings. General Pitt-Rivers thought it probable that at Winklebury there may exist wells hitherto unrevealed to the investigator, but, on the whole, he inclined to settle the matter by postulating a much higher water-level in ancient times.
Should wells ever be discovered at Winklebury, they will most likely be of Romano-British date. The question is not, however, Did the Romans and Romano-Britons bore wells ? but, Did the earlier folk, equipped with rough spades of bronze and flint and mattocks of deer-horn, essay such a task ? Until we conceive this probable, and can assume that the tribesmen knew that water existed at great depths—until, in short, some Neolithic wells are produced in evidence—we may well hesitate to speak affirmatively. If the dene-holes should be cited as parallel constructions, we would answer that the true dene-hole is seldom even conjecturally Neolithic, or even of Bronze Age. While dour compels one to admit that the tasks of sinking andour a dene-hole and a well respectively are somewhat fairly equated, yet so long as a simple solution offers itself, we need not search for a complex one.
Remembering that the water-level of the Chalk, especially in the neighbourhood of large towns, is sinking year by year, owing to both natural and artificial causes,56 the existence of a higher level in Roman times can scarcely be contested. Whether as great a difference as, say 40 feet, may be assumed, is debatable. Again, a conclusion based on the comparison of one modern well with one ancient well, without close knowledge of the dip of the Chalk, of possible faults, of the presence or absence of swallows' and large fissures, is not unassailable. But in the two cases given, it is not a difference in level of 40 feet, but of 100 feet, which has to be accounted for. (Woodcuts modern well, 211 feet + 77 feet 288 feet ; Roman well, 188 feet.) Taking the greater limit actually asked for by Pitt-Rivers, namely 50 feet, such a rise in the water-level would not materially affect camps constructed at such elevations at Winklebury and Maiden Castle. Fifty feet will scarcely meet the difficulty, for Mr. Clutterbuck states that the water-level of the Chalk varies from 100 to 400 feet beneath that of the ponds,57 whose elevation generally corresponds with that of the camps. In the present state of our knowledge, the well theory must be deemed untenable. On the other hand, if we consider that General Pitt-Rivers's reasoning is valid, it will, while removing the necessity for dew-ponds, lend one more testimony to the belief in the existence of ancient hill-top communities.
Once more ; a spring or bourne generally leaves some trace in the form of a gully or dry water-course, and this might actually be intensified after long sub-aerial denudation. Some traces of this kind should remain, because turfed ground is excellently adapted for the preservation of such features.
Not to lose sight of the chief question, it must be repeated that the camps are largely pre-Roman, and we have to inquire how the inmates secured one of the prime necessities of life. The query becomes more pertinent if we leave Winklebury, and consider a ' contour fort ', like that of Cissbury, where we know that there was a permanent settlement of men engaged in mining and working flint. Not only was Cissbury, with a periphery of 1 miles, a settled camp, but it was doubtless occupied continuously from day to day, for we cannot suppose that the inhabitants climbed up the hill every morning and down in the evening, and that they carried with them a daily supply of water. Yet this must be conceded, if we reject the presence of wells or springs, unless indeed there is some fourth explanation forthcoming.
There is such an explanation—the possibility that dew-ponds, or hollows of a kindred nature, were utilized. The evolution of the dew-pond, first suggested, I believe, by Mr. F. J. Bennett, is worth considering.58 The ditches of the earthwork camps would be constantly trodden down, first by the excavators, and afterwards by the members of the garrison and their impounded cattle. We have only to suppose a surface of Clay-with-flints, or any other retentive clay, and it is evident the fosses would soon contain water. Additional defence would thus be provided, and, during warfare, perhaps a supply of drinking water, in addition. Mists and dews would soon have free play, and the greater rainfall would keep up the reserve. In the course of time, the trenches might be closely rammed of set purpose. Finally, dew-ponds, imperfectly water-tight, no doubt, might be designed within or near the fort.
The accidental puddling of trenches came under the writer's notice in April 1905, when examining the series of round barrows on Povington Heath, Dorset. The weather had been dry for many days previously, and the thirsty heath, save for an occasional bog, was much parched. Where, however, the trenches encircling the barrows had a slightly clayey bottom, the water was held up. The trampling of moorland sheep and cattle may have helped in the puddling, though in the modern artificial dew-pond, where specially constructed layers or crusts are concerned, such action would have a reverse effect.
There have also probably always existed, here and there, a few natural dew-ponds, formed by depressions in the Clay-with-flints, or in Eocene clays.
It may be objected that prehistoric villagers could not have understood the principle of dew-ponds. The objection is sound, but we reply, ' Neither would they understand, except experimentally, why a clay-lined earth-cavity, or a crude pan, would retain the water in which primitive folk are accustomed to parboil their meat.' Puddling was resorted to in each case. Experience was the only light, as it is to the average flock-master of the twentieth century. One repeats, though it ought not to be necessary to say it at all, that practice does not always involve a knowledge of theory.
The theory of the development of dew-ponds above sketched may or may not be correct. But there is a coincident clue. Richard Jefferies, who shall be cited, not as possessing authority, but as one who had shrewd native insight in matters affecting agricultural economy, observed that two modern dew-ponds are situated near isolated camps in Wiltshire. He was led to infer that similar ponds could have furnished the only available supply to the ancient communities.59 It is necessary to state that in this and other counties modern ponds are sometimes found near old forts, but these instances of juxtaposition do not exhaust all the evidence.
We may now reasonably ask whether some of the depressions in the vicinity of ancient earthworks were not dew-ponds. The hollows may be dry, or they may be choked with rank vegetation. They may, again, still be subject to swampiness, as in the depression which I have elsewhere reported from Henley Wood, Chelsham (Surrey).60 An oval hollow, quite dry, occurs a little distance away. Mr. Bennett records a small dew-pond at Ladle Hill Camp, Berkshire, which is probably of recent construction, but he also mentions several hollows, seen by himself and Major Cooper King at Perborough Camp (Berks.), which may represent ancient ponds.61 A pond situated towards the South of Chanctonbury Ring, Sussex, in a direct line between that earthwork and Cissbury, is believed to be ancient, though it has probably been cleared more than once. Two modern ponds are to be seen in the neighbourhood. At the Eastern angle of the fort on Ditchling Beacon (800-50 feet) there is a dew-pond, probably of ancient date. There is also, at the North-west, what the historian calls a rain-water pond ', now dry, considered to be coeval with the earthwork, because the ramparts have been modified in order to induce supplies (Fig. 28).62 Another example may also be traced hard by. Other dew-ponds, of unknown age, lie to the West.
Further examples can be given. Visitors to Maiden Castle, near Dorchester, may see, within the actual fort, what was probably an ancient pond. Messrs. Hubbard have described a dried-up dew-pond in St. Martinsell Camp, near Marl-borough." They give other instances, some of which must be received under reserve, until we know whether or not they are of modern construction.
The only instance yet noted where the pond is within the camp is the already-cited case of the Dorsetshire Maiden Castle. It is suggested that, in the majority of cases, such a position would be shunned because of the trampling of cattle.
I have tried to present Messrs. Hubbard's theories with all possible fairness, though I think that the writers go much farther than the data warrant. Before these speculations can be heartily accepted, more must be known. Mean-while the ideas offered to us stimulate thought and encourage a search for further details.
Facts and opinions may now be gathered and allowed to converge. That many dew-ponds are of recent date admits of no question. Generally, the excavations have a recorded history of two centuries only. Probably, however, they existed from the fifteenth century onwards. They would not be needed in Norman and Saxon times. The old mound-builders required a good water-supply, and there is no available proof that the water-level of the Chalk was sufficiently high to feed the down-tops ; a definite verdict on this matter must nevertheless be suspended. Celtic farmers and their Neolithic predecessors cannot be proved on present testimony to have been well-sinkers. Lastly, hollows of the dew-pond kind would have served the purposes of the dwellers in the forts, though the ponds could not have been dug on scientific principles, being partially rain-fed, and occasionally failing of their purpose. And, indeed, all ponds situated at great heights must be to some extent fed by showers of rain and snow.
If we accept the prehistoric dew-pond, we need not rush to the extreme of thinking it the only possible mode of obtaining water. On a hill of moderate elevation, with a favourable concurrence of geological conditions, intermittent bournes or lavants ' might serve very well. Advantage might be taken of natural or artificial runnels whenever there was a downpour of rain, no unusual event. Temporary camps or earthworks constructed for special purposes might be intentionally planned near running streams. Thus, ancient pits, presumably for habitation, once existed near a constant spring at Coombe Hill, Croydon,68 though no trace of either huts or spring is now to be found. Another most important consideration is that away from the Chalk Downs there were often alternative sources of supply. Hence, as with dwellings and settlements, there may have been contemporaneous diversities.
The desertion of the upland camps and settlements led to new requirements and new systems. The Teutons who tilled the valleys needed the dew-ponds little, if at all. Springs and rivulets sufficed, otherwise wells were bored. When the down-tops were once more required as sheep-walks, dew-ponds would again be a necessity. Guided by experiment and observation, the Mediaeval husbandmen and shepherds trod safely the path along which the ancients, with more or less success, patiently groped. The folk-memory of ponds was, for the time, rejuvenated. Once more tradition failed, and once more it was taken up in the nineteenth century.
Actual continuity of dew-pond construction has not been proved, perhaps cannot be proved. The same may be said of the very antiquity of the ponds. The archaeologist would be pleased were the feat possible, but it is entertainment enough to give reasons showing that the ancient and modern methods of the husbandman and the shepherd probably approximate.
*1. For old theory, see W. C. Wells, ' Essay on Dew,' 1818 (preface dated 1814). Also good summary, T. H. Huxley, ' Physiography,' 1885, p. 54.
*2. Trans. Roy. Soc. Edinburgh, xxxiii (1886), pp. 9-64. * Summary in Chambers's Cyclopaedia, 1904, iii, p. 782.
3. Eng. Dial. Diet., under Mist-pond'.
*4. Rept. Brit. Assoc., 1900, pp. 585 et seqq. ; Nature, lxiii (1900), pp. 20-1.
*5. W. Marshall, Rural Econ. of the Southern Counties,' 1798, ii, p. 398. Wiltshire dew-ponds are noticed in Wilts. Archaeol. and Nat. Hist. Mag., xvii, 1878, pp. 299-300.
*6. Spectator, Nov. 16,1901 (lxxxvii, pp. 755-6).
7. Nature, lxii, 1900, p. 495.
*8. G. White, Selborne ' (Harting's edition, 1880), pp. 225-6. Gideon Mantell, in 'Geol. of S.E. of England,' 1833, p. 9, n., quotes White, and mentions the natural stocking of ponds with animal and vegetable life.
9. Spectator, lxxxvii, p. 990.
10. E. A. Martin, in Knowledge, N. S., iii, 1906, p. 481.
*11. A. J. and G. Hubbard, Neolithic Dew-Ponds and Cattle-Ways,' 1905, pp. 2-4 (speak of wandering band). Stationary workers referred to in S.E. Naturalist (1906), pp. xxxix, xl, 20.
12. Neolithic Dew-Ponds,' p. 3. *13. Nature, lxiii, 1900, pp. 20-1. 14. Knowledge, N. S., iii, 1906, p. 481.
*15. H. P. Slade, A Short Practical Treatise on Dew-Ponds,' 1877, p. 30. 16. Ibid., p. 12. 17. Ibid., p. 6.
*18. R. Jefferies, Wild Life in a Southern County' (new edition, 1889), pp. 25-8.
*19. Rural Econ. of S. Counties,' ii, p. 398. Cf. E. Lisle, ' Observa-tions in Husbandry' (ed. by T. Lisle, 1757), ii, p. 406.
*20. C. Reid, in Miall and Fowler's edition of White's Selborne,' 1901, p. 166, n.
21. Proc. Geol. Assoc., x, p. 377. Cf. Cobbett, Rural Rides,' i. p. 20.
*22. J. Clutterbuck, in Jour. Roy. Agric. Soc., i (2nd Ser., 1865), p. 273. Cf. T. Davis, Wiltshire Agric.,' 1811, p. 13.
*23. A. Collett, in Macmillan's Mag., N.S., i, 1906, p. 217.
24. Slade, Treatise on Dew-Ponds,' p. 20. 25. Ibid., p. 31. *26. C. J. Cornish, The Naturalist on the Thames,' 1902, pp. 129-30.
A capital summary given in the Spectator, lxxxvii, 1901, pp. 775-6. 27. In Memoriam,' c. xi, v. 2.
*28. White's Selborne ', Harting's edition, 1880, p. 226. The damp, foggy atmosphere of the Downs is well described in J. H. Shorthouse's John Inglesant ', 1887, p. 20.
*30. White's Selborne ', annotated by Miall and Fowler, 1901, p. 164. Rept. Brit. Assoc. (1900), pp. 585 et seqq.
*31. ' Neolithic Dew-Ponds,' pp. 2, 3. 32. Ibid., pp. 3-4. 33. Macmillan's Mag., N. S., i, 1906, p. 216.
*34. Jour. Roy. Agric. Soc., 2nd Ser., i (1865), pp. 281-7.
*36. Spectator, lxxxvii, 1901, p. 798.
*37. Nature, lxii, 1900, p. 495.
*38. White's Selborne ' (Miall and Fowler), pp. 165-6.
40. ' The Naturalist on the Thames,' pp. 130-1.
*41. W. C. Wells, ' Essay on Dew,' p. 225.
*42. Ganot, ' Physics' (12th edition, Atkinson, 1886), p. 961. 43. Ibid., p. 316 ; White's Selborne' (Miall and Fowler), p. 165. *44. Proc. Geol. Assoc., x, p. 377. 45. Slade, ' Treatise,' p. 6. 46. Jour. Roy. Agric. Soc., 2nd Ser., i, pp. 281-7.
*47. Macmillan's Mag., 1906, pp. 216-17.
*48. C. Vancouver, Agric. Survey of Hampshire,' 1813, i, pp. 47-8. * Cf. W. Cobbett, Rural Rides' (1886), i, p. 20.
*49. C. Packe, Philosophico-Chorographical Chart of East Kent,' 1743, pp. 87-8.
50. Murray, ' Handbook to Kent,' 5th edition, 1892, p. 37.
*51. C. F. Dowsett, Winklebury Camp,' 1904, pp. 4, 7 ; also Times, Nov. 26, 1900.
*52. ' Excavations in Cranborne Chase,' ii, p. 237.
*53. Ibid., i, pp. 10, 27-8. 54. Ibid., ii, p. 237. 55. Ibid., i, p. 28.
*56. ' Neolithic Man in N.-E. Surrey,' pp. 25-6.
*57. Jour. Roy. Agric. Soc., i, N. S., p. 273.
*58. Trans. Newbury Field Club, iii, pp. 257-8.
*59. R. Jefferies, ' Wild Life in a Southern County,' 1889, pp. 25-8.
*60. ' Neolithic Man in N.-E. Surrey,' pp. 83-4.
61. Trans. Newbury Field Club, iii, pp. 257-8.
*62. Vict. Hist. Sussex,' 1905, i, pp. 460-1. The Sussex ponds are dealt with in the abstract of a paper by A. H. Allcroft, Morley College Magazine (London), xvi, 1906, pp. 40-3.
*63. Jour. Anthrop. Inst., 1889, xviii, pp. 336, 338, &c.
64. Cornhill Mag., No. 119, N. S., 1906, p. 617.
*65. ' Neolithic Dew-Ponds,' p. 17.
66. Ibid., pp. 60-1. 67. Ibid., p. 59. 68. King, Munimenta Antigua,' i, pp. 150-1.
Note.-Since this chapter was written, I have seen Mr. E. A. Martin's excellent articles in Knowledge, iv, N.S., 1907, pp. 108-9, 126-8, 197. Some slight additions have been in consequence incorporated, but in the main Mr. Martin's authorities are the same as those here quoted. The reader may, however, do well to compare Mr. Martin's summary with that of the text. | 2019-04-25T14:18:08Z | http://dewponds.co.uk/biblio_folk_memory.htm |
SHALOM ALEICHEM (Sholem Aleykhem ; narrative persona and subsequent pseudonym of Sholem Rabinovitsh (Rabinovitz ); 1859–1916), Yiddish prose writer and humorist born on February 18, 1859 (old style; March 2, new style), in Pereyaslav (today: Pereyaslav-Khmelnitski) on the left bank of the Dnieper (Dnipro), downstream from Kiev, as the third child of Menakhem-Nokhem Rabinovitsh, a wealthy timber and grain merchant and Khave-Ester, née Zeldin. Together with Sholem Yankev *Abramovitsh (often misidentified as his fictional narrator, Mendele Moykher Sforim) and I.L. *Peretz, Shalom Aleichem is regarded as one of the three major classical writers of Yiddish literature. He rapidly achieved widespread popularity with the reading public, though it took him longer to achieve lasting critical acclaim. By canonizing Abramovitsh as the "grandfather" of Yiddish literature and castigating the facile and highly popular pulp-fiction of *Shomer, he brought aesthetic criteria to bear on Yiddish literature and became the first to see himself as occupying a position within a Yiddish literary tradition. In fact, he was barely 24 years younger than Abramovitsh, but this difference was crucial, since the political turmoil and the pogroms of the 1880s had discredited the *Haskalah or Jewish Enlightenment movement, making for an altogether more resigned, milder, and less didactic tone in Shalom Aleichem's work. He was distrustful of all ideology and could offer only aesthetic solutions to the problems of Jewish existence. It is true that he manifested considerable enthusiasm for the Zionist cause, but he does not seem to have been very sanguine about its chances of success. He promoted his vision of Yiddish writing capable of standing comparison with other literatures in the two volumes of his lavishly produced Di Yidishe Folksbibliotek ("The Jewish Popular Library," 1888–89) in which inter alia he published works by Abramovitsh, Peretz, and Isaac Joel *Linetsky as well as early versions of his own novels, Stempenyu (1889; Stempenyu, 1948) and Yosele Solovey (1890; "The Nightingale: Or the Saga of Yosele Solovey the Cantor," 1913). These novels are both restrained, tragic love stories in which self-fulfillment is sacrificed to traditional concepts of modesty; the author was not entirely successful in reconciling form and content. The Folksbibliotek-project was abandoned in 1890 when Shalom Aleichem lost his fortune on the stock exchange. However, his reputation owes less to his novels than to his epistolary satire,Menakhem-Mendl (begun in 1892; "Menakhem Mendel and Sheyne Sheyndl," 1948) and his loosely structured series of monologues, Tevye der Milkhiker (begun in 1895; Tevye the Dairyman, 1987). It was in these series that Shalom Aleichem found the style most suited to his genius, and he continued working on them almost up to the time of his death, creating personae whose voices enabled him to express his ironic view of a traditional society in crisis.
Most of his fiction, which also included the stories he wrote for Jewish holidays and his many children's stories, appeared in the first instance as feuilletons in various newspapers, being collected in book-form usually at a much later date. The ability that Shalom Aleichem had shown in these tales to capture scenes from a child's perspective found its most virtuoso expression in Motl Peyse dem Khazns (serialized between 1907 and 1916; The Adventures of Mottel, the Cantor's Son, 1953). In this cycle of stories he created a brilliantly ironic account of the misfortunes of a widow and her children and their later peregrinations from the Ukrainian market town to New York, as seen through the eyes of the youngest carefree son, Motl. Shalom Aleichem also wrote critical reviews and poems and tried writing for the stage, but without great success. In the theatre, it was dramatizations of his stories by other hands that achieved lasting fame, most notably the Tevye stories which eventually became the well-known musical drama, Fiddler on the Roof (1964). Shalom Aleichem was still at work on his lightly fictionalized autobiography, Funem Yarid (1916–17; From the Fair: The Autobiography of Sholom Aleichem, 1985) and the continuation of Motl Peyse at the time of his death. His multifarious oeuvre constitutes a Jewish comédie humaine, portraying the transition from the old order of traditional life to modern times. Through it runs the recurrent theme of unrealizable aspiration, followed by catastrophe and renewed hope, epitomizing courage in adversity and survival against all odds both in the Old World and the New. The tragic is constantly interwoven with the comic, while his characters and perspectives embody powers of regeneration in the face of adversity.
In 1861 his family had moved to Voronkov (Voronka), somewhat closer to Kiev, where he attended ḥeder. Voronkov was later to be satirized in his works as the archetypal shtetl, Kasrilevke. However, 10 years later Menakhem-Nokhem Rabinovitsh was defrauded and the family returned to Pereyaslav where the 12-year-old boy helped his father run a modest inn. The following year his mother died of cholera, and his father remarried. The death of his mother had a particularly traumatic effect on the young Rabinovitsh which is indirectly, almost unconsciously, reflected in a number of his works. In 1873–36, he attended the Russian secondary school (gymnasium) in Pereyaslav on a scholarship. It was during these years that he composed his first literary creation in the form of a glossary of his stepmother's curses (unpublished), thus early revealing his ability to face adversity with humor. He also began writing Hebrew biblical romances in the manner of Abraham *Mapu, his father's favorite author. After graduating with distinction from the gymnasium Rabinovitsh became a private tutor in Russian, Hebrew, and other subjects in and around Pereyaslav. The following year, as the result of a stroke of good fortune, he was offered the position of private tutor to the daughter of the wealthy merchant, Elimelech Loyev. Rabinovitsh and his teenage pupil, Olga/Hodl read Hebrew and European literature together and fell in love. Some two to three years later, becoming aware of the tender feelings between tutor and pupil, Loyev dismissed Rabinovitsh. It was at about this time that his earliest Hebrew pieces were published in the popular maskilic Warsaw newspaper, Ha-Ẓefirah.
Rabinovitsh now secured the office of obshchestvenny ravvin or government rabbi in Lubny. During the years in Lubny he contributed further pieces in Hebrew not only to Ha-Ẓefirah but also to Ha-Meliẓ on social and educational issues. In 1883 Olga came across an article by Rabinovitsh and was able to locate him through the publisher. On May 12 (old style; Lag ba-Omer) of the same year, their marriage took place in Kiev against her father's wishes. However, Loyev was soon reconciled, insisted that Rabinovitsh give up the post of ravvin, and invited him back to the estate at Sofiyevka, where he was able to pursue his literary activities free from financial worries.
With the appearance from 1881 onwards of Alexander *Zederbaum's (Tsederboym) St. Petersburg weekly Dos Yidishe Folksblat, at that time still the only Yiddish periodical, Rabinovitsh felt encouraged to pursue his enthusiasm for Yiddish literature and wrote his first Yiddish story, "Tsvey Shteyner" ("Two Stones," 1883) which was serialized in this periodical. This piece was dedicated to O[lga]-E[limelekhovna Loyeva]. The action is a tragic version of the romance between himself and Olga/Hodl in which the heroine commits suicide and the hero becomes deranged (thus anticipating the underlying themes of Yosele Solovey). Rabinovitsh later became dissatisfied with this story, hence its omission from collected volumes throughout his lifetime.
A further story, "Di Vibores" (1883; "The Election," 1994) was published in Dos Yidishe Folksblat and was signed for the first time "Shalom Aleichem." Rabinovitsh resorted to a pseudonym since this satire attacks the affluent leaders of a Jewish community, named in the story as Fintsternish ("darkness"), though clearly Lubny was meant. The nom de plume, initially intended as a temporary stratagem, became a narrative persona. Feeling that his talents lay primarily in the realm of Yiddish humor, he adopted the name permanently, and, indeed, it was eventually destined to become the appellation by which he was universally known. In Funem Yarid he also explains that the pseudonym was in part adopted for the sake of his family who shared the prejudices against Yiddish at that time prevalent in intellectual circles. Like "Tsvey Shteyner," this story was never reprinted in Shalom Aleichem's lifetime.
In November 1883 the young couple moved to Belaya Tserkov (Bila Tserkva), south of Kiev, where Shalom Aleichem at first worked as inspector of sugar estates for the Kiev Jewish millionaire, Israel *Brodsky, whose name together with that of *Rothschild was to become emblematic of fabulous wealth in Shalom Aleichem's fiction. After leaving Brodski's employ, Shalom Aleichem and Olga remained in Belaya Tserkov, financially supported by Loyev. In the early 1880s Shalom Aleichem published a number of further slight sketches, epistolary skits, and stories in Dos Yidishe Folksblat. Whereas in these years Shalom Aleichem's aspirations lay in the direction of the novel and he attached little importance to his feuilletonistic work, it was in these short pieces that he developed his abilities as a writer of monologues and epistolary sketches, and it was these skills that were later to avail him in the masterpieces, Menakhem-Mendl, Tevye, and Motl Peyse. As time went by, he further honed the feuilleton style which he learnt inter alia from Gogol and which became his real forte. It was precisely these monologues and sketches that earned him his popularity and in which he was able to give free rein to his ironic fantasies.
During these years in Belaya Tserkov, Shalom Aleichem and Olga began spending the summer months in a dacha in the village of Boyarka not far from Kiev, as they continued to do until he left Russia in 1905. This village later served as the model for the fictional village of Boyberik in the Tevye stories and other works. In 1884 their daughter Ernestine/Khaya-Ester was born, the first of six children (four daughters and two sons). In 1885 Loyev died. Shalom Aleichem inherited a very considerable fortune and ventured into business speculations in Kiev.
In 1886 the first of his stock exchange stories was published in Dos Yidishe Folksblat adumbrating the virtuosity of the Menakhem-Mendl letters. In this same year appeared Di Veltrayze ("Journey round the World," 1886), his first independent publication, while over the winter 1886–87 further feuilleton sketches were serialized in Dos Yidishe Folksblat anticipating the Kasrilevke stories.
A major landmark in Shalom Aleichem's literary career was the appearance in 1887 of "Dos Meserl" (1886; "The Pocket-Knife," 1920). This story attracted a particularly favorable review by Simon *Dubnow in the influential St. Petersburg Russian-Jewish journal Voskhod, which represented the beginning of critical acclaim for Shalom Aleichem, but it was not until considerably later that his genius was widely appreciated. The story relates the terror of a young boy unable to resist the temptation to steal a penknife from an amiable maskil or freethinker who lodges with his parents. The story concludes on an edifying note attributable to the waning influence of the Haskalah on Shalom Aleichem's early career. "Dos Meserl" epitomizes the style of Shalom Aleichem's many children's and holiday tales which revolve around minor domestic problems and their resolution seen through the eyes of child protagonists or deal with crises in the preparation for a Jewish festival that have a happy outcome. These stories were some of Shalom Aleichem's most popular works, appearing in the holiday issues of periodicals and widely enjoyed in the family circle, making Shalom Aleichem's name truly a household word. "Dos Meserl" and "Tsvey Shteyner" were translated into Russian and came to the favorable attention of Leo Tolstoy and Maxim Gorki.
That same year Shalom Aleichem wrote "Legboymer" ("Lag ba-Omer," 1887) in memory of that festival in 1883 when it fell on May 12, i.e., his wedding day. The story relates how a group of kheyder lads escape their rebbe's birch for a day and sally forth into the countryside on Lag ba-Omer only to be assailed by a gang of Ukrainian youths and so badly beaten that their leader, Zyame, altogether eludes any further flogging by the rebbe, since after three weeks in bed he dies. This was also the year in which Shalom Aleichem moved with his family to Kiev, the model for his fictional Yehupets, to deal on the stock exchange.
In 1888 Shalom Aleichem began his life-long campaign for higher standards in Yiddish literature with two publications. Shomers Mishpet ("The Trial of Shomer," 1888) constituted a savage attack on pulp-fiction, especially that of Nokhem-Meyer Shaykevitsh, known as Shomer, at the time by far the most popular of Yiddish authors, a prolific writer of sentimental pulp fiction whose plots were usually lifted from the works of Charles Paul de Kock, Alexandre Dumas père, or their like. Shalom Aleichem accuses Shomer of corrupting the Jewish people with escapist and morally dubious fantasies which bear no relation to the realities of Jewish life. In "Der Yidisher Dales in di Beste Verk fun Undzere Folks-Shriftshteler" ("Jewish Poverty in the Best Works of Our National Writers," 1888) he distinguished between such trashy romantic shund and realistic works such as Fishke der Krumer (1869; Fishke the Lame, 1920) by Abramovitsh, whom he dubs the zeyde ("grandfather") of Yiddish literature. A number of other writers are similarly singled out for praise on account of the realism of their works including Isaac Meir *Dik, Linetsky, Abraham *Goldfaden, and Mordecai *Spector. It is Shalom Aleichem's view that events portrayed in serious literature must be realistic and plausible within the framework of Jewish society. His novel, published the same year, Sender Blank un Zayn Gezindl ("Sender Blank and His Household," 1887) with its flights into the world of pure fantasy is a parody of the shund-novel, but at the same time it is severely critical of the vulgar insensitivities of the Jewish plutocracy, thus anticipating a theme which was to reappear frequently in his works.
However, by far his most significant achievement at this time was his editing of Di Yidishe Folksbibliotek. The publication of this annual or anthology of the best of earlier and contemporary writing in Yiddish was made possible by the considerable financial resources which Shalom Aleichem had inherited from his father-in-law. Before its collapse, Di Yidishe Folksbibliotek appeared in two volumes published in Kiev in 1888–89. The first volume comprised items by authors such as Linetsky and Abramovitsh, as well as pseudonymous pieces by himself, including "Lider funem Kheyder: Vinter" (1888; "Song of the Kheyder," 1994), signed Shlumiel. "Grandfather" Mendele (Abramovitsh) was encouraged to return to writing in Yiddish and was represented by the revised and expanded prologue and first part of his "Dos Vintshfingerl" (1888; TheWishing Ring, 2003). In addition, Shalom Aleichem had persuaded Peretz, who had previously published only in Hebrew and Polish, to contribute his extraordinary narrative poem "Monish" (1888; "Monish," 1939) for which Shalom Aleichem paid him the unprecedented fee of 300 rubles. It is interesting to observe that in the process of editing Peretz's text, Shalom Aleichem found it necessary to remove the author's frequent Polonisms in the interest of a wider readership. Peretz resented Shalom Aleichem's having done so without consultation, and for a number of years relations between the two men were soured. There were also contributions from David *Frishman and Simon Samuel *Frug, who had hitherto written exclusively in Hebrew and Russian respectively and who had both had their Yiddish literary debuts only a few months earlier in Dos Yidishe Folksblat. The first volume concludes with a short essay, "Etlekhe Verter vegn Zhargon Oysleyg" ("A Few Words concerning Yiddish Spelling," 1888) in which Shalom Aleichem calls for a standard orthography and a grammar of the Yiddish language, while advocating that homophones should be differentiated by their spelling and that the orthography of words from the Germanic component should be approximated to the German spelling. In the baylage ("supplement") appeared Shalom Aleichem's novel Stem-penyu. Though in some ways resembling Sender Blank, this was Shalom Aleichem's first consciously Jewish romance, and it appeared with a prefatory letter to zeyde Mendele whose counsels had inspired it.
When his father died in that same year, Shalom Aleichem gave literary expression to his mourning in A Bintl Blumen ("A Bouquet of Flowers," 1888), a literary bouquet laid on his father's grave, subsequently shortened and revised as "Blumen" ("Flowers," 1903). This pamphlet comprised 18 stories, including "Koysl Marovi" ("The Western Wall"). His father had been a lover of Hebrew literature and had nurtured ambitions for his son in this direction. The death of his father did have the incidental effect of relieving Shalom Aleichem from the pretense of not being a Yiddish writer.
The second volume of Di Yidishe Folksbibliotek comprised Shalom Aleichem's comedy "Di Asife" ("The Assembly," 1889), signed Shulamis, whose protagonist is a ravvin, as until recently he had been himself, and "A Briv tsu a Gutn Fraynd" ("A Letter to a Good Friend," 1889) in which he replies to criticism that had been made of "Stempenyu": "It is necessary to observe," he writes, "that a young Jewish woman is unlike other women in the world." Gentile heroism may well consist in giving free reign to the passions; Jewish heroism consists in controlling one's feelings. Furthermore, fictional characters must be figures with whom the common people can identify. Formerly authors had protagonists who were either angels or demons, but modern readers demand characters whom are closer to psychological reality. This volume contains the second part of Abramovitsh's "Dos Vintshfingerl," further items by Peretz and Linetsky as well as contributions by Frug, Abraham Ber *Gottlober, Goldfaden, *Ben-Ami and Mikhl *Gordon.
In a supplement to the second volume of Di Yidishe Folks-bibliotek, the novel Yosele Solovey appeared. As in the case of Stempenyu, this is a restrained, unconsummated Jewish love story in which self-fulfillment is sacrificed to customary concepts of modesty, and the traditional Jewish woman pines for her outsider hero, in this case a highly talented itinerant cantor. It ends with the death of the heroine and the madness of the hero. There are some thematic similarities with his "Tsvey Shteyner." At the same time a host of caricatured figures provide comic relief. The judicious fusion of comedy and pathos is in some ways reminiscent of Dickens. It is instructive to compare Shalom Aleichem's delicacy and apprehensions concerning the credibility of a Jewish love story with the uninhibited sexuality of the play Yankl der Shmid ("Yankl the Blacksmith," performed 1906) written less than 20 years later by David *Pinski.
The consistently high quality of the Folksbibliotek aroused considerable interest, and it was recognized by many as representing a turning point in the development of Yiddish literature. But the reactions were far from universally favorable. In 1889 Judah Leib *Gordon wrote in Russian to Shalom Aleichem, sharply censoring his intention to raise the status of zhargon-literature. At most, Gordon claimed, Yiddish might be tolerated as means of enlightening the ignorant masses, but otherwise he regarded it as the curse of the Diaspora.
In October of 1890 Shalom Aleichem was preparing to edit a third volume of Di Yidishe Folksbibliotek when the stock market crashed and he lost his entire fortune. He moved his family to Odessa and traveled to Czernowitz, Vienna, and Paris to escape his creditors, while his mother-in-law attempted to pay off his debts. In 1891 he returned to Russia and, with help from his mother-in-law, once again began trading on the stock exchange. The collapse of the Folksbibliotek in the same year as that in which Dos Yidishe Folksblat ceased publication deprived Shalom Aleichem of publishing outlets for Yiddish works, and in consequence he wrote nothing in Yiddish throughout 1891 and returned for a while to writing in Russian. It was during this period, inspired very largely by Nikolai Gogol's oral-style or skaz-monologues (as they are called by Bakhtin and the Russian Formalists), that Shalom Aleichem found the style most suited to his genius.
In 1892 Shalom Aleichem made further preparations for a third volume of the Folksbibliotek but lacked the financial means to bring this project to fruition. Instead he contented himself by putting everything he published in Yiddish that year into his Kol Mevaser tsu der Yidisher Folksbibliotek ("Advertiser for the Jewish Popular Library"), this time without contributions by others, though in a number of cases he again signed his own pieces with pseudonyms (such as Shulamis and Dr. Solomonis Rabinus). Here he published "London," an earlier version of "London" (1909), the first series of his Menakhem-Mendl letters, concerning the comic vicissitudes of an archetypal luftmentsh and unsuccessful speculator. Shalom Aleichem continued to extend his epistolary Menakhem-Mendl series until 1913. Kol Mevaser… also included the "folksong" "Shlof, Mayn Kind" ("Sleep My Child"), which soon became so popular that when in 1901 the major Yiddish song collection by Saul *Ginzburg and Pesach [Piotr] *Marek appeared in St. Petersburg, "Shlof, Mayn Kind" was listed as being anonymous.
The mid 1890s were a period of comparative literary inactivity. In May 1893 Shalom Aleichem and his family moved to Kiev, where he continued to speculate on the stock exchange and attempted to act as a commodity broker. Meanwhile he and his family continued to spend their summers in the dacha at Boyarka, and in the summer of 1894 a chance encounter with a vivacious dairyman delivering butter and cheese to families vacationing in the vicinity became a formative experience, since this figure would serve as the model for the series of Tevye stories which he soon began to write and on which he continued working sporadically for most of the rest of his life. Later that year he wrote Yakneho"z, oder dos Groyse Berznshpil ("Hocus-Pocus: Or the Great Stock-Exchange Gamble"). This was his first complete play, a satire in the style of Pushkin on the life of the speculators and nouveaux riches of Kiev in which he had been so deeply involved.
In August 1897 Shalom Aleichem attended the First Zionist Congress in Basel recording his impressions in Der Yidisher Kongres in Bazl (1897; "The Jewish Congress in Basel," 1984). In fact, Shalom Aleichem's interest in the Zionist cause had already begun in 1888 when he had joined the Ḥovevei Zion movement and the following year he had invited one of their most prominent leaders, Abraham Menahem Mendel *Ussishkin, to report on the welfare of the colonists in Palestine in the second volume of the Folksbibliotek. He turned these interests to literary account in "Oyf Yishev Erts-Yisroel: Zelik Mekhanik" (1890; "Selig Mechanic," 1984), a story with a propagandistic Zionist message. Immediately after attending the Basel conference, he wrote the essay "Oyf Vos Badarfn Yidn a Land" (1898; "Why Do the Jews Need a Land of Their Own?" 1984). It is a popular but cogently argued statement of the Zionist case: antisemitism will only be overcome when Jews have a state in Palestine. The same year, while living in Berdichev, he incorporated some of these ideas into Meshiekhs Tsaytn: A Tsienistisher Roman ("Messianic Times: A Zionist Novel," 1890).
In 1900 Shalom Aleichem wrote "Der Zeyger" (1900; "The Clock That Struck Thirteen," 1900), one of his "stories for Jewish children," a slight monologue told by an anonymous narrator and inhabitant of Kasrilevke about his grandfather's pendulum clock that had been in the family for generations and was his pride and joy. It served the whole town as its time-piece, despite the maskil's hair-splitting attempts to prove it a minute or two fast, until, that is, the day it struck thirteen. More and more hopeless attempts are made to repair the clock, but finally, just in the middle of an exciting story, it collapses under the weight of the heavy objects that have been attached to the pendulum to try and keep it going. Everybody was understandably distressed, and the narrator, still a child, had nightmares about the clock. The prevailing atmosphere is one of melancholy recognition of the obsolescence of tradition. It has even been asserted that the story embodies a subliminal reference to the death of his mother when the young Rabinovitsh was still only 13.
That same year Shalom Aleichem wrote his famous satire Der Farkishefter Shnayder (1900; "The Haunted Tailor," 1979). This, the most Gogolian of Shalom Aleichem's stories is typical of his genre of fantastic tales. The narration is in the macaronic style of an old pinkes or chronicle and tells the story of a henpecked yet opinionated and self-important tailor, Shimen-Elye Shma Koleynu, who is persuaded by his wife to go to the neighboring shtetl to buy a goat so that his numerous hungry children may have an ample supply of milk. Halfway between the two villages he stops at an inn belonging to his cousin Dodi to whose lack of learning he tactlessly alludes. Returning with the goat he has purchased he spends the night at the inn. When he arrives home the next day, the goat is unmilkable. Yet, when he attempts to return the goat, the melamed's wife, from whom he bought it, milks it in front of the rabbi's court. Back at home the story repeats itself and the tailor is taken ill, accepting the innkeeper's story that the goat is bewitched. It is left to the reader to draw the conclusion that the innkeeper took his revenge by switching the female goat with a male goat (and vice versa) each time the tailor passed through. The characterization is largely achieved through the formulaic words of the characters. In addition to the humor that arises from Shimen-Elye's solecisms and his conflations of Aramaic and Ukrainian, an element of irony is introduced in that the theme of duplicitous substitution is suggested to the mind of the reader by the references to Rachel and Laban.
In the early years of the new century Shalom Aleichem was already supporting himself and his large family almost entirely by writing, especially for the St. Petersburg and Warsaw daily papers. By 1903, in fact, he felt able to abandon business activities altogether. It was during this period that he wrote many of the stories in his Kasrilevke series, including among others "Kasrilevker Tramvay," "Kasrilevker Hoteln," "Kasrilevker Restoranen," "Kasrilevker Vayn un Kasrilevker Shikirim," "Kasrilevker Teater," "Kasrilevker Sreyfes," and "Kasrilevker Banditn" (1901; "Transportation," "Hotels," "Restaurants," "Liquor," "Theater," "Fires," "Bandits," collected in English as A Guide to Kasrilevke, 1973). Most of the Kasrilevke stories satirize shetl life in Voronkov and Berdichev. Over the years, while revising his works, Shalom Aleichem gradually brought more stories into this cycle by inserting the name Kasrilevke where previously he had written Berditshev, Mazepevke, or some other toponym. The ethos of these stories may be exemplified by "Dreyfus in Kasrilevke" (1902; "Dreyfus in Kasrilevke," 1979). Zeydl is the only person in Kasrilevke who subscribes to a newspaper, and it is through him that the inhabitants of Kasrilevke anxiously follow the second Dreyfus trial, which took place in 1899. When once more a guilty verdict is pronounced, they simply cannot believe it. "Se kon nit zayn!" ("It is impossible") shout the outraged inhabitants of Kasrilevke, and it is not the judges or false witnesses in Paris whom they blame but Zeydl. "Idiots," replies Zeydl and thrusts the newspaper into their faces, but they just refuse to understand. "Who was right?" asks the narrator in conclusion. The well-known story "Ven Ikh Bin Roytshild" (1902; "If I Were Rothschild," 1979) was also written in 1902 and also belongs to the same cycle. This is the monologue of a Kasrilevke melamed whose wife is pestering him for money for the coming Sabbath. If he were rich, he muses, not only would he make sure that his wife had enough so that he could pursue his teaching in peace, he would not only provide for the sick and the poor in Kasrilevke, but he would endow yeshivot and ensure that even the Gentiles had no need to go to war. In fact, he might even abolish money altogether which is surely the root of every evil inclination, but then how would he provide for the Sabbath right now? The story combines realistic observation of the crushing poverty of the shtetl with a touching portrayal of the unworldly aspirations of many of its inhabitants. A further Kasrilevke story written at this time was "Oysgetreyselt" (1902; "A Yom Kippur Scandal," 1979) which was subsequently included in the "Kleyne Mentshelekh mit Kleyne Hasoges" series. This famous tale takes the form of an anonymous narration of the scandal that was reported to have arisen when a Litvak visitor was apparently robbed of 1,800 rubles in the Kasrilevke synagogue during the Yom Kippur service. The rabbi immediately ordered the doors to be locked and for everyone's pockets to be turned out. All comply with the exception of Leyzer-Yosl, the much-lauded son-in-law of the local magnate, who makes all manner of excuses to avoid being searched. When finally his pockets are examined, gnawed chicken bones are found, to his own shame and to the mortification of the rabbi, but to the huge amusement of the townsfolk. "'Well,' we all asked with one voice, 'and what about the money?' – 'What money?' asked the man innocently, watching the smoke he had exhaled. – 'What do you mean – what money? The 1,800 rubles!' – 'Oh,' he drawled. 'The 1,800. They were gone.' – 'Gone?' – 'Gone for ever.'" There is masterly irony in the laconic pacing of this dénouement.
At this time Shalom Aleichem also revised four volumes of his works which the Folksbildung publishing house in Warsaw issued as Ale Verk fun Shalom Aleichem ("The Complete Works of Shalom Aleichem," 1903). This was the first of several collected works published during his lifetime and subsequently, and was an important milestone in his literary career. This title was, however, a misnomer. Neither this collected works edition nor any of its successors was ever even remotely comprehensive. Then in August 1904, Shalom Aleichem edited Hilf: a Zaml-Bukh fir Literatur un Kunst ("Help: An Anthology for Literature and Art") and himself translated three stories submitted by Tolstoy as well as contributions by other prominent Russian writers in aid of the victims of the Kishinev pogrom.
In 1904 Shalom Aleichem was still living with his family in Kiev in a degree of comfort and tranquility that he had seldom experienced before and was at work on feuilletons, monologues, Kasrilevke and Tevye stories for Der Fraynd (St. Petersburg), Der Veg (Warsaw) and other papers, but this comparative calm was soon to be shattered by political events. An adumbration of the turmoil to come is to be found in Shalom Aleichem's story "Yoysef" (1905; "Joseph," 2004) which appeared in Der Veg. This is the monologue of a conceited but not altogether despicable young fop who confesses "in confidence" to the writer how he is besotted by a girl who waits at table in her mother's restaurant. She, however, adores Yoysef, a Bundist conspirator, so the narrator ingratiates himself with the Bundists, talks about Karl Marx and August Bebel and attends a clandestine meeting in the forest at which Yoysef speaks. He observes that the earnest young men at the meeting are dressed in Gorki-style black blouses (a style that Shalom Aleichem himself affected from time to time). When the dzhentlmen, as the conspirators call him, finally asks Yoysef for his advice, he simply recommends speaking to the girl directly, since he has no time for such trifles. The conspiracy is discovered and Yoysef is arrested. Returning from a business trip the dzhentlmen finds that the restaurant has disappeared.
Literary reflections of political ferment were soon followed by all too real historical events. In October Shalom Aleichem and his family lived through the three days of the Kiev pogrom associated with the failed 1905 revolution. As angry mobs surged through the streets, the family sought refuge in the Hotel Imperial. After these experiences Shalom Aleichem resolved to leave and moved via Radziłłow and Brody to Lemberg (today: Lvov) in Austrian Galicia. Whereas others had lost faith in Russian liberalism two years earlier in the aftermath of the Kishinev pogrom, for Shalom Aleichem 1905 was the turning point. A further motive for leaving Russia may have been his apprehension that his political satires could have unpleasant consequences. What little financial security there had been in the Kiev years disappeared and, although he was by now the most famous of Yiddish writers, whose works were enjoyed by a vast readership, he was now cut off from his publishers. He began a reading tour that took him to many points in Galicia and Romania. Leaving his family in Geneva, where Abramovitsh was at the time, he continued his reading tour to Paris and London. From this time on Shalom Aleichem became increasingly dependent financially on enervating but hugely successful lecture tours, and it was only on such tours that he ever again returned to Russia.
In 1906 Shalom Aleichem made his first visit to the United States, arriving on October 20 in New York, where he was given an exhilarating welcome in both the Yiddish and English-language press. Two plays were commissioned from him, and the Hearst Press offered him a lucrative contract. Shalom Aleichem remained in the Bronx for some months and on February 8, 1907, a dramatization of Stempenyu, produced by Boris Tomashevski, was staged at the People's Theater, while on the same night "Der Oysvorf: oder Shmuel Pasternak" ("The Outcast: Or Shmuel Pasternak"), a version of Yakneho"z which Shalom Aleichem had specially adapted for Jacob Adler, was performed at the Grand Theater. Both plays were excessively sentimentalized for the New York theater audience, and both were box-office disasters. Meanwhile Hearst's Jewish American collapsed and Shalom Aleichem was unable to interest the Yiddish press in his Motl. In the early summer he returned to Geneva via The Hague, a disappointed man.
In August Shalom Aleichem attended the 8th Zionist Congress in The Hague as the delegate of New York Federation of American Zionists. It was here that he met Ḥayyim-Naḥman *Bialik for the first time and formed a close friendship with him. His impressions of this event are recorded in "Ayndrukn fun Tsionistishn Kongres" (1907; "Impressions from a Zionist Congress," 1984). In the early autumn he went on holiday in the Alps near Geneva and invited Bialik to visit him there. They were joined by Abramovitsh and Ben-Ami as well. It was at this time that the four of them posed in a photographer's studio for the famous comic portrait showing them in a boat with Shalom Aleichem standing behind holding an upright oar. He describes this meeting in "Fir Zenen Mir Gezesn" (1908; "Once There Were Four," 1979). It was at this time that Shalom Aleichem was diagnosed with tuberculosis.
Shalom Aleichem's continued preoccupation with the Kiev pogroms of 1905 and their aftermath were reflected in his novel Der Mabl ("The Flood") which was serialized 1907–8 in Vorhayt. In 1918 the novel appeared in book-form under the title In Shturem (In the Storm, 1984). This novel reflects the reactions of progressive Jewish youth to the pogroms to which Shalom Aleichem and his family had come all too close. Embodied in the lives of the protagonists, we see the tensions that existed between universal and national solutions to Jewish social problems. The original title implied that a "flood" would sweep away cruelty and violence. The change in title indicates a subsequently less sanguine view of social progress.
In 1908 Shalom Aleichem was once again compelled by financial constraints to undertake a reading tour in Russia. He had by now become famous for his recitations, and the tour went well until in early August in Baranovichi, some distance north of Pinsk, he suffered a severe recurrence of tuberculosis and was diagnosed as having open pulmonary tuberculosis. After two months of rest in Baranovichi itself, he moved to the resort of Nervi on the Ligurian coast for further recuperation. This setback was to some extent offset by the celebration of his 50th birthday and 25 years of literary creativity in 1909. A committee of authors secured the rights to his works and returned them to him, thus ensuring him a permanent income. During this period some of Shalom Aleichem's works began to appear in Russian translation and met with much critical acclaim.
In Nervi, perhaps realizing that his health prognosis was not very favorable, Shalom Aleichem made a first start on his autobiography Funem Yarid. However, he soon set it aside in order to work on other projects including his Ayznban-Geshikhtn (Railroad Stories, Engl. 1987), which were written and published over a period stretching from 1902 to 1911, although of the 20 stories that eventually constituted this series, as many as nine were written in various sanatoria during this period of convalescence in 1909. In these stories Shalom Aleichem skillfully exploits a situational framework of fleeting encounters, such as he must often have experienced when traveling between venues on his frequent and grueling reading tours and paints a picaresque composite picture of the precarious economic circumstances of Jews living in those western parts of the Russian Empire in which they were permitted to reside. Dan Miron shrewdly observes that it is a token of the increasing modernity of Shalom Aleichem's work that his narrators become progressively less severe in their critique of social reality. The traveling salesman is a "caricature of the maskilic 'watchman' or the Mendelean sarcastic commentator" [Image, p. 334].
Two of these Railroad Stories, both written in 1909, may serve to characterize this important cycle in Shalom Aleichem's oeuvre. "Stantsye Baranovitsh" (1909; "Station Baranovich," 1979) is named after the very station at which Shalom Aleichem himself had almost died the year before. The narrator heard the story from his father who had it from his own father. It happened in the days of Nikolai I. Kive, a Jew who had permitted himself a number of injudicious remarks, was condemned to run the gauntlet. Reb Nisl, the narrator's grandfather arranges a simulated funeral and then slips Kive over the border into Austrian Galicia. From then on Kive sends begging letters, threatening to return and confess. Finally he threatens to send Reb Nisl's letters to the police. At that point the train arrives in Baranovichi. The narrator hurriedly alights and the story is never finished. "May Station Baranovichi burn to the ground!" This is almost a shaggy-dog story in which much of the ironic humor lies in the ploys with which the narrator plays his audience much as Shalom Aleichem does his. What, after all, would the devoted readers of Shalom Aleichem's Ayznban-Geshikhtn have done had Shalom Aleichem really died? "A Khasene on Klezmer" (1909; "The Wedding That Came without Its Band," 1979) is a story told to the narrator one hot afternoon in a railway compartment by a merchant with a penchant for euphemistic irony who relates the humorous side of the 1905 pogroms. On this occasion the arrival of the drunken pogromists was delayed just long enough by the blessed inefficiency of the railway for the Cossacks summoned by the police superintendent to arrive and establish order. That salvation should take the form of a regiment of mounted Cossacks is in itself highly ironic.
Shalom Aleichem's unhappy experiences with the New York Yiddish theater found expression in the serialization between 1909 and 1911 of Blondzhende Shtern (Wandering Star (sic), 1952). The themes bear comparison with those of Stem-penyu and Yosele Solovey, and the novel takes the form of a complex and picaresque story in which two Jewish artists make their way from the shtetl to Second Avenue. The hero is a brilliant star on the Yiddish stage who degenerates both as artist and human being in the New World, unlike the heroine, a singer, who ventures outside the narrowly Jewish world and preserves her integrity. The affinity with Charles Dickens, who was much admired by Shalom Aleichem, is particularly clear in the Whitechapel scenes.
Between 1909 and 1913 Shalom Aleichem and his family moved between health resorts in Nervi and the French Riviera, in the winter, and Switzerland and St. Blasien in the Black Forest, in the summer. Despite ill health and feverish literary activity, this was once more a relatively tranquil and secure interlude in Shalom Aleichem's life. This was also the period in which the "Jubilee" edition of his works in 16 volumes Ale Verk: Yubileum Oysgabe ("Complete Works, Jubilee Edition," 1909–15) was prepared for publication. This edition, which was interrupted owing to difficulties during World War i, did much to establish Shalom Aleichem's literary reputation which had earlier been belittled in some quarters.
The fourth volume of the Yubileum Oysgabe (1910) comprises Menakhem-Mendl (1910; The Letters of Menakhem-Mendl and Sheyne-Sheyndl, 2002). This is the so-called "canonized version" of the Menakhem-Mendl letters that were further, but somewhat unsatisfactorily, expanded as Menakhem-Mendl: Nyu-York-Varshe-Vin-Yehupets (1913; The Further Adventures of Menachem-Mendl: New York – Warsaw – Vienna – Yehupetz, 2001). Taken together these series of letters somewhat loosely constitute an epistolary novel, in part inspired by Abramovitsh's Kitser Masoes Binyomin Hashlishi (1878; The Travels and Adventures of Benjamin the Third, 1949). The textual history is somewhat complex, but the 1910 version is the most artistically cohesive. To some extent a self-portrait, though Shalom Aleichem sought to minimize this perception in his introduction to this second edition, Menakhem-Mendl travels from place to place naïvely confident in the imminence of prosperity, meanwhile corresponding with his down-to-earth and skeptical wife, Sheyne-Sheyndl. She urges him to forget his harebrained schemes and hurry home. Her attitude, which is initially somewhat credulous, becomes increasingly skeptical and eventually downright contemptuous, though in the revised versions her tone becomes less abrasive and her common sense is more sympathetically portrayed. Menakhem-Mendl is the quintessence of the luftmentsh trying his hand at all manner of activities, including the stock exchange and the commodity market. He acts as insurance agent, marriage broker, and journalist and eventually goes to New York, though this last episode was dropped in the final version. In the interaction between husband and wife, as Ruth Wisse has shrewdly observed, we see transferred into two characters Tevye's ironic alternation between optimism and tragic resignation. Miron refers to Menakhem-Mendl and Sheyne-Sheyndl as Don Quixote and Sancho Panza-like archetypes. Marxist critics such as Max Erik have sought to stress Shalom Aleichem's presentation of the hopelessness of Menakhem-Mendl's schemes as an implied critique of capitalism. It would be more accurate to say that Menakhem-Mendl's misfortunes are symptomatic of the arbitrary restrictions placed by the czarist regime on Jewish enterprise, but this is too narrow a perspective. Menakhem-Mendl's willingness to believe that at any moment he will make his fortune and finally free himself and his family from material worries is an ironic reflection of the theme of utopian and eschatological hope that runs through much of Jewish literature.
The fifth volume of the Yubileum Oysgabe comprises Motl Peyse dem Khazns (1911; The Adventures of Mottel, the Cantor's Son, 1953). Shalom Aleichem was at work on Motl Peyse from 1907 right up to a few days before his death. It is a fragmentary novel whose first-person narrator is initially almost nine years-old and may be about 11 by the end of the second part, though his putative age has been the subject of some controversy. After the death of his father and the forced sale of the family's household goods, Motl immigrates with his mother to the U.S. in what Seth Wolitz perceptively describes as a carnivalesque Exodus or secular burlesque of the Haggadah, with the flight from the slavery under the czar across the European wilderness and the Atlantic to the promised city. The critical irony results from the discrepancy between Motl's carefree perception of what are for him wonderful adventures and the perils endured by his mother and indeed the whole community of Russian Jews constantly threatened by pogroms. Meanwhile Motl, rather like Huckleberry Finn, is preoccupied with his blithe pranks or with helping his elder brother in comically vain efforts to make money by selling ink or kvas. The omission of chapters 5 and 16 from volume 5 was occasioned by the publisher's wish to promote the volume as being suitable for children. For the complete text see either vols. 18 & 19 of the Folksfond edition of Ale Verk fun Shalom Aleichem ("Complete Works of Shalom Aleichem," 1920) or Khone Shmeruk's exemplary edition which follows the 1913 Progres text.
The seventh volume of the Yubileum Oysgabe (1911) comprises the Tevye der Milkhiker cycle which by this point was almost complete. The full cycle consists of the following episodes: 1. "Kotoynti" (1903; "I Am Not Worthy," 1994), which had been included in 1895, is omitted from the Yubileum Oysgabe and was advisedly not reprinted until after the author's death. In this prefatory letter, the reader is introduced to the eponymous hero for the first time. Tevye is overawed by Shalom Aleichem's condescending to put him "in a book" and is ashamed of his supposed lack of learning. However, "Kotoynti" and "Vakhalaklakoys" (1918; "Tevye Reads the Psalms," 1969), far from adding anything, detract somewhat from the poignancy of the stories concerning Tevye's daughters; 2. "Dos Groyse Gevins" (1903; the revised version of the story originally entitled "Tevye der Milkhiker," 1895; "Tevye Strikes It Rich," 1979) and relates how Tevye, a country Jew, who struggles to improve his knowledge of scripture, became a dairyman as a result of the generosity of two Yehupets ladies to whom he had given a lift after they had lost their way in the forest; 3. The sequel is "A Boydem" (1899; "The Bubble Bursts," 1949) which relates how Tevye entrusts his savings to his distant relative, Menakhem-Mendl, who loses everything on the Yehupets stock-exchange; 4. In "Hayntike Kinder" (1899; "Modern Children," 1949) it is related how Tevye's eldest daughter, Tseytl, chooses to marry the sickly young tailor, Motl Kamzoyl, rather than the rich elderly butcher, Leyzer-Volf; 5. "Hodl" (1904; "Hodel," 1946) was written just one year before the outbreak of the 1905 revolution. Tevye is offered a financially attractive match for Hodl, his second daughter, but it transpires that she is secretly betrothed to Pertshik, a revolutionary whom Tevye had invited to tutor his daughters, an ironic allusion perhaps to Shalom Aleichem's own romance with Olga/Hodl some quarter of a century earlier. After a hasty wedding, Pertshik departs on a secret mission, is arrested and exiled. As Hodl leaves to join her husband in Siberia, Tevye, who prides himself on his manly stoicism, weeps bitter tears; 6. "Khave" (1906: "Chaveh," 1948) is the story of Tevye's third daughter who elopes with an autodidact Ukrainian clerk whom she regards as a "second Gorki." Tevye attempts to intervene with the village priest but is rebuffed. In accordance with halakhic requirement and despite the promptings of his heart, Tevye performs ritual mourning for his daughter as though she were dead and rejects her when she accosts him in the forest. There is considerable irony in the fact that the threat of assimilation is associated with the name of Gorki, a writer much admired by Shalom Aleichem; 7. "Shprintse" (1907; "Shprintze," 1995) relates how, after the political upheavals of 1905, many wealthy Jews fled from the cities to the countryside, and Tevye had good business delivering diary products to their dachas. The feckless son of a rich widow woos Shprintse, Tevye's fourth daughter. At first Tevye is apprehensive but gradually warms to the idea, beginning once again to dream of the acts of charity he would be able to perform as the father of a millionairess. Suddenly, however, Tevye is summoned by the widow's brother who treats Tevye as a wily schemer and offers him money as compensation for breach of promise. Tevye is so shocked that he simply turns on his heels. Shprintse drowns herself; 8. In "Tevye Fort keyn Erts-Yisroel" (1909; "Tevye Goes to Palestine," 1995), Shalom Aleichem meets a well-dressed Tevye traveling on a train. In the meantime his wife, Golde, has died and his youngest daughter, Beylke, in order to ease her father's misfortunes, has married the proverbially rich Pedahtsur, a parvenu who had made a fortune during the Russo-Japanese war. By now Tevye realizes that even Hodl had done better with her exiled revolutionary idealist. In Pedahtsur's ostentatious mansion, Tevye is a silent witness to his daughter's misery. Embarrassed by Tevye's humble profession, Pedahtsur is ready to pay for him to go to Palestine. Tevye, who has always dreamed of visiting Rachel's tomb and the Western Wall, accepts the offer, expecting never to see his children again. In 1911 Shalom Aleichem saw Tevye's departure for Palestine as the culmination of the cycle. However, three years later, he added one more story together with an epilogue; 9. In "Lekh-Lekho" (1914; "Get Thee Out," 1949) after an interval of many years Shalom Aleichem encounters Tevye once more. The planned journey to the Holy Land had been abandoned when Pedahtsur had gone bankrupt and Motl Kamzoyl had died leaving Tevye responsible for his daughter, Tseytl, and her children. In 1905 pogroms had begun in the large towns and became widespread. The peasants, with whom Tevye had lived in the village in peace for decades, come to his house explaining that, though they have nothing against him personally, they have no choice but at the very least to break a window or two. But this is nothing compared to what happens at the time of the trial of Menahem Nendel *Beilis, when he is driven out of his village. At the moment of departure, Khave returns to share her family's misfortunes. Tevye asks Shalom Aleichem whether he was right to be forgiving, but Tevye, whose grandchildren are waiting, has to leave before Shalom Aleichem has time to answer.
"Vakhalaklakoys" is the sequel to "Lekh-Lekho." It was first published posthumously at the time of the editing of the Folksfond edition. Shalom Aleichem once again meets Tevye on a train and Tevye takes the opportunity to elaborate further on how it was back in 1905, when the hromada or rural assembly had decreed that the Jews be made to feel the wrath of the general community. Tevye had quick-wittedly devised a test to determine whether God truly wanted him to suffer or not, in which the peasants had to attempt to repeat tongue-twisters such as "vakhalaklakoys" and "memaymakim." The choice of these words is, of course, not determined solely by their refractory phonetic qualities, but represents yet another level of Tevye's (and the author's) irony: "Let them be confounded and put to shame that seek after my soul: let them be turned back and brought to confusion that devise my hurt… Let their way be dark and slippery: and let the angel of the Lord persecute them" (Ps. 35:4–6); "Out of the depths have I cried unto thee, O Lord. Lord hear my voice: let thine ears be attentive to the voice of my supplications" (Ps.130:1–2). It is sometimes held that Tevye has a shaky grasp of scripture and that his supposedly clumsy misquotations are an element in Shalom Aleichem's humor. Roback for example speaks of "malapropisms" and much the same view is taken by Butwin. More accurate assessments are offered by Michael Stern, Hillel Halkin, and Joseph Sherman: the truth is that Tevye is always in control of his quotations, and whether he cites literally, in modified form or, as he occasionally does when addressing a Pedahtsur or a Leyzer-Volf, in deliberate doggerel, it is always to appropriate ironic effect. When considering Tevye and his quotations – which serve also to anchor the narrative within the context on Jewish literary tradition – it is well to bear in mind that they represent a kind of mythopoeia, a use of language to transcend an unsatisfactory environment, and as such Tevye is a correlative of Shalom Aleichem, and of the artist in general.
The peasants meanwhile not surprisingly fail Tevye's test and in recognition of the fact that Tevye has lived peaceably among them for so many decades and that he is "a Jew, certainly, but not a bad man," they allow him to break a couple of his own windows pro forma. Tevye concludes by bemoaning the insecurity of the Diaspora, but emphasizes by contrast the naturally superior intelligence of Jews which imposes upon them higher moral obligations. Tevye's final word is that should the Messiah not come in the meantime, then perhaps he and Shalom Aleichem may meet again in Yehupets, Odessa, Warsaw, or even America, but in the meantime Shalom Aleichem should give his greetings to the Jews he meets, tell them not to worry and say that "our ancient God lives." Although supposedly related, Menakhem-Mendl and Tevye are very different characters, but they have in common that each episode takes them to a new crisis or catastrophe from which they "bounce back," as Miron puts it, by the power of their fortitude.
The figure of Tevye was based in part on the real-life model encountered in Boyarka but was at the same time inspired by Abramovitsh's itinerant hero, Mendele, a fact to which Shalom Aleichem makes a veiled allusion, as Ken Frieden has noted, in "Hayntike Kinder." Tevye sees himself as a modern Job and alternates between restrained altercations with the inscrutable deity and total resignation. Though he loses his home, his wife, and his daughters, his outlook remains one of self-ironizing good humor. In the revised versions, the narration is entirely in Tevye's voice, enlivened by polyphonic embedding of the disparate voices that Tevye constantly cites. Indeed, it may be said that one of Shalom Aleichem's most characteristic strengths is his ear for distinctive, idiosyncratic discourse, as is also seen clearly in the monologues and the railroad stories.
Though Shalom Aleichem gently mocks would-be social reformers, social tensions nevertheless form an important part of the thematic structure of his Tevye-cycle and of his works in general. An important theme is the contrast between grinding rural penury and the affluence of Jewish urban bourgeoisie of Yehupets (i.e., Kiev). Inequalities of wealth, generational conflict and the contrast between the genders are seen as a microcosm of the strains in Jewish social life in late 19th-century Russia. The political disillusionment that sets in after the collapse of the 1905 revolution is echoed in the contrast between Hodl's idealism and Beylke's resigned pragmatism. Also much in evidence is the dichotomy between Tevye's frequently asserted faith that God will provide and the acerbic skepticism that he applies to the dilemmas of daily life.
The celebration of the beauty of nature in the Ukrainian landscape re-echoes similar passages in Abramovitsh, while the topic of animal welfare is reflected in the story "Tsar-Balekhayim" ("Pity for Living Creatures," 1968) and elsewhere.
In 1914 Shalom Aleichem wrote four film screenplays in Russian that were never produced or published, but which included an adaptation of Tevye which was utilized in part by Charles Davenport in 1919 when he directed his silent film Khave. In 1915 Shalom Aleichem also wrote a dramatized version of the Tevye stories "Khave" and "Lekh-lekho," entitled "Tevye der Milkhiker: A Familyen-Bild in Fir Aktn" ("Tevye the Dairyman: A Family Portrait in Four Acts," 1923), which the famous actor and director Maurice *Shwartz staged in Vienna in 1924. In 1939 Shwartz filmed Tevye der Milkhiker which became one of the most successful of all Yiddish movies. In 1925 Menakhem-Mendl was adapted for the cinema under the direction of Alexander *Granovsky as Yidishe Glikn ("Jewish Luck") with inter-titles by Isaak *Babel and with Solomon *Mikhoels in the role of Menakhem-Mendl. The most celebrated transformation of Shalom Aleichem's Tevye stories was the musical, Fiddler on the Roof (1964), with a score by Sheldon Harnick and Jerry Bock.
The 12th volume of the Yubileum-Oysgabe (1912) comprises "Marienbad" (1911; Marienbad, 1982), an epistolary novel. Shalom Aleichem returns here to social milieux comparable to those depicted in Yakneho"z, creating a comedy of manners in which the vain pretensions of the superficial nouveau-riche Jewish bourgeoisie of Warsaw is exposed to biting satire, tempered by Shalom Aleichem's compassionate understanding of the all-too-human folly which drives their actions. The work consists of a polyphony of epistolary voices exemplifying a wide range of Yiddish registers from the Galitsyaner to the Litvak, from the Russified speech of Odessa to the semi-illiterate writing of the lottery winner, or to the pretentious Hebrew of pompous fools. Equally interesting from the socio-linguistic point of view is the high status accorded to German, which various characters attempt to employ with varying degrees of accuracy. The complex plot of Marienbad involves numerous wealthy Jews and their wives mainly from Nalewki Street in Warsaw, but also from Kishinev, Bialystok, Odessa, etc., whose spouses are in Marienbad nominally in order to take the waters, but who are in reality more concerned with flirting, playing cards, or securing matches for their daughters. "The world has changed," as the main female protagonist, Beltshi Kurlender, writes to her husband in Warsaw, and these characters, whose ancestors had for centuries lived the traditional life of the shtetl, have seen their world transformed by wealth and are themselves often amazed at the changes their lives have undergone. Not so far, perhaps as to permit anything particularly reprehensible to occur, but through misunderstandings, gossip, and the malice born of blind jealousy, severe matrimonial strife and at least one divorce result. Bourgeois Jewish Warsaw and Tevye are, of course, worlds apart, but the Yamaytshikhe and Tevye have in common the problem of finding matches for numerous daughters. The action is datable to the summer of 1911 on account of the mention of the visit of the shadkhn, Svirski, to the 10th Zionist Conference, which Shalom Aleichem himself attended in Basel in August. Note also the irony with which Khayim Soroker, for example, laments his failings as a writer, while his wife, Ester, compares his letters to a feuilleton.
In 1911 Shalom Aleichem's works began to appear in the Hebrew translation of his son-in-law, the Yiddish and Hebrew writer Y.D. Berkovitz, Kitvei Shalom-Aleikhem ("Works of Shalom-Aleichem," 3 vols., Warsaw, 1911–13). In fact, Shalom Aleichem had been participating in the preparation of this edition from 1905 onwards. The relationship of Shalom Aleichem's Russian and Hebrew works to his Yiddish oeuvre has still to be adequately investigated, but it may be said that, in a manner which is similar to the gestation of many of Mendele's works and anticipates the relationship between the Yiddish and English versions of the works of Isaac *Bashevis Singer, Shalom Aleichem worked together with Berkovitsh and made changes to the text, especially the endings, during the process of translation, and these emendations were in turn adopted in subsequent Yiddish editions.
The 16th volume of the Yubileum-Oysgabe (1915) comprises an incomplete version of the novel Blutiker Shpas (the complete text is only to be found in the 1923 two-volume edition; The Bloody Hoax, 1991). This novel was later dramatized and popularized as Shver tsu Zayn a Yid ("It's Hard to Be a Jew," 1948). It explores the complexities of Jewish-gentile relations and narrates the romantic complications arising in the household of Dovid Shapiro as the result of the exchange of identities between the talented Jewish student, Hershl Shneyerson, who lacks a pravozhitelʹstvo or residency permit and is unable to secure a university place, and his friend, Ivan Ivanov, the privileged son of a Russian general.
In 1913 Shalom Aleichem commenced work on a truly comprehensive edition of his works that was planned to comprise 40 volumes. In fact, only 28 volumes appeared posthumously (1917–23).
In the spring of 1914 he set out on a reading tour of Russia which was to take him to 20 cities including Warsaw, where he visited Peretz (see: "A Vokh mit Y.L. Perets" ("A Week with I.L. Peretz," 1915). At the beginning of World War i, Shalom Aleichem was taking a holiday on the Baltic coast of Germany following the conclusion of his Russian tour. As an "enemy alien" he was obliged to leave Germany and managed to reach Copenhagen, where he remained for several months in ill health and without financial support until he was able to embark for the U.S., where he arrived with his family (except for his eldest son, Misha) in December. In New York he was once again given an enthusiastic welcome and a reception was organized for him in Carnegie Hall, but serious support was not forthcoming. Cut off from his income in Europe, he was obliged to undertake further reading tours and wrote for the New York Yiddish press. He was diagnosed as having incipient diabetes, but was not in a financial position to spend the winter in the south as his doctors advised.
In 1915 Shalom Aleichem's autobiography, Funem Yarid, was serialized in Der Tog. In the past he had made several attempts to begin this work, but it was not until 1913, while living in Switzerland, that he began writing Funem Yarid in earnest. He lived to write two and a half of the projected 10 parts. In its incomplete form, the story covers the author's childhood and his romance with Olga Loyeva up to the moment at which they are about to be parted. It is noticeable that the cyclical structure of this work is comparable to that of Tevye, Menakhem-Mendl and other works with their ever recurring peripeteiai of the stroke of luck followed by catastrophe.
On September 19, 1915, while living in Lenox Avenue in Harlem, Shalom Aleichem was deeply shocked to hear of the death of Misha, from tuberculosis in a sanatorium in Copenhagen. On receiving this shattering news, Shalom Aleichem decided to rewrite his "Tsavoe" (1923; "The Last Will and Testament of Shalom Aleichem," 1994).
Despite failing health, financial difficulties compelled him to undertake yet another reading tour in 1916. One of his last stories, "A Mayse mit a Grinhorn" (1916; "Business with a Greenhorn," 2004), was published in Di Vorhayt in January. This monologue is told directly to the reader, without the need for Shalom Aleichem to act as addressee, in the voice of Mr. Baraban, a Jewish-American businessman, full of complacent contempt for the "greenhorn," potentiated by ugly sexual jealousy. This is a portrait of sheer meanness in the ruthless commercial atmosphere of New York City and is further evidence of Shalom Aleichem's growing disillusionment with the purported advantages of the New World. The story is so interlarded with Anglicisms that Berkovitz found it necessary to append a glossary, and it is evidence of Shalom Aleichem's uncannily accurate ear for language that after a comparatively brief acquaintance with the U.S. he was able to make virtuoso, satirical use of this register. In this context it is interesting to note that in a high proportion of the surviving portraits of Shalom Aleichem, he is depicted with his pocket notebook in his hand and it was undoubtedly to his habit of constantly noting down the turns of phrase that he heard around him that much of the accuracy of his narrative voices may be attributed.
On May 13, 1916, shortly after moving to Kelly Street in the Bronx and while still at work on the last unfinished chapter of Motl Peyse dem Khazns, Shalom Aleichem died of tuberculosis. Vast crowds attended his funeral, and he was mourned throughout the Jewish world. He was buried in the "Honor Row" of the Arbeter Ring section of the Mount Carmel Cemetery in Queens, New York.
After his death his popularity continued to increase not only with the Yiddish readership, but also in translation, especially in Russian, English, and Hebrew. In the 1920s and 1930s Shalom Aleichem's reputation grew steadily as the result of positive evaluation by such critics as *Baal-Makhshoves, M. *Wiener, Maks *Erik, Elye Spivak and I.J. *Trunk.
The most complete edition of Shalom Aleichem's works to date is the Folksfond edition in 28 vols., 1917–25, reprinted several times. Valuable for its critical introductions is the 16–vol. edition of the Oysgeveylte Verk ("Selected Works," Moscow, 1935–41). In 1948 a critical edition of Shalom Aleichem's collected works was initiated in Moscow by N. Oyslender and A. Frumkin. Only the first three volumes (of a projected 20) appeared. These include the complete Yiddish belletristic writings of the years 1883–90, most of which are unavailable elsewhere. The editorial work of Oyslender and Frumkin together with Kh. Shmeruk's editing of Dos Meserl (1983) and Motl Peyse (1997) serve as models for a complete critical edition of Shalom Aleichem's works, which remains an as yet unrealized desideratum.
Much of Shalom Aleichem's correspondence remains unpublished. Selections are to be found in Y.D. Berkowitz (ed.), Dos Shalom Aleichem Bukh (1926, 1958); Oysgeveylte Verk 16 (1941); A. Lis (ed.), Briv fun Shalom Aleichem, 1879–1916 (1995). For a list of published letters to individuals see U. Weinreich, in: Field of Yiddish (1954), 280–1.
Stempenyu, tr. H. Berman (1913); Inside Kasrilevke, tr. I. Gold-stick (1945, 1973); The Old Country, tr. J. & F. Butwin (1946, 1973); Sholom Aleichem Panorama, ed. M.W. Grafstein, 1948; Tevye's Daughters, tr. F. Butwin (1949, 1999); Wandering Star, tr. F. Butwin (1952); The Adventures of Mottel, the Cantor's Son, tr. T. Kahana (1953, 1999); The Bewitched Tailor, tr. B. Isaacs (1956, 1999); Selected Stories, ed. A. Kazin (1956); Stories and Satires, tr. C. Leviant (1959, 1999); The Tevye Stories and Others, tr. J. & F. Butwin (1965); Old Country Tales, tr. C. Leviant (1966, 1999); Some Laughter, Some Tears, tr. C. Leviant (1968, 1979); The Adventures of Menahem Mendl, tr. T. Kahana (1969, 1999); Holiday Tales of Sholom Aleichem, tr. A. Shevrin (1979, 1985); The Best of Sholom Aleichem, ed. I. Howe & R. Wisse (1979, 1982); Marienbad, tr. A. Shevrin (1982); Why Do the Jews Need a Land of Their Own? tr. J. Leftwich & M. Chertoff (1984); In the Storm, tr. A Shevrin (1984); From the Fair: The Autobiography of Sholom Aleichem, tr. C. Leviant (1985, 1986); The Nightingale: Or the Saga of Yosele Solovey the Cantor, tr. A Shevrin (1985, 1987); Tevye the Dairyman and the Railroad Stories, tr. H. Halkin (1987); Tevye the Dairyman and Other Stories, tr. M. Katz (1988); The Jackpot, tr. K. Weitzner & B. Zumoff (1989); The Bloody Hoax, tr. A. Shevrin (1991); Selected Works of Shalom Aleichem, ed. M.S. Zuckerman & M. Herbst (1995); Song of Songs, tr. Curt Leviant (1996); A Treasury of Sholom Aleichem Children's Stories, tr. A. Shevrin (1996); Nineteen to the Dozen: Monologues and Bits and Bobs of Other Things, tr. T. Gorelick (1998); The Further Adventures of Menachem-Mendl, tr. A. Shevrin (2001); The Letters of Menakhem-Mendl & Sheyne-Sheyndl and Motl, the Cantor's Son, tr. H. Halkin (2002). Many further translations have been published in anthologies, journals and collections including Classic Yiddish Stories of S.Y. Abramovitsh, Sholem Aleichem, and I.L. Peretz, ed. K. Frieden (2004).
No critical biography of Shalom Aleichem has yet been written, but there is a rich memoir literature: Y.D. Berkovitsh, Ha-Rishonim ki-Vnei Adam: Sippurei Zikhronot al Shalom-Aleikhem uVnei-Doro (1938–43, 1959, 19763), tr. as Undzere Rishoynim (1966); Y.D. Berkovitsh, "Memories of Sholem Aleichem," tr. K. Frieden (from Dos Shalom Aleichem Bukh), in K. Frieden (ed.), Classic Yiddish Stories (2004), 207–40; V. Rabinovitsh, Mayn Bruder, Shalom Aleichem: Zikhroynes (1939); M. Waife-Goldberg, My Father, Sholom Aleichem (1968, 1971). Attempts at objective biography are to be found in U. Finkl, Shalom Aleichem, 1859–1939 (1939); U. Finkl, Shalom Aleichem: Monografye (1959).
B. Borokhov, "Di Bibliografye fun Shalom Aleichem," in: Shprakhforshung un Literatur-Geshikhte (1966), 218–67; L. Fridhandler, "Guide to English Translations of Sholom Aleichem," in: Jewish Book Annual, 45 (1987–88), 121–42; D.N. Miller, "Sholem-Aleichem in English: The Most Accessible Translations," in: Yiddish, 2/4 (1977), 61–70; U. Weinreich, "Principal Research Sources" and "Guide to English Translations of Sholom Aleichem," in: The Field of Yiddish (1954), 278–84, 285–91; Y. Yeshurin, in: Tevye der Milkhiker (1966), 256–84. research: Many thousands of articles and reviews have been written on Shalom Aleichem's works. The following selection is of necessity very limited: Z. Rejzen, in: Leksikon, 4 (1929), 673–736; Z. Zilbercweig, in: Leksikon fun Yidishn Teater, 4 (1963), 3309–578; lnyl, 8 (1981), 677–720; A. Aharoni, Shalom-Aleikhem be-Or Ḥadash (2002); Bal-Makhshoves, "Shalom Aleichem," in: Geklibene Shriftn, 1 (1929), 91–100; Y. Dobrushin, "Shalom Aleichems Dramaturgye," in: Tsaytshrift, 2–3 (Minsk, 1928), 405–24; I. Druker, Shalom Aleichem: Kritishe Shtudyen (1939); M. Erik, "Oyf di Shpurn fun Menakhem-Mendlen," in: Bikhervelt, 1 (1928), 3–10; 2 (1928), 13–17; K. Frieden, "Sholem Aleichem: Monologues of Mastery," in: Modern Language Studies, 19 (1989), 25–37; idem, Classic Yiddish Fiction, Abramovitsh, Sholem-Aleichem, and Peretz (1995), 95–224; Y. Glatshteyn, "Menakhem-Mendl," in: In Tokh Genumen (1947), 469–84; J. Hadda, Passionate Women, Passive Men (1988), 43–55; H. Halkin, introductions to Tevye the Dairyman and the Railroad Stories (1987), ix–xli, and The Letters of Menakhem-Mendl and Sheyne-Sheyndl and Motl, the Cantor's Son (2002), vii–xxix; R. Keenoy, "Sholem Aleichem," in: Jewish Writers of the Twentieth Century (2003), 530–3; S. Liptzin, The Flowering of Yiddish Literature (1963), 88–97; C.A. Madison, Yiddish Literature: Its Scope and Major Writers (19712), 61–98; D.B. Malkin, Ha-Universali be-Shalom-Aleikhem (1970); N. Mayzl, Undzer Shalom Aleichem (1959); D. Miron, The Image of the Shtetl and Other Studies (2000), 128–334; S. Niger, Shalom Aleichem: Zayne Vikhtikste Verk, Zayn Humor un Zayn Ort in der Yidisher Literatur (1928); A. Norich, "Portraits of the Artist in Three Novels by Sholem Aleichem," in: Prooftexts, 4:3 (1984), 237–51; N. Oyslender, "Der Yunger Shalom Aleichem un Zayn Roman Stempenyu," in: Shriftn fun der Katedre, 1 (1928), 5–72; L. Prager, "Shalom Aleichem's First Feuilleton Series," in: Jewish Book Annual, 44 (1986–7), 120–31; D.G. Roskies, Against the Apocalypse (1984), 163–95; D. Sadan, "Sar ha-Humor," in: Avnei Miftan 1, (1961), 26–56; M. Samuel, The World of Sholom Aleichem (1973); N. Sandrow, Vagabond Stars: A World History of Yiddish Theater (1996), 179–83; Kh. Shmeruk, Ayarot u-Khrakhim: Perakim bi-Yẓirato shel Shalom-Aleikhem (2000); E. Spivak, Sholem Aleykhems Shprakh un Stil (1940); Y.Y. Trunk, Shalom Aleichem, Zayn Vezn un Zayne Verk (1937); idem, Tevye un Menakhem-Mendl in Yidishn Velt-Goyrl (1944); S. Werses, "Shalom-Aleikhem: ha-Arakhot ve-Gilguleihen ba-Aspaklaryah shel Ḥamishim Shenot Bikoret," in: Molad, 133–34 (1959), 404–21; M. Viner, Tsu der Geshikhte fun der Yidisher Literatur in 19tn Yorhundert, 2 (19462), 235–378; M. Waxman, A History of Jewish Literature, 4:1 (19602), 507–21; J. Weitzner, Sholem Aleichem in the Theatre (1994); R.R. Wisse, The Schlemiel As Modern Hero (1971), 41–57; idem, The Modern Jewish Canon (2000), 31–64; idem, Sholem Aleichem and the Art of Communication (1980).
"Shalom Aleichem." Encyclopaedia Judaica. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>. | 2019-04-19T06:42:48Z | https://www.encyclopedia.com/religion/encyclopedias-almanacs-transcripts-and-maps/shalom-aleichem |
Additional Trade Allowance. Bring in this coupon for an additional $500 Additional Trade Allowance. towards your trade-in vehicle. Bring in this forJanuary an Allowance. additional $500 Offer validcoupon through 31, 2018 Additional Trade towards your trade-in vehicle.
10% OFF 10% OFF Any Service 10% OFF Any Service Cannot be combined with any other offers. Offer valid through January 31, 2018. Cannot be combined with any other offers. Offerbe valid throughwith January 31, 2018. Cannot combined any other offers. Offer valid through January 31, 2018.
Happy New Year! With each passing year we face change – various forms manifest over time, but nonetheless, it happens. Over the years, we have seen significant changes within our community: new development, new businesses, loss of favorite businesses and even people. This year, we welcome positive change and hope you do as well. In the past, our January issue featured a business directory, but this year we have modified our content to better serve you. Since technology advances enable us to conduct a prompt query by asking Siri for addresses, phone numbers and websites, we felt this year instead of the directory we would share valuable information on some of our local businesses. We have included stories in this issue on a few businesses: veteran, new, and some have who have left our community. Additionally, our content this month provides resources for nonprofit organizations and general tips if you own or are thinking about starting a small business. Let’s keep the 2018 celebrations going by recognizing the strength and diversity of the businesses our county offers. For some local entrepreneurs, 2017 provided milestone celebrations, which we would like to share. Congratulations to... Biotrek Adventure Travels – 25 years in business Fabric Emporium – 22 years in business (they will certainly be missed - enjoy retirement!) First Baptist Church – 150 years of worship in our town Framecraft – 10 years in business Piedmont Press & Graphics – 30 years in business We realize there are many more local organizations that may have celebrated anniversaries this past year, so if you know who they are, please let us know by emailing us or sharing the information on Facebook (make sure you tag us). We want to celebrate along with all of you who contribute to the economic vitality of our region on a daily basis. Thank you readers, for allowing us to serve you by providing enjoyable content each month. I wish everyone a safe, healthy and happy 2018.
H appy N ew y ear !
Charles Rose is a seasoned property expert. His diverse background and relaxed approach make for easy conversation, whether you’re interested in home-buying, selling or commercial property. Talk to Charlie today.
On this month’s cover, Lora Gookin from Gâteau Bakery Cafe & Tea Room. Photo by Kara Thorpe.
This year with all the amazing support, we were able to donate 706 holiday treat containers to Walter Reed!
contributed to make this possible. Plus F4F attended the MM Pierce Elementary School PTO meeting in December and kept the children busy with crafts and Christmas Slime! We also dropped off a large number of painted rocks on December 6 for our community garden at the WARF. A special thank you to the following for their support with our December projects: Earth, Glaze and Fire, Handyman Cans, Peak Roofing, Puroclean, Gainesville Pediatric Dentistry, Girl Scout Troop 1908, Anita SadlackState Farm, Jane S., Amy W., Amanda Y., and Edward JonesFinancial Advisor Matthew Fusaro. Our community is full of amazing, giving families. We look forward to offering more fun-filled, family events in 2018. Take a look at what is coming up.
Jog 5K/1 Mile Just Cause F4F Beneficiary Registrations at 8 a.m. Location: Vint Hill Community Center Families4Fauquier will receive 100 percent of your registration fee for those that registered under Families4Fauquier as your nonprofit of choice. Come out and celebrate 2018 and support our organization while you are having fun. FEBRUARY 10 Painted Rocks Club at 10 a.m. Location: Northern Fauquier Community Park This event is hosted by Northern Fauquier Community Park and the theme is "Keeping Fauquier Beautiful.� All rocks and supplies provide. Just bring your smile and join us for some fun.
Keep updated on all of our activities and events by visiting our Facebook events page.
Just Listed!! “Belle Haven Farm� Conveniently located at the corner of I-66 and Ramey Road in Marshall. Beautifully situated on roughly 50 acres. This property includes three rental houses. The main house features four bedrooms, a formal dining room and living room, large home office, first floor master, spacious laundry area, huge family room and two separate apartments and a finished basement. All showings must be scheduled and approved online, prior to showing.
Opposite page (clockwise from top, left): Argentina, Tanzania, Morocco, Galapagos, Chile, Guatemala. Above (background): India. Above: Reynolds at her Main Street studio. Photo by Kara Thorpe.
Sunny’s photography experience and talent is on display in her two published books as well on as her website (sunnyreynoldsphotography.com). The Random House publication Hardie Newton’s Celebration of Flowers, features exclusive photography from Sunny. Additionally, she published her own book Boats, in 2002.
artwork. “We were successful right away,” she says of their sold-out shows. The gallery even sponsored international artists who came to showcase their work. “Although it was successful, it became too much to maintain the gallery and corporate photography,” Sunny explains. When her partner moved on, Sunny relocated to 81 Main Street: “I quit the ad agency and gallery to start a travel company.” Sunny returned to Costa Rica and met with in-country ground operators. “At first, I did it all on my own. I remember personally renting a passenger van and driving people around the country,” she says. Those early trips were full of adventure. “We always had a flat tire, it was just something we could count on because of the quality of the roads. I made a game of it and would see how fast we could change the tire,” she says of making the most out of the situation. “One time, after a flat, in Monteverde, we ended up catching a ride with the local coffee pickers back to town. It’s a memory that will last forever for the guests on the trip,” she reminisces. It was Sunny’s friends and family who embarked on those first trips. “I called that group the ‘Dream Team’; they have travelled to many countries with me over the years,” she reminisces. Twenty-five years later, Sunny is still the Above, left: Galapagos. Above, right: Cuba.
It is recommended to book trips six months to one year out. Scheduled payments are available. For information on upcoming expeditions visit biotrekadventuretravels.com or call 540-349-0040.
About the AUTHOR Aimée O’Grady is a freelance writer who enjoys transforming stories told by Fauquier residents into articles for Lifestyle readers. She learns more and more about our rich county with every interview she conducts.
Thinking About the Future We get so caught up with day-to-day living that we often do not think about the future until it’s too late to do anything about it. Do not waitdo some estate planning, sign your will, prepare a trust, provide for your spouse and children.
At Morrison, Ross and Whelan, we can help guide you through the complexities of estate and trust creation and administration, set up guardianships and help in probate litigation. We are committed to providing knowledgeable, caring and personal counsel – whether you are handling the unexpected or planning for the future – your family deserves the best.
professional, compassionate I still believe the personal approach is necessary to distinguish small businesses in the cyber world.” based services. Depending on your business, you may want to invest in an attractive revenuedriven website. Presence on social media has become equally important. But if you don’t have time for posting new content on Facebook, Twitter, etc., you can outsource this chore for a monthly fee. To keep up with the speed of online sales and information, you also need the fastest provider and desktops, laptops, or tablets available. I was recently excited to learn Comcast is now delivering Gigabit speed in Fauquier. Fast internet will make remote logins into your office from the road or at home much more enjoyable. Also consider a Voice Over IP (VOIP) telephone system. It uses your internet to make and receive phone calls and can be arranged to handle multiple simultaneous calls through just one official phone number. You can even forward calls to your cell phone and make calls from your private cell phone without revealing your personal mobile number. Despite all of these technology opportunities, I still believe the personal approach is necessary to distinguish small businesses in the cyber world.
Get a Great Start on the New Year!
Group X Classes Unlimited Tanning FREE Playroom FREE To Join!
Left: Wild-Caught Salmon on Orzo Pasta Salad with Spinach and Caramelized Onions (photo by Caitlin Scott of Great Scott Photography). Left, Center: Tomato, white bean, kale, and sausage stew. Left, Bottom: Chicken vegetable soup and turkey ginger meatballs.
COOKING CLASSES AND CAMPS A variety of monthly adult cooking classes and teen summer camps are available. For more information visit the website or stop in Warrenton Wellness Kitchen for an information sheet.
provides financial protection for your business in the event of claims, lawsuits or settlements. These may arise as the result of injuries or property damage connected with your business pursuits, or even non-physical acts like slander or libel. General liability is a vital component of business insurance.
The person you select needs to be available to assist you, protect your assets, understand what is available for your industry, and educate you on what is really necessary coverage to have in case a situation arises. OPT FOR EXCELLENT CUSTOMER SERVICE.
protects the insured (the business owner) in the event it fails to administer 401k, health insurance or any other employee benefit in a manner that causes a loss to the employee. UMBRELLA POLICY is additional liability coverage over all other insurance policies your organization may carry. This is good to have as your business grows and engages in larger projects. SELECTING AN AGENT CHOSE SOMEONE WITH A HIGH LEVEL OF EXPERIENCE.
An agent with experience will have the knowledge base to guide you on what you actually need to cover against loss.
Sierra Ball is the owner of Siquin Insurance Services located at 32 Waterloo Street #207. She has 20 years of insurance experience and has owned and operated her insurance business since April of 2016. She is an independent insurance agent specializing in small businesses. For more information regarding Siquin Insurance Services, please call (540-349-6775) or email (sierra@siquininsurance.com).
Expanded Veterinary Team. Latest Technology and Procedures. Unmatched Lower Rates.
The Veterinary Referral Center of Northern Virginia added a board-certified surgeon, a boardcertified emergency and critical care specialist, and two emergency veterinarians to better serve you. Our highly qualified team: ■ Provides unparalleled, leading-edge walk-in emergency and referred internal medicine, surgery, and behavior medicine services ■ Utilizes the latest proven technology and procedures ■ Consistently provides compassionate care to our patients ■ Understands the needs of our clients You receive exceptional veterinary services at rates that are significantly lower than other referral centers throughout Northern Virginia making specialized care for your pets affordable. Contact us at 703.361.8287 for an exceptional experience for you and your beloved dogs and cats.
advertisements much more than twice a year, she relied mainly on word-of-mouth referrals. She also relied on attracting visitors to her retail location. One of her methods was utilizing her storefront windows. “The window displays were very important as they showed people who we were, before customers came into the store. It showed our style, products, and colors. The windows drew people into our business,” Maria shared. She did add that a combination of products and services periodically changed in the window displays definitely helped draw the attention of potential customers.
You can’t miss us. We’re the bright green railroad house nestled in the heart of You can’t miss us. We’re the bright green railroad housewith nestled in theand heart historic The Plains, Virginia. Our dining room is filled laughter theof historic The Plains, Our dining room on is filled withThere laughter the irresistible aroma of Virginia. something special sizzling the grill. areand typically irresistible aroma something on the grill. several happy folksofsitting on ourspecial front sizzling porch, enjoying a fineThere meal are andtypically a cocktail several happy folksinsitting on our frontpace porch, enjoying a finecountry meal and a cocktail or two and taking the slow, relaxing of our charming town. or two and taking in the slow, relaxing pace of our charming country town.
instilled a strong work ethic in Maria which have impacted her, even now. “My grandmother’s hard work especially stands out to me. She persevered; she wouldn’t give up. I wouldn’t be who I am today without her,” shared Maria. Twenty-two years after opening, Maria and Joe have now retired. As of midDecember, Fabric Emporium has permanently closed its doors. “Joe’s been ready [for retirement] for several years now. We have never taken the time to explore and just do things. Nothing in life is a guarantee, and while we are still able – now is the time to travel.
Come visit us one day soon and find out for Come why...life visit us one day soon and on findthe out for yourself is always better porch. Life is always on the yourself why...life isbetter always better on theporch. porch.
TECHNICAL ASSISTANCE: Organizations may access PATH Resource Center staff via email, phone or in-person.
LENDING LIBRARY: The Center offers a library, specifically with a nonprofit focus, for organizations to utilize.
FOUNDATION CENTER: A database of over 4 million grants worldwide is available for organizations to use for free during operating hours. GRANTS COACH: Organizations may have access to a volunteer grant coach to assist with identifying and completing grant applications. WORKSHOPS: Monthly workshops on topics such as governance, philanthropy, marketing, finance, human resources, volunteer management, and strategy. Upcoming events can be found here: pathforyou.org/ resource-center/.
ADVANCED TRAININGS: These trainings provide an opportunity for in-depth learning about a particular topic. In 2018, these include Board Academy in March and April and a Philanthropy Academy later in the year.
PATHWAY TO A HEALTHY ORGANIZATION: Nonprofits engage in a self-assessment instrument that helps identify strengths and challenges and establish capacity building goals.
ONSITE TRAINING: PATH Resource Center staff can come to your organization for onsite training to your board or staff.
provide clarity and guidance to move toward the objective.
EXECUTIVE LEADERSHIP CIRCLES: Once a month, facilitated circles provide peer to peer executive support and an opportunity to discuss current problems with local experience in a confidential setting.
POWER OF PARTNERSHIP (POP) TALKS: 90-minute meetings covering a topic with an opportunity to network with other organizations.
space any new information that needs to be sent to the nonprofit community.
MEETING SPACE: The PATH Resource Center has a meeting room with seating for eight, it also offers a screen and internet capability for web conferencing. The PATH Foundation’s conference room can hold up to 20 in a board meeting configuration. In 2018, the PATH Foundation and PATH Resource Center will be moving new space on Walker Drive in Warrenton. This new facility will have meeting space for up to 100 people.
Thank you for a terrific 2017; 50 transactions and +$20 million in Sales. I am looking forward to another great year for my clients in 2018. My goal is to place a SOLD sign in your front yard and/or help you find the home of your dreams.
All information provided in this advertisement is deemed reliable but is not guaranteed and should be verified by interested parties.
his month’s publication focuses on our small local businesses – how they benefit the community, how they may be successful, and how they are ingrained into our daily lives and the town itself. To answer some business-related questions which may be helpful, I turned to Joe Martin, President of the Fauquier Chamber of Commerce, who shared his five tips for local business owners.
THE CHAMBER HELPS BUSINESSES BY: • Connecting business to the key companies, departments and individuals that are essential to growth.
• Offering multiple chamber events throughout the month, plus five major events each year: Valor Awards, Annual Meeting and Awards Gala, Old Town Warrenton Spring Festival, Taste of Fauquier, and Fauquier Fall Festivities – a series of events in September and October focused on economic and workforce development.
• Legislative events to bring members information on legislative issue businesses face today.
• Women’s Business and Young Professionals Councils.
Happy New year & Thank You to our customers for your business Mention this ad and get $150.00 OFF a new Water Treatment System & $75.00 off any water Heater Replacement.
FOR MORE INFORMATION ON BECOMING A MEMBER OR FOR MORE DETAILED INFORMATION ABOUT SERVICES AVAILABLE TO EXISTING MEMBERS, CONTACT JOE MARTIN AT FAUQUIER CHAMBER VIA EMAIL JOE@FAUQUIERCHAMBER.ORG.
Or see in store for details.
Put Your Plan in Motion Let’s start a conversation!
initially utilize the space they had for her newly formed business. After years of working in her home commercial space, Gookin knew it was time to make some changes. Around 2014, she hired help; prior to that she completed all her own work. One and a half years later, she hired more employees and still kept growing. For her, it became difficult to work and grow her business out of her existing space. About two years ago, Gookin was out for a walk on the Greenway with a friend and said, “Know what? I’m going to find a building.” And she did. After looking at the space at 12 Culpeper Street, as well as other potential sites, she felt the Culpeper Street offered an ideal location for her business, and it was large enough to accommodate her vision. “No building plans were on record for the property, so I took some measurements and sketched up some ideas,” explained Gookin. After her initial thoughts were solidified and incorporated into her sketch she reached out to David Norden, a local architect, to finesse her ideas. “He took my rendering and recommended some changes: a big one was to utilize the second floor of the building as the commercial kitchen. I had not thought that would have been a possibility,” Gookin shared. Once the architect made recommendations to create a more functional floorplan, she moved forward with 10 months of renovations to the interior and exterior of the building. The incredible transformation has now been completed. The building, which offered boxed-in rooms and a dark interior when Gookin purchased it now showcases a space with high ceilings, refinished original floors, large windows, and exposed brick walls. The interior space offers a charming atmosphere with a rustic elegance. Crystal chandeliers were hung which now provides a shimmering light – similar to glitter – during the early morning hours.
DA I LY OFFERINGS: • Custom, noncustom, and bakery cakes • Cupcakes • Cookies • Scones • Crêpes • Soups • Sandwiches • Salads • Breakfast sandwiches • Quiche OFFICIAL GRAND OPENING C E L E B R AT I O N : January 27, 2018 HOURS OF O P E R AT I O N (Beginning January 27) Monday through Saturday 9 am until 4 pm NOTE: Gâteau is open now but hours of operation will vary until the grand opening celebration. Follow them on social media or visit the website (1gateau.com) for more information.
We can also pick up your other outdoor power equipment on the same trip! (walk behind, push mower, trimmer, blower, etc.) Get your tune-up done now before the long waits that come in the spring and save! Local area only. Off er expires Offer expires 2/28/17. 2/28/18.
Simplified Employee Pension Plan (the IRS loves acronyms) – allows an employer to make tax deductible contributions directly to an IRA in the name of the employee. For 2017, the contribution limits are 25 percent of the employee’s compensation, or $54,000. These types of plans are often used by solo business owners such as real estate agents and consultants. The business owner and the employee are one and the same, but the SEP IRA structure allows for a much larger contribution to an IRA, while providing a significant tax deduction.
mall business owners have many challenges, and for them prioritizing what to address and when is probably the most difficult part. Many owners wear several different hats, but all too often the hat of “retirement plan administrator” goes unworn. It shouldn’t. Just because you are a small business does not mean there aren’t options for offering a retirement plan to both yourself and your employees (if you have any). Contributing to an IRA (Individual Retirement Account) on your own each year is certainly a good idea, but the current limit of $5,500 per year (for those under age 50) is probably not enough to satisfy a longterm retirement plan. The IRS provides several options for the small or solo business owner, but the two most popular and straightforward are the SEP IRA and the SIMPLE IRA. Both have much higher contribution limits than an IRA and have tax advantages. Most importantly, both have little to no startup or ongoing costs and are simple (no pun intended!) to set up.
About the AUTHOR Nathan Gilbert is an Investment Advisor and Managing Partner with Meridian Financial Partners in Warrenton, Virginia. Meridian is an independent, fee-only investment advisory firm providing financial planning and investment management. Mr. Gilbert was born and raised in the area and currently resides in Haymarket with his wife and three children.
Continental and General brand tires only.
6 and 12 month promotional financing available. APPLY TODAY!
Ring in the New Year with a New Beginning! Let the Law Office of Marie Washington help you start your new business.
hen you’re a regular at Siggi’s Men’s Grooming Place, you know to expect not just a great haircut but also a warm greeting from bubbly shop owner Siggi Jamison and her team. “We’re just huggy people,” she says, laughing, of her crew of three barber-stylists, a nail technician, and a masseuse. “People always come in and ask, ‘Where’s my hug?’” Siggi’s Men’s Grooming Place has earned a solid reputation for its friendly staff and outstanding service. And in her new shop in Warrenton Plaza, Siggi has worked hard to create an appealing gathering place with guy-friendly décor, a coffee bar, and clever personal touches like barber stations fashioned from tool chests. “We have guys come in and sit and shoot the breeze with us,” she says, “and it’s fabulous. I just love it. Siggi’s Men’s Grooming Place offers haircuts, straight razor shaves, massage therapy, hand and foot care, and even facials. “Siggi’s is about the people who come in here, giving them a place to relax,” she says. “There are so many pampering services for women. I used to wonder, why is there not something here in our cozy little town of Warrenton? I wanted to create a place for men to be pampered.” “I want for my guys to feel like: ‘I just had an hour of vacation. This was one hour of my time where I forgot work, where I forgot responsibilities, where I got to relax.’” Siggi began studying cosmetology in 1980. “We had to study for three years, which is 6,000 hours,” she remembers. Siggi worked for some time in Germany, then came to the United States in 1988 with her Above: Siggi’s new location in the Warrenton Plaza features guy-friendly décor and clever personal touches like barber stations fashioned from tool chests.
Special Exhibition Opens Saturday, January 20 Reception with the Kevin H. Adams 4-7p Shenandoah National Park Artist in Residence Kevin H. Adams unveils the paintings he began on location during his residency in Summer 2017. Kevin will present one of the paintings to the Superintendent of Shenandoah National Park for the Park’s permanent collection. Beverages and refreshments will be served during the reception.
Please join us on Saturday, January 20 from 4-7pm!
The Gallery will donate 20% of the sales price to the Shenandoah National Park Trust for all of Kevin’s paintings sold on January 20. The Gallery will be open from 10a-7p on the 20th.
Katie Fuster lives in Warrenton with her husband, children, and rescue dogs.
The Best Mexican Food Specialties You’ve Ever Tasted! 4 Hard or 3 Soft Shell Meat or Bean Tacos with 16oz. Fountain Drink $5.39 Offer Good With This Coupon Through 01/31/18. Limit One Coupon Per Customer or Family. Not Good With Any Other Coupon or Offers.
$1 Off Breakfast Burrito of your choice Offer Good With This Coupon Through 01/31/18. Limit One Coupon Per Customer or Family. Not Good With Any Other Coupon or Offers.
Personal care when and where you need it. Extraordinary people. Extraordinary care.
Hourly or overnight service and much more!
Serving Fauquier County and other surroundings counties.
f you own a small business or are starting a small business, you need to spend some time thinking about the finances and know what you need from your bank. Interview banks to make sure your specific needs will be met appropriately and consider not only accounts, but services and lending options as well. Here are some general tips business owners may find helpful.
determine what the financial institution’s business deposit account offers and what the cost of those accounts will be. Many banks offer free checking to small business – without requiring a minimum balance. Banks also offer several optional business services which may assist a company with efficiency.
Research how business friendly the financial institution is. Are there online banking options available? Are there options such as business bill pay or ACH (Automated Clearing House) available? Understand how deposits are made. Remote deposit systems allow owners to make deposits without having to go to the bank which allows individuals to spend more time on their business. Business banker’s provide valuable insight on all the various services available which may fit well with your specific needs. Keep in mind some additional services have fees, so verify the costs and conduct the interview with the financial institution prior to opening an account.
If you are a new business owner and seek financing for your venture the banks will require a business plan. This plan outlines how you will support your business and yourself during the launch of your venture. If you do not have or know how to create business plan you may turn to others for assistance. The Small Business Development Center at Lord Fairfax Community College and classes offered through People Inc. are just a few of the local entities which provide assistance in these matters.
There are many loan options for business. Banks can offer Lines of Credit, Term Loans, Commercial Mortgages and more. Also most banks offer loans that are supported by the Small Business Administration. When meeting with your banker, make sure that you are prepared to discuss your need not a specific product. The business banker will want to match the loan product to the purpose you have for the loan.
One thing to keep in mind, not all banks are the same, so make sure you find one to fit your needs. For more information regarding banking and lending solutions, contact your local bankers to see what solution will work for you. ❖ About the AUTHOR Margie Markahm has 35 years of experience in the banking industry and has served the Warrenton business community for the past 14 years. She is the vice president of commercial lending with Summit Community Bank. For more information visit Summit Community Bank’s website or call (540-347-7779).
Call us for an Air Conditioning Service Check-up!
All Nikon products include Nikon Inc. USA limited warranty. ©2017 Nikon Inc.
F RESOLUTION SOLUTION PROGRAM A Resolution Solution program will begin in February and will include changing six small actions that should help provide some big results. The six-week program introduces six healthy habits. All new healthy habits should be completed six of the seven days of the week. The six habits include: • 8 ounces more water a day • Add a fruit with lunch or a vegetable with dinner • Turn off electronics one hour before bedtime • Get 10 minutes more cardio exercise each day • No processed foods for one meal a day • Be more mindful for five minutes a day (journal, meditate, breath work) Each participant will scale these habits — easiest to hardest — and add one healthy habit each week. They will build a pyramid of big results by slowing building on small changes.
SPECIAL WINTER PROMOTIONS AT THE WELLNESS CENTER The Fauquier Health Wellness Center has a variety of seasonal promotions to help keep you healthy all winter long. For the month of January, new or current Wellness Center members who pay six months up front will receive: • 1/2 off of the joining fee, and • Either one hour of personal training or a free one-hour massage. The bonus can be split into a halfhour of training and a half-hour massage ($60/$56 total value).
Before applying for permits, business licenses, etc. it is strongly recommended you give careful thought to several issues, including, but not limited to: What is it you want your business to be? What is your value proposition; what do you have that people will pay for?
f you are opening a business in Fauquier County, the very first thing you should do is visit one of the county’s three business incubators; take advantage of the free counseling they offer. The Mason Enterprise Center - Fauquier, is located at 70 Main Street. Renee Younes, the director, will work with you and arrange appointments for you with counselors from the Small Business Development Center, George Mason University, and other helpful agencies. The other two centers are managed by Jennifer Goldman, who spends time at both the Vint Hill and Marshall locations; these are referred to as the Fauquier Enterprise Centers. Both offer free assistance to anyone who lives and/or has a business in Fauquier County. There is paperwork to complete, including business licenses from the County or Town, tax forms, permits and other forms, but the business centers referred to above, as well as the County and Town economic development staff, will help you sort your way through those steps. We may also help you make an informed decision about whether you really want to start a business, or if your concept is viable.
How are you financed: savings, family money, investors, loans, mortgages? Do you have a business plan? What is your budget? Have you accounted for all costs? Where do you need to be in order to reach customers and suppliers? What kinds of marketing techniques do you plan to use? How will your business be managed? How will you keep track of your finances? What kinds of insurance do you need and how much will it cost?
About the AUTHOR Friedman has been the the Director of Economic Development for Fauquier County since 2013. He has a deep and diverse background in economic development, including consulting, teaching, lobbying and leading a national economic development group in Washington, DC. Friedman and his wife of 41 years, are the proud parents of two grown children, and Miles enjoys spending time with his two young grandsons and two granddaughters.
540.351.0922 or info@rossva.com Charming Old Town Home, Recent Upgrades Contact Rossor Real Estate Today! 540.351.0922 info@rossva.com Price Reduced to $375,000 Contact Ross Real Estate Today!
MOSS HOLLOW ROAD 4 bedrooms, 2 full & 2 half baths Offering includes a 6+ acre building lot in FQ Land Use Program. 57.9 acres in VOF Esmt. This finely finished home is perched with a commanding presence to maximize it’s views. An exceptional kitchen in size and finishes flows into the main living and entertainment areas. Nearly 1,900SF of deck and porches.
BROADVIEW ACRES Norfolk Drive-Great Split level detached house.
LOVELY ONE LEVEL 3 Bedroom 2 Bath Home in Sought After Menlough.
4 BR, 2.5 bath, gas fireplace in FR, DR with vaulted ceiling, wood floors (wood floors also under carpet in bedrooms) granite counters, spacious rec room with entrance from back yard, fenced yard, 2 sheds, french doors open to covered rear porch, paved driveway with parking area, covered patio. Close to shopping, medical, and commuting routes.
Open Floor Plan spacious Family Room with Vaulted Ceiling and Gas Fireplace leads to Sun Room and Deck. Kitchen with Breakfast Room. Spacious Owners’ Suite with Walk-In Closets/Bath/Soaking Tub/Shower/Double Vanity, New Carpet, Freshly Painted Throughout, Driveway Sealed.
ichael Manfro grew up in Warrenton and attended Fauquier High School. He was an athlete and an excellent baseball player. Michael even played up and down the East Coast and competed in professional baseball tryouts. He always enjoyed being an athlete. Then he went away to college to pursue a career not related to sports, but along the way he found the path to his true vocation. Initially, Michael thought he wanted to be a teacher; by his sophomore year at Greensboro College he realized sitting in a classroom day in and day out was not the type of instruction he envisioned. With the assistance of mentor Dr. DeAnne Brooks, assistant professor of exercise science at Greensboro College, he soon realized that he would still be able to teach, and incorporate his love for performance training into a career – performance training and fitness. Michael was positively influenced by a few other mentors – Dr. Michelle Lesperance and Dr. Brenda Burgess.
Above: Manfro at his facility on Main Street. Next page: Manfro training in a small group setting.
is one of the nation’s leading cabling contractors and providers of business phone systems and services.
any times owners will ask me, “is my pet in pain? Does my dog or cat feel pain like we do?” The answer is a resounding “Yes.” Dogs and cats are very similar to us physiologically. How their muscles, bones, tendons, nerves, etc. respond to pain/stimuli is identical to how people respond. How our pets communicate pain to us is where we differ.
Should we treat our pet’s pain?
How do I know if my dog or cat is in pain?
vocalizing, shivering, shallow breathing, and pupils that appear larger than normal. Dogs in particular may lose their appetite when they are in pain. When dogs and cats are lame (favoring a leg) after running, jumping, rough play, or trauma—this is an indicator that the leg is painful and they are unwilling to use the leg normally.
What is the next step once we recognize that our dog or cat is in pain?
I recommend that you contact your regular veterinarian if you believe your pet is in pain. There are numerous causes of pain that may be a medical emergency. What ailments can make your dog or cat be in pain?
fractures (if your pet is struck by a car it should be seen immediately by a veterinarian), or trauma from chasing a squirrel in the backyard. Gastrointestinal problems can lead to abdominal pain. Ingestion of inappropriate items, liver disease, and pancreatitis can be agonizing, Urinary problems can be painful in dogs and cats. Blockages due to stones in the kidneys, urethra, and ureters can be very uncomfortable. Chronic arthritis is one of the most common types of pain we treat in veterinary medicine. As discussed earlier, our pet’s physiology is very similar to our own so when your dog or cat is diagnosed with arthritis their discomfort is similar to ours. Arthritis can be secondary to an old injury, such as an old fracture or from a ligament tear, hip dysplasia, or degeneration due to age.
Yes, we should always make an effort to treat our pet’s pain. The research is conclusive that pain, especially if it is experienced over a long period of time, can actually be hazardous to a dog’s or cat’s health. The reason is that pain is a stressor and the body begins to release a set of stress-related hormones in response to that stress. These affect virtually every system in the body. They alter the rate of metabolism, cause neurological responses, and cause the heart, thymus glands, adrenal glands and immune system to go into a high state of activity. If this situation continues long enough some organs may become dysfunctional. In addition, the tension that the state of pain-related stress induces can decrease the animal's appetite, cause muscle fatigue and tissue breakdown, and also rob the dog or cat of essential healing sleep. The stress that the pain causes can prevent our pets from healing. How do we treat our pet’s pain?
It is our goal to treat our pets appropriately for their specific diagnosed problem. With the known diagnosis, we can customize our pain management plan. Not all of the following pain medications may be beneficial for your pet, so please ask your veterinarian what is appropriate. All pain medication should be prescribed by your veterinarian—do not use your own pain medication to treat your dog or cat. It is important to treat the underlying cause of pain to help your pet improve.
Dr. Morris is the director of the Surgery Division of the Veterinary Referral Center of Northern Virginia in Manassas and the owner of the practice. His experiences while working at the Audubon Zoo as a student reinforced his enthusiasm for a career in veterinary medicine. He graduated from Tufts University School of Veterinary Medicine, and then completed a one-year Small Animal Surgery/Medicine/Emergency Internship at the Darien Animal Hospital in Darien Connecticut and a three-year surgical residency at the University of Minnesota Veterinary Teaching Hospital where he was trained in orthopedic, neurological, and soft tissue surgeries. He has special interests in cranial cruciate injuries, thoracic surgery, and juvenile hip dysplasia. Dr. Morris can be reached at 703.361.0710, ext. 3 or drmorris@vrc-nova.com.
We would like to wish everyone a healthy and prosperous New Year! We can’t wait to see what this year holds. Whether buying a new home or selling your existing home we will be there to help you with every step of the process. Now is the time to start thinking about the Spring Market! Call us today for a free market analysis. We also will let you know what, if anything, needs to be done to have your house market ready.
hen you look at a men’s or women’s fitness magazine with ”the Rock” or Heidi Klum on the cover do you find yourself wishing and dreaming you could look like that too? What about your Facebook feed with the 25 year-old ripped fitness models doing chin-ups easier than you can get out of bed in the morning? I must confess that I wish I had that muscular, chiseled look that has made Dwayne Johnson a household name. But I also realize that although I can improve my current physique, it’s not possible for me to be built exactly like another human being. We all have DNA that is specific to us. I want you to see yourself as an individual and not compare yourself to models, media stars or your really fit friends. Let me be clear, it’s good, and necessary, to have goals. But often times, the goals we set are unobtainable, and when left unmet result in a sense of failure. The intent of this article is to encourage a mindset change towards setting goals.
S.M.A.R.T. One of the best tools that I have used when creating goals with new clients is the S.M.A.R.T. approach. The acronym stands for Specific, Measurable, Accountable, Realistic, and Timeframe specific. Let’s go through these one at a time and I’ll explain how they can relate to you, and specifically attaining your goals.
people come to us wanting to lose weight. I ask, what do you weigh now? “I don’t know,” they say; they’re afraid of the scale. Most people think they want to lose weight but what they are actually looking for is fat loss. Both weight loss and fat loss are specific goals, and they are measurable. The other specific way to set goals is around reductions in dress size or pant size.
Before we set goals we MUST measure! And what’s awesome about this is we now have an extremely accurate way to measure fat composition with a Bioelectrical Impedance Analysis (BIA) – a medical grade, non-invasive technology that measures body fat, lean muscle, and water in less than a minute. By using your BIA, we can set specific percent body fat loss as a goal. If you don’t know where you are trying to go, how will you know when you’ve reached your destination?
each workout, or simply announcing your goal to your friends, family, and co-workers. We always suggest that you take the time to not only write down your goals and put them up where you can see them several times per day, but to also write down your “why.” What are the reasons you want to lose weight? Those reasons serve as huge motivators when the going gets tough.
I mentioned previously, set goals that are realistic and achievable. Take into consideration your height and body type, your family history, and your past mentality towards training and eating correctly. Once a client said to me “I’ve never worked out, but I want to go six days per week starting January 1.” I replied, “Well, let’s get started with two times per week and work towards the six,” which is a more realistic goal.
Break your goals down into eight-week or twelve-week mini goals. If your goal is to lose 30 pounds by the end of the year, start with losing 10 pounds by March 30. Better yet, how about losing five percent of body fat by March 30?
Linda McGuire checks off her accountability chart at Next Level Fitness.
TIPS TO HELP YOU REACH YOUR 2018 FITNESS GOALS • Consistency is key. Whether it’s trips to the gym or nutritional habits, nothing beats consistency. • Find a coach. You’ll need accountability, exercise and injury recovery knowledge, food prep skills, and encouragement. Once you have the right coach everything starts to fall into place. • Attitude overcomes a lot of failures. Get up. Show up. Do your best. • Track your progress. Use a calendar, a Fitbit, check in with your coach, or even make a simple check mark on a spreadsheet on your desk at work. • Start now! There is no better time than the present. No one knows when that health scare is coming. Make a decision to do it and get started.
misunderstanding between you? There’s nothing new about the comments people make about “how kids these days” are different from previous generations. In fact, grown-ups have been saying this since ancient times. Plato is attributed with the following: “The children now love luxury; they have bad manners, contempt for authority; they show disrespect for elders and love chatter in place of exercise.” Still, today’s young adults seem unique in almost every aspect. Millennials are digital natives. They have grown up online and plugged in. A millennial would prefer to text or message someone whereas other generations would prefer face to face communication. While it’s clear to everyone technology has changed the way we connect and communicate, we must continue to make an effort to bridge those gaps. The first step is to understand each generation values different things – not better or worse.
As children, this generation was told they were to be “seen and not heard”, thus earning the title, the silent generation. They grew up during the Great Depression and World War II and many fought during the Korean War. They rarely focused on how to change the system, but rather how to work within the system and valued stability, safety and commitment.
Warrenton’s Best Kept Secret! ett! Warrenton’s Best Kept Secret! ett! John Barton Payne Bldg.
John Barton PayneWarrenton Bldg. 2 Courthouse Square, 210Courthouse am—5 pm, Square, Friday &Warrenton Saturday 10 am—5 pm, Friday & (540) 341-3447Saturday (540) We accept cash and 341-3447 checks; no credit cards. We accept cash and checks; no credit cards. All sale proceeds benefit the Fauquier County Public Library. All sale proceeds benefit the Fauquier County Public Library.
what’s Our weekly guide for FUN! | 2019-04-19T09:47:14Z | https://issuu.com/pamkamphuis/docs/wlm_jan_2018_web |
Umbilical Cord Stem Cells | Why are they called "the future for Mankind?"
Baby stem cells in general and umbilical cord stem cells in particular are cells with unique properties; they are able to divide and differentiate into any other kind of cell found in our body thus playing an important role in our growth and wellbeing, from the day of our inception. In adult life, they play a vital role in the regeneration of various organs and tissues. As we grow, some organs retain more capabilities to regenerate as compared to others, all due to stem cells.
Just take an example of red and white blood cells that are continually created in our body via maturation of specific stem cells in bone marrow. But now we know that almost all of our body organs retain the certain capability to grow and renew. Thus these stem cells play a very important role in the internal, automated repair system. Since our body is able to replenish the dying cell, we are able to live and survive.
During the very early stages of differentiation, each stem cell has the capability to either become another stem cell, or it can mature into the more specialized cell like that of muscles, blood, or brain.
Yes, stem cells have many similarities to the common understanding of word seed. Thus stem cells are not specialized cells; they can divide quickly, and sometimes even after an extended period of inactivity (quite like a seed). Further, if stimulated by certain chemical messengers, they may be induced to specialize into a particular tissue or organ cells.
Some organs are particularly rich in stem cells, specifically the organs that are continually involved in various growth and repair processes, like blood and gut. While other organs that are less prone to wear and tear, stem cells are fewer in numbers, and they are only activated under particular conditions, an example of such organs being heart or brain.
Two of the earliest stem cells known to science are embryonic stem cells and somatic or adult stem cells. Researchers first isolated the stem cells from the mouse embryo, and later they replicated their method with a human embryo to get human embryonic stem cells. By late 1990 to early 2000s, they were able to find the means to reproduce these stem cells in laboratory conditions.
Scientists were highly interested in stem cells due to their ability to convert into cells of any other tissues or organs. Once the method to replicate in the lab was found, the problem of quantity was also solved to some extent. Traditionally embryonic stem cells are considered to be more versatile, as they are omnipotent, meaning they can be converted to any tissue cells, while adult cells have limited such capabilities.
Embryonic stem cells were derived after fertilizing the donated ovum and spermatozoid in laboratory conditions. In 2006, researchers achieved another breakthrough when they were genetically able to reprogram the adult stem cell to create an induced pluripotent stem cell. It means that genetic engineering allowed to better the quality and versatility of adult stem cells, providing it the ability to grow into just any other tissue cells.
Importance of stem cells can be understood from the fact that they are the cells that divide and differentiate in the embryo to give rise to all the organs. As we grow, only limited capabilities are retained. Thus if the liver is damaged, it can still repair itself, though capabilities of such repair are insufficient in some cases. Therefore by better understanding the stem cells and learning to manipulate them, the researcher wants to gain the better abilities to repair and regrow damaged organs in humans. The science which studies the stem cells with the purpose of re-growing or regenerating organs is called regenerative medicine.
After isolating these stem cells from various resources, scientists are trying to find the factors that stimulate these cells to grow and differentiate into a particular tissue. Moreover, these laboratory-expanded organ tissues can be used in drug research and understanding various genetic diseases.
Branch of the study of stem cells is helping us to discover many secrets of our body; it is helping us to find out how the single cells are transformed into the wholly grown huge organisms. Thus no doubt the stem cell research can be called as most promising, fascinating area of medicine. Research into stem cells is generating new health solutions each year. It won’t be wrong to call it as one of the fastest growing areas of medicine.
Further, researchers are trying to identify the newer sources of these stem cells, resources with fewer ethical issues in comparison to the human embryo, or source that is less traumatic in contrast to bone marrow.
Umbilical cord blood, which is usually rejected and thrown away as medical waste, has emerged one such excellent source of stem cells, hence called umbilical cord stem cells.
Before we dive deep into the subject of umbilical cord stem cells, let us gain deeper insight into some of the unique properties of stem cells, the features that make all the stem cells, including umbilical cord stem cells, so unique.
All stem cells have three unique properties, which make them so versatile. Whatever be the source, embryo, umbilical cord blood, or bone marrow, Firstly, all the stem cells have the ability to divide and renew themselves. Secondly, they are not specialized. Thirdly, when required, they can differentiate to form the specialized cells.
Simply explained, one stem cell can divide and form several similar stem cells, and when required these cells can differentiate to form just any cell in our body whether neuron or muscles cells.
Stem cells can replicate for extended periods– just take an example of a neuron or muscular cells, though they can grow and repair themselves to some extent, but none of these cells can replicate (like a bacteria) to create another copy. However, stem cells have that ability to divide and create the replica of themselves. In fact, scientists can now develop millions of cells from the single cell.
Researchers know that the cells derived from an embryo can not only multiply but can also differentiate to form just any other tissue cells. Thus they are called pluripotent. Whereas, stem cell extracted from body parts of adults may differentiate into many different kinds, but not just to any other type. Thus they are called multipotent.
Though now the researchers know that almost every organ has the small population of stem cells, but what makes them grow and differentiate is still poorly understood. However, such understanding is vital if we want to grow various tissues in the lab conditions successfully. What researchers know that these stem cells need special chemical messengers and environment. As an example, muscle cells would repair itself better when the concentration of oxygen is high. However, stem cells generally love to grow in low oxygen (hypoxic) environment. These differences between the matured cells and stem cells, just underline the complexity of the subject.
Why embryonic stem cells can continue to replicate for long, while adult stem cells cannot do that without differentiating from their parent cells.
Under what conditions in healthy organs, these stem cells are activated to proliferate or perform other functions.
Thus understanding these differences between the normal tissue cells, adult stem cells, and pluripotent stem cells would help researchers to find treatment for diseases like cancer. It would also help them to grow pluripotent and multipotent stem cells in lab condition in more controlled fashion.
Understanding the conditions under which stem cells can grow without differentiating has been really challenging. It took researchers more than two decades to replicate the stem cells in laboratory conditions. However, researchers are still not able to replicate the adult stem cells in lab conditions. Until they learn to reproduce the adult stem cells in lab conditions, growing particular organ tissues in large quantities artificially, won’t be possible.
Stem cells do not specialize in performing specific functions– yes, they are merely like seeds, with not much in common with specialized cells of the grown-up plant. As seed cells lack the properties of leaves or bark, but they can still be grown and later specialized to form these specialized cells. Similarly, stem cell by itself cannot do the specialized work of adult cells. It cannot contract like muscular cells; it cannot conduct like nerve cells; it cannot produce certain hormones like a cell in glands. Yet, under specific conditions, it can give rise to any of them, it can get converted to the muscular cells, nerve cells, or glandular cells.
Stem cells may outgrow into just any specialized cell– yes they have the so-called ability to differentiate. That is, they are not only able to multiply a create the exact copies of each other, they can also “If and when required,” under specific conditions can convert themselves into specialized cells. Differentiation of stem cells is a very complicated process, involving many stages before they are fully matured to do a specific function. Researchers are just starting to understand how these stem cells differentiate into other cells.
Stem cells get information regarding differentiation from the DNA, but how and when they read the particular part of DNA and carry out the function of differentiation is controlled by the chemical messengers, other signals from neighboring cells, and microenvironment (like the presence of specific nutrients).
The signals from outside play particular role, as they suppress the certain parts or DNA while activating other parts. But what exactly is the nature of these external signals has still to be understood, if we want to grow the various body tissues in laboratory conditions.
Generally, adult stem cells would only give rise to the cells that are found in the particular organ from which they have been extracted, or at best to tissues that are somehow related to that organ. Thus the cell derived from bone marrow called hematopoietic stem cells would give rise to all the blood cells, but they may not give rise to the brain cells or neurons.
Can the adult stem cells be made to differentiate to just any other cells remain a subject of enormous debate among the scientific community. It seems that although it does not seem to happen in our body but under experimental conditions in the lab that may be entirely possible. Again this debate in scientific community just highlights the complexity of the subject.
When and where are the stem cells found?
Initially, researchers thought that stem cells are found only in some specific parts of the body, and quite probably they may not be present after the specified age. However, now the research has proven that stem cells are present in just any part of our body whether it is guts or nostrils or muscles. Further, these stem cells are present in any age group, since few days after the inception.
Thus stem cells can be extracted from the 3-5-days old embryo, from the umbilical cord, bone marrow to name the few. Techniques to isolate the adult stem cells from various body tissues are being developed.
Among various sources of stem cells, embryo stem cells have fallen into huge controversy for religious and ethical regions. They are extracted after artificial fertilization of a female ovum and male spermatozoid. Many in the society view it as an experiment on the very early form of life. Thus various countries went on to create laws are regulation, banning such experiments, and the United States is no exception. The United States still lacks clear legislation regarding the research into the subject of stem cells, which is hindering various research efforts, or some of the labs have gone on to create their research labs in offshore heavens. Discussing the ethical issues is not the subject of this article. However, it does show why the umbilical cord stem cells have gained such importance.
Although there is no doubt in the so-called superiority of embryonic cells, due to being pluripotent, but because of the lesser ethical issue, stem cells extracted after birth have been less criticized. Thus the multipotent cells derived from bone marrow or umbilical cord blood continue to enjoy wider acceptance, thus becoming a subject of more extensive clinical research. One of the reasons why adult stem cells have gained better approval and had lesser controversy is due to the proven benefit associated with them. First bone marrow transplantation was done in the 1960s, and since then it has saved thousands of lives. In fact, due to the benefits of bone marrow cells, the first national registry was established in 1986.
But there are several limitations of the adult stem cells derived from the bone marrow of the adults. The procedure of such extraction is highly invasive and painful. Moreover, the number of stem cells decline sharply with age. Further these cells have limited capability to differentiate, and finally, researchers have failed to divide them much in laboratory conditions. Thus mesenchymal stem cells derived from bone marrow cease to divide after 5-10 passages.
In the last couple of decades, along with the many innovations in the field of regenerative medicine, umbilical cord blood has received lots of attention as a source of various, therapeutically valuable stem cells. These cells from umbilical cord, called umbilical cord stem cells can be used to treat many diseases, and in many cases, it can replace the use of bone marrow.
Umbilical cord blood has many benefits over bone marrow, as these cells are less mature. Thus they demonstrate less antigenicity, meaning that there is no need for perfect HLA tissue matching. Hence they can be even given to the close relatives or unknown recipients, through donation, with the much lesser risk of rejection.
It can be easily extracted from the umbilical cord of the newborn and stored/frozen for later use.
Transplantation of so-called hematopoietic stem cell (derived from umbilical cord blood), can be used to treat various blood diseases, including several types of blood cancers.
Today there may be as many as million or more units of cord blood stored in various public and private cord blood banks, thus providing a vast pool of umbilical cord stem cells for research and treatment. Much of that treatment is funded by private companies., such as StemCyte, ViaCord, CBR, FamilyCord, Maze, LifeBankUSA, and others.
Hematopoietic cells are being studied to treat various autoimmune diseases, which are rising in the western world and the United States particularly, where the best cord blood banks are located.
Umbilical cord blood is rich in many adult stem cells with hematopoietic cells being just one of them. Another very important cells that are subject to intensive research are so-called mesenchymal stromal cells (MSCs). These cells can be used to repair bones, cartilages and other body tissues.
Mesenchymal stromal cells( MSCs) are found in large quantities in bone marrow, and in much lower amounts in the blood, adipose tissues. MSCs have been isolated from the umbilical cord blood, amniotic fluid, and other tissues that are discarded after the birth of the child. Extraction of mesenchymal stromal cells from these sources have been shown to be more economical in comparison to bone marrow, not to mention the complete lack of invasiveness of such method.
Collection of MSCs from umbilical cord stem cells does not cause any harm to the mother or a child. Theoretically, cells collected in this manner can be stored for decades and used later as per the needs. Cryogenic storage has demonstrated that these cells remain valid even after decades of storage, despite the high costs incurred in private cord blood banks.
Latest research into the MSCs (mesenchymal stromal cells) indicates that these cells can readily differentiate into bone cells (osteoblasts), fat tissues (adipocytes), and cartridge cells (chondroblasts), in vitro. Further investigation into their so-called surface markers indicated that MSCs whether extracted from umbilical blood, umbilical cord tissues, amniotic fluid, or placenta, all shared the similar characteristics. In practice, it means that MSCs can be obtained not only from the umbilical cord but from all the materials that are usually discarded after the birth of a child.
But perhaps the most prominent part of research in recent times has focused on so-called umbilical cord matrix (UCM) cells. These cells are found in large numbers in Wharton’s jelly of the umbilical cord. Though they are slightly different from MSCs, but they are still classified as MSCs like cells. UCMs have been successfully stored for long periods, expanded in culture to create more substantial quantities.
So what is interesting about these umbilical cord stem cells? Perhaps the most important of all has been the discovery of neural cell markers on the UCMs. In layman language it means that unlike MSCs, UCMs may also differentiate to form neurons, thus in future, they may have a role in the treatment of various neurodegenerative diseases like Alzheimer’s or Parkinson’s.
Whether UCMs are MSCs like cells or they are entirely different is still a matter of much debate, with the present understanding it won’t be possible to say for sure.
Till now we have discussed the general characteristics of the stem cells, their possible usage in the medicine, along with some of the types of cells that have been found in this material that is typically discarded after the childbirth.
At present two types of cell derived from umbilical cord have been extensively studied, and are already being used to treat many medical conditions. These two cells with enormous potential are hematopoietic stem cells (HSCs), and mesenchymal stromal cells (MSCs). HSCs are essential for the continual renewal of blood and immune cells. It is due to these HSCs that our red blood cells are wholly renewed within three months. Hence, HSCs can be used in cases when natural stores of these cells in bone marrow have eroded be it due to some disease, or toxicity of anticancer treatment.
Umbilical cord blood stem cells can be easily frozen-stored in private and public banks for decades, as we stated before. Whereas cord blood cell banking is commonly available in the US, there is still a deficit of such banks in the developing nations. Further, it has been seen that willingness to donate cord stem cells decrease after each delivery due to costs and other factors. Also, amniotic fluid is something that is entirely discarded, without even considering its value in stem cell therapy.
Umbilical cord stem cells are indeed an excellent option in a situation when there is lack of donors with fully matched HLA.
Some of the significant challenges with umbilical cord stem cells is their small quantity. This difficults the creation of many different samples. However, things may change in the future as technology to artificially replicate them in lab conditions matures. Another challenge with cord stem cells is the risk of propagation of certain types of infections.
Amniotic fluid stem cells have been successfully converted into supplements providing various factors necessary for the growth of tissues, and thus having a possible role in the production of biocompatible patches for various tissue defects like congenital heart defects of the newborn.
Amniotic fluid stem cells have already been converted to pluripotent stem cells; thus in future, these cells may be used to treat numerous diseases.
UCBs extracted from Wharton’s jelly have already been transdifferentiated into beta-cells (insulin-producing cells in the pancreas). Further, these beta cells have already with great success been transplanted into the animal model, thus raising the hope of finding a cure for diabetes, one of the many uses for cord blood.
Cells extracted from Wharton’s Jelly have demonstrated the excellent potential to differentiate into various types of cells. Thus they seem to be an ideal candidate for regenerative medicine in the future.
MSCs derived from Wharton’s jelly are showing promising results in the treatment of type 2 diabetes. In fact, these cells have already been tested in phase 1 and phase 2 trials in humans with excellent results. They were either injected intravenous or intrapancreatic in those who have diabetes.
Stem cells extracted from umbilical cord, already also described as umbilical cord stem cells, have intensively tested in diseases like lupus. Intravenous injection of MSCs has shown to significantly correct the immune system in lupus, reverse many of the effects of lupus. Further, they have been shown to protect patients from the relapse of the disease, thus opening the doors for continuing research or use of umbilical cord cells in autoimmune diseases.
If you still have doubts about the utility of collecction of the umbilical cord stem cells, we may say that all the evidence suggests that umbilical cord stems cell may have a role to play in brain injuries, caused by various neurodegenerative disorders like Alzheimer’s. At present most of the neurodegenerative diseases are untreatable, with therapy only helping a bit to slow down the course of illness. Umbilical cord stem cells are much more primitive when compared to bone marrow stem cells. Thus they are much easier to use in regenerative medicine, without the need of full donor-recipient matching in neurodegeneration or injury.
Brain injuries that cause the formation of cavities in the brain can also be treated with umbilical cord stem cells.
Umbilical cord stem cells are also showing excellent results in neuronal damage due to chemotherapy and radiation therapy of various types of cancers, more arguments that show the importance of cord blood banking.
In animal models, umbilical cord stem cells have been successfully tested to repair torn tendons. In the rabbit, these cells were injected at the site of the lacerated ligament, as within four weeks there was a complete recovery.
Transplantation of umbilical cord stem cells in the damaged joints resulted in regrowth of cartilage, thus indicating that these cells could be a candidate for treating joint-related conditions due to injuries of cartilage and ligaments.
Umbilical cord stem cells have also been tested to treat the rare but dangerous condition of pregnant women called preeclampsia. In the animal models, transplantation of these cells resulted in dramatically reduced toxicity and correction of hypertension.
Finally, not to mention that umbilical cord stem cells are already being used with great success to treat various blood cancers. They have also shown encouraging results in the treatment of lymphoma. In Hodgkin’s disease, they increase the chances of long-term survival by as much as 30%.
The mentioned above are just some of the uses of umbilical cord stem cells, but things are changing at a breakneck pace in the field of stem cell therapy. Hundreds of new applications are being found on a daily basis. Stem cell therapy is considered to be the future of modern medicine. It will help us to move from “One size fits all” towards the personalized health solutions.
The 20th century was the century of so-called small molecules, that is synthetic drugs that were created to treat diseases of masses, but at the same time 20th century saw the rise of so-called large molecules that were biological in nature, like vaccines, antibodies and so on. However, medicine in the 21st century would be transformed by a better understanding of cell science. It would move on from therapies based on chemicals or biological molecules to the cells, the cells that can cure any disease, regenerate the damaged organs. Umbilical cord stem cells would play a significant role in the progress of regenerative medicine, as they are derived from the material which has been discarded by humans for thousands of years. Thus it is clear that biological material collected after child’s birth would no more end up in biohazardous waste bags. Instead, it would become the life-saving material.
Stem cell therapy tries to bring organ into its healthy and normal state through regeneration. Stem cell therapy is fast emerging due to many benefits over the organ transplantation like the ability to grow and multiply cells in the laboratory, lower chances or rejection, and treatment is often less invasive. Thus, stem cell therapy has provided the new hope to treat a disease that has remained a challenge for modern medicine since long, like many types of cancers, Parkinson’s, Alzheimer’s, diabetes, various cardiovascular diseases, neurodegenerative disorders, and treatment of trauma. Stem cell therapy is now being extensively used to treat multiple hematological malignancies. Best of all, it is finding newer used with each passing year. It is one of the fastest growing branches of medicine, with many calling it the future of medicine.
It is now well recognized that stem cells have the capability of self-renewal and differentiation. Back in 1978, stem cells were initially discovered in the blood of the umbilical cord, and called umbilical cord stem cells afterwards.
Use of umbilical cord stem cells started in the late 1980s when it was found the umbilical cord which is a discarded material has many useful cells that can be used instead of painful and complicated bone marrow transplantation. Thus initially it was planned to be used to treat various diseases of the blood. However, with the early 21st century everything changed as stem cell therapy became a reality.
Since the early eighties, a lot of effort was made to understand the basic principles of stem cell differentiation processes with the milestone to improve and potentially cure conditions for which medical science has not yet produced effective therapeutic solutions. This led to the development of a relatively new field of medical science called regenerative medicine. Today, the research focused on stem cells has grown dramatically, which opened new pathways towards the engineering of healthy and functional tissues and organs by using only a few cells. Furthermore, regenerative medicine led to the rapid development of other medical disciplines such as transplantation medicine, where tissue-engineered skin is used in patients suffering from extensive burns; hematopoietic stem cells are used during bone marrow transplantation in patients suffering from hematologic malignancies; or tissue-engineered bladder that is grown outside the body can be replaced in patients who need bladder augmentation. The evolving role of stem cells is also developing along the line of pharmaceutical research. Differentiated engineered tissues are used for preclinical, in vitro studies of disease models during drug development.
Umbilical cord ѕtеm cells transplants have ѕuссеѕѕfullу trеаtеd mаnу diseases аnd debilitating conditions. Stem сеllѕ harvested frоm umbiliсаl соrd blооd оf a nеwbоrn bаbу can develop into аnу tуре оf оrgаn оr tiѕѕuе such аѕ liver, hеаrt and neural cells. Thеу саn аlѕо rераir tiѕѕuе and оrgаnѕ damaged bу strokes and hеаrt аttасkѕ.
Umbiliсаl соrd ѕtеm cells аrе commonly uѕеd to trеаt сhildhооd leukaemia for mаnу уеаrѕ. However, only in recent years thаt аdultѕ with lеukаеmiа have been successfully trеаtеd with trаnѕрlаntаtiоn оf umbilical соrd ѕtеm cells frоm unrеlаtеd dоnоrѕ. One саѕе iѕ thаt оf Stерhеn Sрrаguе whо wаѕ diаgnоѕеd with Chronic Myelogenous Leukemia (CML) in 1995. Chеmоthеrару only kерt саnсеr undеr соntrоl fоr 17 months. In Aрril 1997, hе wаѕ in thе finаl ѕtаgе of thе diѕеаѕе. Hе tооk раrt in a сliniсаl trial tо determine if adequate amount of соrd blооd ѕtеm cells соuld be harvested for a successful transplantation to аn аdult. In Nоvеmbеr 1997, hе undеrwеnt a cord blооd stem сеll trаnѕрlаnt аnd hаѕ bееn cancer frее fоr оvеr 20 уеаrѕ so far.
In Kоrеа, a tеаm оf rеѕеаrсhеrѕ сlаimеd tо hаvе successfully trаnѕрlаntеd umbiliсаl соrd ѕtеm сеllѕ intо the ѕрinе of a 37-уеаr оld wоmаn. The раtiеnt hаd bееn раrаlуzеd fоr 19 уеаrѕ duе to an accident. Dосtоrѕ injected them these umbilical cordѕtеm сеllѕ directly intо thе dаmаgеd роrtiоn оf hеr ѕрinе. Within only thrее wееkѕ, she bеgаn walking аѕѕiѕtеd with a wаlkеr, and tоdау she wаlkѕ wеll withоut аid.
Great promise has bееn ѕhоwn in thе trеаtmеnt оf Krаbbе Disease аnd оthеr rare lysosomal ѕtоrаgе diseases thrоugh the trаnѕрlаntаtiоn of umbilical соrd stem сеllѕ. Krabbe diѕеаѕе оссurѕ in infаntѕ, and if lеft untrеаtеd iѕ usually fаtаl within 2 уеаrѕ. Rеѕеаrсhеrѕ frоm Dukе Univеrѕitу аnd thе Univеrѕitу of Nоrth Cаrоlinа at Chapel Hill hаvе made groundbreaking progress in the trеаtmеnt оf thiѕ diѕеаѕе.
Thеir research shows that nеwbоrnѕ who receive umbiliсаl соrd stem cells trаnѕрlаntѕ while thеу are ѕtill аѕуmрtоmаtiс hаvе a muсh highеr сhаnсе of ѕurvivаl than children whо hаvе already ѕhоwn symptoms. The key iѕ tо саtсh the disease еаrlу enough tо рrеvеnt thе lоѕѕ оf сritiсаl brаin function.
Umbiliсаl cord ѕtеm сеlls transplant hаѕ bееn рrоvеn tо trеаt Lуmрhорrоlifеrаtivе diѕеаѕе. Thiѕ illness is a rаrе condition thаt affects the immunе ѕуѕtеm аnd mаkеѕ the раtiеnt unаblе to fight оff common gеrmѕ. Brоthеrѕ Blауkе and Garrett of Lоѕ Angеlеѕ, Cаlifоrniа wаѕ bоrn with this life-threatening disease. Thаnkѕ tо a соrd blооd trаnѕрlаnt, bоth bоуѕ are now living normal, hеаlthу lives.
Thаlаѕѕаеmiа iѕ a blооd diѕеаѕе in which thе bоdу produces dеfоrmеd rеd blооd сеllѕ. Frеԛuеnt blооd transfusions are nесеѕѕаrу аnd рrеviоuѕlу thе оnlу сurе wаѕ a bone mаrrоw trаnѕрlаnt. On 3 Julу 2001, a соrd blood stem сеll trаnѕрlаnt was carried out оn a 5-year оld Mаlауѕiаn Chinese boy with Thаlаѕѕаеmiа Major. Hе iѕ nоw able tо рrоduсе nоrmаl rеd blооd cells and is cured of Thаlаѕѕаеmiа Major. Bеѕidеѕ bone mаrrоw trаnѕрlаnt frоm a ѕibling, соrd blооd trаnѕрlаnt iѕ nоw a viаblе trеаtmеnt for Thаlаѕѕаеmiа.
Umbiliсаl соrd blооd from nеwbоrn babies саn be uѕеd tо рrоduсе еmbrуоniс-likе сеllѕ that саn potentially treat diseases аnd dеbilitаting соnditiоnѕ.
Rеѕеаrсhеrѕ аt thе University оf Minnеѕоtа have bееn аblе tо diffеrеntiаtе соrd blood сеllѕ intо a type of lung cell. These сеllѕ hеlр tо rераir thе аirwау in lungѕ after injurу. Thiѕ iѕ a ѕignifiсаnt diѕсоvеrу because until now the use оf brаin ѕtеm сеllѕ wаѕ thе оnlу wау to conduct viable rеѕеаrсh of this tуре. In the future, rеѕеаrсhеrѕ might bе аblе to еxаminе соrd blооd frоm bаbiеѕ with lung diѕеаѕеѕ ѕuсh as cystic fibrоѕiѕ and dеvеlор bеttеr treatments. Thеу will bе аblе tо work with umbilical соrd stem cells tо bеttеr understand lung development аnd to tеѕt nеw drugѕ.
Recent rеѕеаrсh indicates thаt mеѕеnсhуmаl ѕtеm cells оbtаinеd frоm full-term umbiliсаl соrd blood саn potentially be uѕеd to rераir tissue аnd dеvеlор bone аnd cartilage. Aѕ a result, раtiеntѕ саn rесоvеr fаѕtеr, thuѕ рrеvеnting kidney соmрliсаtiоnѕ аriѕing frоm tiѕѕuе dаmаgе. These findingѕ bring new hоре to thоѕе whо suffer frоm асutе kidney fаilurе, a lifе-thrеаtеning соnditiоn. Acute rеnаl fаilurе occurs whеn thе kidnеуѕ are unаblе to gеt rid of waste and urine. Rеѕеаrсhеrѕ in Italy trеаtеd mice with acute renal fаilurе uѕing cord blood mеѕеnсhуmаl stem cells аnd оbѕеrvеd imрrоvеd kidnеу functions. These рrеliminаrу findings ѕhоw thаt umbilical cord ѕtеm cells rеѕеаrсh оffеrѕ grеаt роtеntiаl for the treatment of асutе kidnеу failure. Hоwеvеr, mоrе rеѕеаrсh is rеԛuirеd to determine if humans would bеnеfit from mеѕеnсhуmаl stem сеllѕ.
Luрuѕ iѕ a diѕеаѕе thаt аffесtѕ mоrе thаn 1.5 milliоn Americans and half a million citizens in the European Union. It iѕ an inflammatory diѕеаѕе that аffесtѕ the ѕkin, joints аnd kidneys. Lupus can be lifе-thrеаtеning whеn it attacks major оrgаnѕ such as the kidneys. Stеm сеll trаnѕрlаnt is used tо treat раtiеntѕ with ѕеvеrе lupus. In a study оf 50 раtiеntѕ whо undеrwеnt ѕtеm сеll trаnѕрlаnt at Northwestern Hоѕрitаl in Chiсаgо, 50 percent were frее from the disease аftеr fivе years. Thе overall ѕurvivаl rate iѕ 84%. Stеm сеll trаnѕрlаntаtiоn offers a rау оf hоре tо luрuѕ ѕuffеrеrѕ whо hаvе fаilеd соnvеntiоnаl treatments.
Umbilical cord ѕtеm cells rеѕеаrсh overcomes most оf the problems аѕѕосiаtеd with еmbrуоniс ѕtеm сеll rеѕеаrсh. The latter comes undеr muсh ѕсrutinу and dеbаtе. It is hаrd to оbtаin ѕuffiсiеnt stem cells from еmbrуоѕ аnd the right tiѕѕuе tуре for a patient.
Cоrd blооd ѕtеm сеllѕ can bе produced аnd thеrе is mоrе likеlihооd оf finding the right tissue tуре givеn a birth rаtе of 100 milliоn bаbiеѕ a уеаr wоrldwidе. Umbilical cоrd ѕtеm cells science brеаkthrоughѕ will undоubtеdlу еѕсаlаtе furthеr rеѕеаrсh tо find сurе fоr whаt hаd рrеviоuѕlу bееn inсurаblе diѕеаѕеѕ оr dеbilitаting соnditiоnѕ.
With thе аdvаnсеmеnt оf stem сеll rеѕеаrсh, thе futurе of cord blооd trаnѕрlаnt lооkѕ рrоmiѕing as more оf itѕ роtеntiаl uѕеѕ are discovered. Mаnу people ѕuffеring frоm rаrе diѕеаѕеѕ аnd dеbilitаting injuries hаvе bееn аblе tо lead bеttеr quality livеѕ fоllоwing an umbilical соrd blооd ѕtеm сеll trаnѕрlаnt.
Hуdrосерhаluѕ iѕ a соnditiоn thаt causes fluid retention in thе brаin. For thiѕ rеаѕоn, thiѕ diѕеаѕе is аlѕо called “wаtеr оn thе brаin”. In Hydrocephalus, the fluid оf the brаin lеаdѕ to swelling, which iѕ mаinlу caused due tо a blосkаgе of the vеntriсlеѕ in thе brain, thе аrеа whеrе thе brain fluid drains. In оthеr words, whеn a сhild’ѕ brаin tеndѕ to ассumulаtе аn аbnоrmаl dеgrее оf сеrеbrоѕрinаl fluid, it leads tо аn immеnѕе рrеѕѕurе on thе brаin tissues. Eventually, it causes ѕwеlling of thе head in оrdеr to accommodate thе еxtrа brain fluid.
Pеdiаtriс Hydrocephalus in children iѕ thе leading fасtоr fоr реdiаtriс brаin surgeries in thе United States аnd the shocking раrt iѕ, the condition occurs in 1 in 500 kids. Thаt mаkеѕ Hуdrосерhаluѕ as соmmоn аѕ Downs ѕуndrоmе. There is no сurе fоr thе condition, аѕ оf nоw apart frоm drаining thе еxсеѕѕ fluidѕ tо rеliеvе рrеѕѕurе by surgical procedures. If remained untrеаtеd for a long timе, it mау саuѕе ѕеvеrе pain, mеntаl disabilities, brain dаmаgе and еvеn dеаth.
Grace, a baby girl wаѕ bоrn with thiѕ condition. Hеr раrеntѕ were alerted аbоut thе condition in their 20-wееk ultrasound ѕеѕѕiоn. However, doctors hаd аѕѕurеd thеm thаt thе ѕwеlling can be trеаtеd with ѕtеm сеllѕ. Seeing a rау оf hоре, Grace’s parents’ dесidеd to store аnd рrеѕеrvе the cord blood аt thе time оf Grасе’ѕ birth. Dr Jоаnnе Kurtzbеrg, the Dirесtоr оf Dukе’ѕ Pediatric Bоnе Mаrrоw аnd Transplant program lеd thе саѕе.
The FDA-approved ѕtudу invоlvеd рrеѕеrving the соrd blood at a frееzing tеmреrаturе оf -300F in a thermogenic liԛuid nitrogen frееzеr. Abоut 3-5 оz соrd blооd wаѕ tаkеn аwау frоm thе frееzеr after 90 minutеѕ. It wаѕ kерt for the infusion. In the 3-5 оz of соrd blооd, about 20 рrоgеnitоr cells, which was еxрlаinеd bу Dr Kurtzberg аѕ, “hаѕ a tеndеnсу tо diffеrеntiаtе into a ѕресifiс tуре оf cell, but iѕ аlrеаdу mоrе ѕресifiс than a ѕtеm сеll аnd iѕ рuѕhеd tо diffеrеntiаtе intо its “tаrgеt” cell.” “Sсiеnсе hаѕ уеt tо figure out hоw to separate thеѕе cells from thе other milliоnѕ оf сеllѕ”, Kurtzbеrg аddеd. The ѕurgеrу tооk 5 tо 7 minutеѕ and it wаѕ a success.
The Dukе Univеrѕitу rеѕеаrсhеrѕ have tаkеn mаnу саѕеѕ tо trеаt Hуdrосерhаluѕ. The mаin idеа iѕ to look intо the rеgеnеrаtivе imрасt оn thе brаin blооd vеѕѕеlѕ by uѕing a сhild’ѕ оwn соrd blооd ѕtеm сеllѕ, соllесtеd from thе umbiliсаl cord during birth.
The study demonstrated thаt thе nеurаl progenitor сеllѕ thаt реrfоrm a ѕресifiс function саn also repair аnу damaged tiѕѕuе.
Hypoxic-ischemic еnсерhаlораthу iѕ mаinlу саuѕеd bу oxygen deprivation, which leads to brаin dаmаgе in children. This diѕеаѕе iѕ often associated with several motor impairment and cognitive and dеvеlорmеntаl diѕruрtiоn during thе dеvеlорmеnt реriоd оf a child. However, a Dukе Univеrѕitу Mеdiсаl Center ѕtudу hаd shown thаt umbilical cord ѕtеm сеlls thеrару соuld bе bеnеfiсiаl fоr сhildrеn with hуроxiс-iѕсhеmiс еnсерhаlораthу.
Thе ѕtudу wаѕ lаunсhеd with 52 сhildrеn with ѕignѕ оf brаin dаmаgе in Jаnuаrу 2008. It tооk 9 years to соmрlеtе thе рhаѕе 1 оf the ѕtudу. Lеt’ѕ dig dеереr into thе rеѕеаrсh.
Thе infаntѕ, who were enrolled in thе ѕtudу, wеrе in thеir first 14 роѕtnаtаl dауѕ. And all оf them hаd diаgnоѕеd with mоdеrаtе tо ѕеvеrе hуроxiс-iѕсhеmiс encephalopathy. Mоrе imроrtаntlу, аll оf thеm hаvе their own umbilical соrd blооd ѕtоrеd during birth. Infаntѕ, whо met аll these сritеriа, received four infuѕiоnѕ of thеir оwn umbiliсаl cord blооd ѕtеm cells. The dоѕе wаѕ dеtеrminеd by thе quantity of соrd blood, аvаilаblе fоr thе babies. Hоwеvеr, thе dоѕе for еасh infuѕiоn wаѕ 5×10е7 cells/kg. The bаbiеѕ wеnt thrоugh fоllоw up сhесkuрѕ аftеr 4 tо 6 аnd 9 to 12 mоnthѕ. Their MRIѕ ѕhоwеd ѕignifiсаnt dеvеlорmеnt.
Anоthеr ѕtudу on thе ѕimilаr subject wаѕ рubliѕhеd in PubMed – NCBI. This ѕtudу wаѕ аlѕо bаѕеd оn аutоlоgоuѕ umbiliсаl соrd ѕtеm сеllѕ to treat hуроxiс-iѕсhеmiс еnсерhаlораthу. Children with ѕеvеrе to mоdеrаtе hуроxiс-iѕсhеmiс encephalopathy wеrе enrolled fоr thiѕ rеѕеаrсh. All оf them hаd rесеivеd on аutоlоgоuѕ umbilical cord ѕtеm сеllѕ. Thеу wеrе givеn 4 doses оf infusion. The team mоnitоrеd сеll infusion сhаrасtеriѕtiсѕ, UCB соllесtiоn, аnd pre and роѕt-infuѕiоn differences. Thеу also соmраrеd thе hоѕрitаl оutсоmеѕ with сhildrеn, whо did not hаvе available ѕtеm сеllѕ.
Aftеr 4 dоѕеѕ оf 4.3 mL infuѕiоnѕ, the сhildrеn wеrе еxаminеd in order tо mоnitоr vitаl ѕignѕ. One оf thе mаin ѕignѕ, oxygen dерrivаtiоn wаѕ nоtiсеd tо bе thе ѕаmе рrе and post-infusion in the first 48 hours. Hоwеvеr, thе оutсоmе showed ѕignifiсаnt imрrоvеmеntѕ with a ѕсоrе оf >85 later.
Sо, it’s ѕhоwn thаt сritiсаl diѕеаѕеѕ likе hypoxic-ischemic еnсерhаlораthу can bе trеаtеd with umbiliсаl соrd ѕtеm cells.
Thomas ED. A history of haemopoietic cell transplantation. Umbilical cord stem cells British Journal of Haematology. 1999;105(2):330-339. doi:10.1111/j.1365-2141.1999.01337.x.
Umbilical Cord Stem Cells Basics V. | stemcells.nih.gov. https://stemcells.nih.gov/info/basics/5.htm. Accessed September 11, 2017.
Mahla RS. Umbilical Cord Stem Cells Applications in Regenerative Medicine and Disease Therapeutics. International Journal of Cell Biology. doi:10.1155/2016/6940283.
Weiss ML, Troyer DL. Umbilical Cord Stem Cells in the Umbilical Cord. Stem Cell Rev. 2006;2(2):155-162. doi:10.1007/s12015-006-0022-y.
Traynor AE, Schroeder J, Rosa RM, et al. Treatment of severe systemic lupus erythematosus with high-dose chemotherapy and haemopoietic umbilical cord stem cells transplantation: a phase I study. The Lancet. 2000;356(9231):701-707. doi:10.1016/S0140-6736(00)02627-1.
Umbilical Cord Stem Cells – Current Uses & Future Challenges. https://www.eurostemcell.org/cord-blood-stem-cells-current-uses-and-future-challenges. Accessed September 10, 2018.
Umbilical cord stem cells show promise as heart failure treatment. ScienceDaily. https://www.sciencedaily.com/releases/2017/09/170926162309.htm. Accessed September 10, 2018.
Cras A, Farge D, Carmoi T, Lataillade J-J, Wang DD, Sun L. Update on mesenchymal umbilical cord stem cells -based therapy in lupus and scleroderma. Arthritis Res Ther. 2015;17. doi:10.1186/s13075-015-0819-7. | 2019-04-20T17:11:24Z | https://10storks.com/cord-blood/umbilical-cord-stem-cells/ |
In these 6 months, January - June 2014, most of the technological choices and many of the market choices facing the autonomous vehicle industry have been explored here.
See also: Driverless Cars 2013 for the full previous year.
2013 was a big year for driverless cars.
We hope that in 2014 at least one manufacturer will have the courage to launch its prototype driverless car without a steering wheel, perhaps substituting emergency navigational joysticks within reach of both front and rear passengers instead and creating a true driverless car.
We understand the main practical difficulty of this: highway authorities will not allow the cars on the road. (To overcome this we propose a particular village, town or city conducts a trial).
Our assessment is that there are two large future market segments in the demand for driverless cars: 1) those who want the car to take over driving tasks when they no longer wish to undertake them and to simplify them otherwise and 2) those who want the car to do all the driving. We believe that both could be of comparable size and the latter will comprise a very substantial component of new sales for auto manufacturers.
Where all occupants are passengers and not drivers it might be possible to also move to a no fault insurance system with passengers being compensated for injury and loss (as they would be when travelling on a railway) without being involved in the determination of fault.
This video of a GM driverless car estimates the additional costs of driverless technology at $5000 - $7000 per vehicle. Solely electric motive power might double this but at $10,000 - $15,000 per vehicle there will be many willing to opt for safer, cleaner, driverless cars from the outset.
We would also like to see the first cars for sale on what one might call a political timescale - three years - rather than subject to the over-cautious estimates of 2020. These technologies are ones where developed nations have first mover advantages.
It has always been possible to design a building just using two-dimensional information. In other words without ever doing a perspective or axonometric drawing, building a model or, in more recent times, a computer simulation of the volumes.
Plans, elevations and sections would suffice. This has been very much the predominant means of representing buildings for two millennia. In fact, I have the most admiration for those architects in history who achieved masterpieces using almost solely these, like Robert Adam, especially because in his case when you read from his drawings to what was built the correlation is very close whilst the correlation between perspective drawings and the reality tends to be loose.
Modern laser-assisted surveying can be either two or three dimensional. This, of course, applies to laser-assisted automated navigation, too.
Logically, architectural surfaces, principally elevations, should be much more important in position finding if you use two dimensional lidar for positional information than if you use three dimensional lidar and GPS for it. In that case, if you could build the town ab initio to accommodate driverless vehicles you could build in physical reference cues into elevations that could be used for very accurate position fixing and supplement them with street furniture that electronically fixed position too and provided supplementary navigational co-ordination data. In such a town you would not need GPS.
On the multi-lane highway, platooning commercial vehicles could be given dedicated lanes that minimised the necessity to stop or brake, to save fuel, and this might alter rules of priority. The outer lane, rather than the inner lane might be used for commercial vehicles, too.
As for bicycles, one idea currently in circulation is that each cycle would be fitted with GPS and a transmitter so that autonomous vehicles would be warned of its position, even in the dark. As cyclists might object to this, fitting autonomous vehicles with forward facing infrared sensors might be a better alternative, picking out pedestrians, cats, horses and cyclists - even in the dark.
If you make the choice that a driverless car is not going to use GPS and triangulation from mobile phone masts as navigational aids, perhaps to substantially reduce the possibility of external hacking of navigational systems, what are you left with? Prior knowledge, machine learning, inertial systems, the road and its boundaries, road markings, street furniture and the built environment.
Dealing mainly with the latter three, road markings are vital for navigation but do change from time to time for multiple reasons, or may be obscured or unreadable because it is dark, because of snow and ice, because of stationary public transport vehicles or turning articulated trucks, for instance.
Street furniture could be adapted to give very accurate positional fixes and secure information exchange, including a local cue map. This could potentially reduce the amount prior knowledge that had to be carried onboard as well as the amount of machine learning.
Buildings themselves could be designed to have physical cues, with very accurate positional coordinates, that could be read by a passing lidar and architecturally these could be designed so that they were always visible e.g. they glinted in the dark and were protected by architectural features that meant they were never obscured by snow. This would be particular useful if data exchange with street furniture was switched off.
(GPS is accurate but not quite accurate enough on its own for the continuous navigational position fixing required so the search is on for even more accurate means of getting positional fixes in everyday environments, which can work alongside GPS or not).
Why are the main road vehicles that are going to use autonomous driving technology likely to be cars at first? Why not delivery vehicles?
For many reasons but one of them is the Robocop dilemma.
You cannot programme in instructions for the robot to cut corners. The delivery van cannot mount the kerb.
(Having said that an all-electric driverless van made a very long trip indeed from Parma to Shanghai in 2010).
Driver assistance for commercial vehicles, like platooning, is a real medium term possibility but not full autonomy. The EU co-funded HAVEit programme, completed in 2011, trialled it as have Volvo for some time.
Once you quit road space and use pedestrian space or discreet lanes then shuttles and pods play a role.
This video of the Navia Cybergo shuttle explains the concept.
The best known pod system is at Heathrow Terminal 5 and is used for access to and from the business parking areas. The concept of the central control of pods probably only lends itself well to a restricted radius of operation at present. The next step for pods is fully autonomous operation. (The Heathrow pods system, engineered by British companies including Arup, uses autonomous guidance technology but is not fully autonomous because the pods are confined within delineated routes and centrally controlled).
If you want to assist a lot of pedestrians get to an historic monument without allowing a lot of taxis and other internal combustion engined vehicles to get close, with the risk that they might run into it or that their exhaust fumes will degrade the building fabric, then electric autonomous pods are an excellent if currently expensive solution. A British engineered pod system is currently being designed for Amritsar.
Mercedes-Benz appears to be very much in the school of having all the technology onboard and it is impressive. Much of it could autonomously drive the car now without waiting for 2020, the date so often touted as the start date for driverless cars going on sale. Despite the triumphal arches not looking correctly like triumphal arches I really like the graphics in these Mercedes simulation videos and isn't it good that most videos about autonomous vehicle technology appear first on independent channels and not on corporate websites? (The Draper Fisher Jurvetson model of viral communication is usually superior for new technologies).
This is in tune with what they will do for society - democratise mobility further and the way business can be conducted. After the internet and jet travel, they could constitute the most democratising technological development of a lifetime.
As you look outside and walk through parking lots and past multi-lane roads the transportation infrastructure dominates. Its a huge tax on the land.
Most cars are used only for an hour or two a day. The rest of the time, theyre parked on the street or in driveways and garages.
But if cars could drive themselves, there would be no need for most people to own them. A fleet of vehicles could operate as a personalized public transportation system, picking people up and dropping them off independently, waiting at parking lots between calls.
Theyd be cheaper and more efficient than taxi - by some calculations, theyd use half the fuel and a fifth the road space of ordinary cars and far more flexible than buses or subways.
Streets would clear, highways shrink, parking lots turn to parkland. Were not trying to fit into an existing business model. We are just on such a different planet.
Exploring potential business models has been one of the most interesting aspects of looking at driverless cars in 2013. Developing some of them further is part of the tasks and offering of our new consultancy. Their number will grow as vehicles become available.
Three strands are already clear.
First there is the approach of having the best mapping, prior knowledge, machine learning and software as exemplified by Google cars. These vehicles are developed by people recruited outside the automotive industry.
Second there is having the best automotive platform, technology supplied by component manufacturers, proving grounds and experience in automotive design as exemplified by more than one traditional car manufacturer. These vehicles are being developed by automotive engineers with long experience of bringing excellent vehicles to market.
Third there are fleet owners who see potential in replacing dial-a-ride, city centre to airport only services, taxis and even self-drive vehicles with new technology. They are the most willing to see purely electric vehicles, vehicles without steering wheels and to spread the cost of the technology across many users. They see the point of modifications to the built environment. It makes the roadspace more predictable and supportive of vehicles with no driver. (Underground railway trains can operate without drivers because the environment is so predictable). Less prior knowledge and data processing capacity need be carried onboard if street furniture and gantries exchange data with the vehicles and buildings provide positional information. These vehicles may not need to leave the urban environment. They could could be lighter and a little smaller. Fleet operators would find it easier to recharge electric vehicles than individual owners by rotating them to charging points and choosing times of the day when wholesale electricity was priced at its lowest.
Another role of the consultancy is to spot what others miss and to offer an alternative view.
This video, a little long and silent but informative, of VisLab's BRAiVE autonomous car, tested on the roads of Parma in July 2013, is notable for two things.
Firstly, right at the end, the driver gets out so no one is at the steering wheel as the car completes the final short section in front of the press cameras. This reinforces a point we make elsewhere: there is no necessity for a steering wheel or driver, at least for part of the potential market for autonomous cars.
Secondly, about 8 minutes in, the car passes a filling station. This raises ideas about why the potential market might segment and why driverless cars will require changes in the built environment.
How will an autonomous vehicle conduct itself in the difficult confines of a filling station? Can a lidar really read which is the right pump? Do not the pumps need to be modified to give visual cues to autonomous cars that use no external communication links?
If the car has an internal combustion engine someone will have to get out to fill it if the station has no attendants. The blind man or schoolchild as the sole occupant cannot be expected to do this.
So does this mean that the truly driverless car that fleet operators would be attracted to has to be electric? It would appear so.
Finally, we disagree with VisLab's contention that autonomous vehicles will mean less cars on the road. We envisage the emergence of many new two car households with perhaps an electric powered, steering wheel-less, driverless car that the children could use by themselves for the school run and an internal combustion (or hybrid) car equipped with driverless technology but also retaining all the trappings of a car used for driving pleasure.
The University of Singapore-MIT Alliance for Research and Technology (SMART) recently released this video of a Mitsuibishi car adapted to be driverless using two off the shelf lidars and a computer at a cost of $30,000 with the aim of reducing adaptation costs to $10,000 eventually.
It is good to see a small country like Singapore in the development stakes for driverless cars but is adaptation of small internal combustion engined vehicles the right route to take? The adaptation would about double the cost of the vehicle. A vehicle sharing scheme is mooted as the possible use so perhaps it could be.
For 2014 Nissan has a new proving ground entirely devoted to autonomous vehicles up and running. It has real buildings not stage set structures. Unlike Google, Nissan Autonomous Drive does not use 3D lidar, prior mapping or external connection. It does not rely on infrastructure. Currently using the all electric Leaf, it is zero emissions and was tested at up to 80kph on a Japanese highway in November. Nissan is committed to making autonomous vehicles commercially available by 2020 and introducing the autonomous technology across the range within two product cycles.
No other vehicle manufacturer is so far advanced with the combination of all electric and autonomous drive. The strapline is zero emissions, zero fatalities.
Here is a video of Japanese Prime Minister Shinzo Abe taking a ride in an Autonomous Drive car on 9 November 2013.
With robotics, academic publications can precede the reality on the road as one researcher builds on the achievements of another.
With business models for electric and autonomous vehicles something of the opposite is true. Academic studies follow the reality, they do not lead it, but this tends to be true for business models in most non-mature sectors.
If one 'buys in' a model, especially from a different industry, there is far too much that could disrupt it.
For example, the majority of the players in autonomous vehicle development are leaning towards having all navigational capabilities onboard and are leaving vehicle-to-vehicle (v-to-v) capabilities till later.
A week ago, though, the US Transportation Secretary, Anthony Foxx, said that v-to-v technology could soon be made mandatory and that it could help drivers avoid 70-80% of crashes. A model that inflexibly disregarded v-to-v might then have problems in a major market.
This DSRC v-to-v technology is very standards dependent. It works using GPS and wireless with dedicated spectrum with a range of 300-500m. Having nominally looked after the writing of about 2000 European standards (from a British point of view, in the construction sector) in the past I am well aware that open European standards usually take at least five years to write so unless Europe adopted any future American standards faster through the ISO/IEC route it would find itself behind on where it saw itself on v-to-v.
V-to-v does not deliver a driverless outcome - rather it supplies advanced driver aids. It might be extended to include all legacy vehicles, motorcycles, bicycles and pedestrians.
The point for now, though, is that most of the business models will have to be left to the practitioners and entrepreneurs as the only groups of people able to move swiftly enough. If regulations emerge they will work out how to accommodate them.
Those who have conceptualized the U.S. version of v-to-v technology have in practice also included c-to-v, p-to-v and s-to-v within the grand scheme of things. Potentially, cycles and pedestrians are to carry GPS locators and transmitters - but will they?
Toyota, who have one foot clearly in the v-to-v camp, include i-to-v in the mix and so put out a fine conceptual show in terms of intelligent transport systems.
Toyota add radar, lane guidance and road surface technology into the package, too, and these of course bring one close to technologies one might have on driverless cars.
Can v-to-v deliver everything, though?
As part of our research into sightlines for b-to-v we took these two photos at the same junction separated by about three seconds. In fact, a normal street scene with everyone behaving safely.
The dog is on a lead and the vehicle is progressing slowly.
Would a dog walker always carry a GPS device? Would a dog?
An articulated vehicle like this (pulling three carriages) cannot change lane or decelerate fast.
Will all legacy vehicles be retrofitted with v-to-v?
Here, b-to-v might be able to warn vehicles of a hazard but not outside a built up area.
No company is going to dominate in these technologies for the forseeable future because in the means of communication to vehicles alone there are a growing number of options.
[2 June 2014 An objection could be raised that building-to-vehicle communication using LiFi is easier than the reverse, vehicle-to-building, but that fact can also be used to enhance the security of data transfer. At its simplest, only when your car's headlights' LEDs are casting light at the garage door or the drive's gates, where there is a receiving sensor, does the command go out to open these and the other data packets you wish to get transfered to the building are sent (for instance, the latest version of the spreadsheet you have been working on). Because data transmission is limited geographically and in duration it is intrinsically more secure. There is no reason whilst when on the move transmission should not be limited to when a secure receiver, like a modified set of traffic lights, is in sight.
Only relatively few receivers will be found on or in each building which is why they must be designed to integrate architecturally].
In concentrating on driverless vehicles we should not overlook progress with purely electric vehicles (EVs).
Toyota is going to bring my favourite concept EV, the i-Road, to the City of Grenoble, en masse, at the end 2014 and together with EDF is likely to demonstrate a clever use of electricity and integration of EVs into an urban transport network.
Turning to the challengers, Tesla is to build a gigafactory that will built so many lithium ion battery packs that it will halve their cost and double worldwide production. Cells and batteries with capacity of 85GWh will be produced annually. The factory is likely to be somewhere hot like Arizona where the batteries can be charged initially by solar power and wind power, and presumably re-charged if returned to the factory. The number of batteries produced will also allow for storage of significant quantities of electricity by the solar power industry to which some will be sold.
Tesla also intends to progressively ramp up production of cars to half a million a year.
Given range anxiety is a brake on the sale of EVs, Tesla has already established a network of Supercharger stations where a Tesla vehicle can be recharged in 30 minutes. This permits transcontinental travel in the U.S.
The good thing about entrepreneurship is that it does not readily let those who say something cannot be done stand in the way.
With Toyota and Tesla making the running in the past few weeks, this week it was the turn of government in Britain, central and local, to show it was serious about the new technologies.
On Sunday evening the Prime Minister mentioned 5G at a consumer electronics show in Germany, a technology (LiFi) we have been analysing at the consultancy for use with autonomous vehicles (Mercedes has already used it in a limited fashion), especially in relation to building-to-vehicle communications.
On Wednesday came news that Transport for London would be getting a version of Paris' Autolib' electric car scheme (perhaps the scheme of its type with the best business model at present) and more electric charging points.
So unless technologies stay in their own silos (a bit of a risk) it looks like the new automotive technologies are rolling on a green light.
Straying a little from the main subject of driverless cars, I am now a little more confident that standardisation can respond to international incompatibilities in less than five years as the recent recasting of the Vienna Agreement, an agreement that governs, for instance, whether European standard body CEN or international standard body ISO takes the lead, modifies the ground rules.
There are already standards like ISO 17263:2012 (which relates to automatic vehicle and equipment identification e.g. automatically identifying the container on a vehicle) that are intended for use with DSRC interfaces, e.g. 5.9 GHz frequency, rather than cellular or satellite systems.
The ETSI telecommunications standards body also produces standards on a much more accelerated timescale and has produced some already. DSRC 5.9 GHz is known as ITS-G5 in Europe.
A road corridor between Rotterdam and Vienna using Cooperative Intelligent Transport Systems (C-ITS) based on V2X (or C2X or car2x - much the same thing) communications - meaning here communications between infrastructure and vehicles - will be using ETSI's ITS-G5 (WLANN standard IEEE802.11p) on the 5.9 GHz frequency (in effect local WiFi on a dedicated frequency) or cellular 3G and 4G from 2015.
So both new telematics infrastructure and vehicles equipped with the technology to relate to it will first appear in 2015 - but it will take some time before these technologies converge with onboard driverless cars technologies.
Very rapid data exchange is necessary if it is used for navigation on the highway. 3G has a latency problem, 4G can be low latency but requires cellular operators to give vehicle related traffic priority, 5.9 GHz is low latency.
The range of ITS-G5, up to 800m, would give vehicles a extended 'view' forward relative to lidar and radar and the ability to know what is round corners or otherwise unseen and communicate with infrastructure.
Nonetheless, all-onboard driverless navigation technology would appear to reduce road accidents more than ITS.
Toyota is working on collaborative measures and advanced driving support systems not dissimilar to the Cooperative Intelligent Transport Systems being developed in Europe.
They use front facing millimetre wave radar, onboard cameras and maps, cooperative cruise control through v-to-v, and are described in this video.
They do not replace the driver and there is no lidar but they do use automated technologies in many driving situations. Lane trace control, for instance, uses automated steering control based on current technologies.
These leave quite a lot of potential for later convergence with driverless technologies.
If the technology were available but more expensive where would you consider using LiFi now for position fixing and communications? In a deep mine for a start where you would not get a GPS signal and unreliable radio communications. The LEDs could provide light, too. Reflected light can carry the data signal so where a wall of rock might block a radio signal the slightest opening might let the light through. Automated vehicles using lasers will soon be doing mining and whilst we have been looking in awe at the half a million and more miles self-driving Google cars have driven, 2.3 million kilometres have been covered by driverless haul trucks in mining environments.
[How LiFi might be used in the more predictable context of an office: link to illustration].
The CAR 2 CAR Communications Consortium (C2C CC) is the principal organisation co-ordinating technical input for developing standards for co-operative intelligent transport systems (C-ITS) in Europe.
It aims to increase transport safety and efficiency by means of C-ITS.
This it will do by, amongst other things, developing open European standards in ETSI and CEN and charting a course for the deployment of C-ITS which uses V2V and V2I technologies.
For the past two weeks members of the European standards body CEN have been considering whether it should co-operate with American standards body ANSI on driverless technology standards. If V2V and V2I technologies become mandatory for all new vehicles then driverless vehicles will have to them too and there would be scope for how navigation is controlled to conflict as between C-ITS and driverless technologies.
In addition, standardisation can slow up the rate of innovation which developers of autonomous technologies would not want to see.
A mandate from the European Commission has been used to develop a set of standards in ETSI and CEN that give effect to C-ITS and the vehicle manufacturers within C2C CC have committed to introduce C-ITS from 2015.
It is a legitimate commercial decision for vehicle manufacturers to make as to whether in the first instance they prefer to go for V2V, driverless technologies or await whichever technologies can be bought off the shelf from component suppliers and some dislike the prospect of any legislative dictat as to what they adopt.
C2C CC sees C-ITS offering advanced driver assistance, increased traffic efficiency and communication and information services.
The infrastructure will communicate with vehicles using WLAN on the 5.9GHz band of frequencies so both the infrastructure and each vehicle will serve as a WLAN stations meaning that vehicles can pass forward information to other vehicles within range.
Driverless vehicles, by using lidar, optical cameras and, if desired, radar and infrared, too, would be able to identify most of the hazards identified by C-ITS on their own, add some more and also provide superior navigation and safety capabilities to human drivers.
What the large majority of driverless car videos do not usually show to date is the car driving itself without passengers.
This 2014 Audi A7 video is going to start a trend of cinematography which will be a boon to detective drama film-makers. Now as the good cop gets distracted by something in the car park and opens fire on it, it does not have to be something improbable like a door swinging in the wind but it can be a driverless car moving off to a rendezvous. Some have already called it 'ghost driving'. Much more scary for the viewer.
Here it is called 'piloted parking' when really there is no human pilot.
This parking takes place entirely on private land, though, so it could be a technology available soon in private car parks with the right sensor at the entrance.
This is because there is requirement for a driver to be at the wheel on the public highway in most U.S. states and in EU countries with the notable exception of the U.K. and Spain.
A car parking itself in a private car park is not on the public highway.
The requirement to have the driver at the wheel nowadays really only offers the type of assurance that having a man carrying a red flag in front of a motor vehicle did more than a century before.
Volvo also demonstrates autonomous parking and, more importantly, self-driving on the roads of Gothenberg in a video released today.
Google has now done 700,000 miles in its self-driving cars. This newly released video demonstrates some concepts relating to onboard prior knowledge, standardised responses and machine learning. How the cars address some well-known hazards - road works, railway crossings, lane obstructions, pedestrians at junctions and cyclists - in a safe manner is shown.
Getting a car to go round a circuit autonomously is not one of the most complex tasks that faces researchers as the machine learning involved can be kept within reasonable bounds and there is not too much that is unpredictable.
As Jeremy Clarkson has been so much in the news in the past few days, here is a clip of him being taken for a ride in a BMW 330i in 2011.
Europe: Mercedes, Volvo, VW Audi Group, BMW, Continental, Valeo.
The telecoms industry and the data processing industry will also be large players once the cars achieve volume sales.
The lists are not exhaustive and the technologies overlap in capabilities so considerable scope exists for market choice.
Will there be a losing form of road transport with the advent of driverless cars?
Not cars. There will be more of them but using less total roadspace.
Not buses or guided buses.
The answer would, at a guess, be trams. These are like trains on the roads but with next to no ability to change course and requiring constant driver vigilance.
Driverless cars, and larger vehicles moving together as roadtrains, reduce or remove the workload on drivers and have very much more inherent flexibility. They will be safer.
Google is probably the leader in developing digital maps for road navigation but European ITS will need maps too and there is a proposal before one of the European standards bodies to develop a Technical Specification for what is being called a spatial data exchange framework.
It builds on preliminary work undertaken by the EU funded ROSATTE project.
It is important that digital maps for ITS are highly up to date for attributes and geometry that are critical in terms of safety and efficiency. The map providers cannot easily keep their maps up to date for such attributes, while up-to-date maps are a key asset for a wide range of ITS applications in the areas of navigation, driver assistance, cooperative driving and automated driving.
The solution is to retrieve the information on changes from the road authorities. As they create the changes, they are the most efficient and immediate source for such information.
This imposes considerable duties on road authorities in a budget constrained period and driverless technologies that provide the same or greater levels of safety whilst keeping all navigational capabilities onboard, including updating their onboard prior knowledge, on the face of it have a competitive advantage, including in terms of time, though not necessarily in terms of capital cost. (A driverless car like the Nissan Autonomous Drive vehicle might cost more to buy but impose less costs on road authorities than ITS equipped vehicles).
Driverless technologies that leverage network connectivity, as might the Google cars, would be able to dynamically update each others maps.
3) Driverless technology with network assisted onboard navigational capability.
So at last Worldreviews is to get what it has been pushing for. Google is to build 200 two-seater driverless cars without steering wheels in Detroit for use near its HQ in Mountain View, California.
They will not have brake pedals or accelerator pedals either, only a stop-start button.
Were Google's intention with its latest car to displace traditional vehicle manufacturers it would be on a sticky wicket.
Rather we suspect that Google shares Worldreviews' view that there is a new car-travelling demographic to be reached.
Its video suggests as much: mothers with children that need attending to, the old, the blind, the disabled and those wanting to travel in a space saving vehicle.
Like a lot of disruptive technology, it does not initially exceed the capabilities of preceding technology but is good enough and with the potential to be quite a lot cheaper.
At Worldreviews, we do not think that the autonomous technologies will reach their full potential without modifications to the built environment.
The streets of Mountain View are not the ideal testing place for speed limited vehicles (maximum speed 25mph) with lesser crash resistance than some larger vehicles but it is probably the best available being close to Google HQ. As we said last year excess development money should go into crash resistance. F1 cockpits are tiny but have immense structural integrity.
Likewise the broad pedestrian pavements of Milton Keynes may not be the ideal testing place for autonomous technology pods but nonetheless probably the best available in the UK.
We would urge the UK authorities to press ahead with finding locations where other types of autonomous vehicles can be trialled with light modifications to the infrastructure and the built environment.
The shape of this market may well be defined by those who get the best visions trialled early.
The appearance soon of vehicles without steering wheels in Mountain View and Milton Keynes will be an immense step forward in gaining acceptance for driverless cars and will bring about a realisation that they are safe and could eliminate 90% of road accidents. To do this the physical environment in which they operate may need to be modified.
The Google cars in Mountain View will be dependant on Google maps supplemented by very precise information gathered by the lidars and other information gathering equipment of the previous generation of driverless cars and the further data that will come from this new generation of cars.
Google and a few others have a genuine head start in maps. Other manufacturers may lean towards advanced machine learning.
In the Volvo trial in Gothenberg updated maps are supplied by radio link from Volvo HQ.
At Worldreviews we are in favour of a concept of our own which we are calling local cue maps supplied by the infrastructure to passing driverless cars. It avoids the necessity of one organisation mapping the whole world or at least a whole country and third party providers could maps for different locations. It also avoids the necessity of having a great deal of onboard machine learning capability. | 2019-04-19T12:32:59Z | http://worldreviews.com/Driverless_Cars_2014.htm |
This post is brought to you by Pier 1. While this is a sponsored opportunity, all content and opinions expressed here are my own.
Back in October when we bought our house, we were not sure we liked the exterior color and planned on painting it.
Now that we have lived in the house for 5 months, we have come to embrace the exterior color. We have found that the teal green adds to the relaxing casual vibe of a lake house. It also camouflages a lot of the ickies…like mildew. :-) When I look around at the other lighter and more neutral color homes around the lake, I can see signs of mildew on them. With the teal, it is hidden, it is there…you just don’t see it. That is one big reason we decided to keep the color, less power washing, more time spent relaxing and having fun.
You know that I love the color turquoise, well, I have found that it goes very nicely with the teal green. I am now enjoying finding items to decorate the deck that will accent the teal exterior.
…planters that line the deck filled with pansies that have survived all winter long.
I like all of it, but what I needed to get and get them pronto… was doormats. 4 of them, one in front of each of the sliding glass doors where we enter from the lake side of the house. With our yard being framed on two sides with pine trees, a lot of dirt, leaves and pine straw comes in with us on our shoes or our bare feet. Not to mention, pollen. That was crazy awful for about 2 weeks. It left a thick yellow layer on everything and even after washing it off, it was back within hours.
Good doormats to wipe the soles of our shoes to lessen what we bring into the house were needed. I wanted nice doormats that were not $80 a piece, but that were stylish not just utilitarian, so I would not have to be sweeping the floors twice a day.
The doormats have become my inspiration for my outdoor decorating color scheme.
I don’t have Hunter boots that you see used on lots of blogs to stage a mudroom photo, but I now have this ceramic turquoise Rain Boot Planter right outside my studioffice door where I can see it all the time. Isn’t it cute? I planted white Diamond Delight (euphorbia graminea) in it. It likes full to partial sun.
I also added this set of easy-to-move-around side tables right outside my studioffice door. We have lots of outdoor seating, but were lacking in small tables on which to rest a drink or book. I planted Verbena in the Farmhouse Vase and Osteospermums in the ceramic planters that I already had. The tables have a label on them that says “inside/outside”. I placed them under the eave to protect them a bit when it rains. I plan to move them around as needed when we are entertaining or even set one by a chair on another part of the deck.
Another thing the deck was lacking was an exterior light by the door into my studioffice. Although it is beautiful on a starry night, it can also get rather dark at night and I don’t want big lights that will attract bugs.
I found the next best thing…A flat backed metal wall lantern and an LED Glass Flame Garden stake light that is powered by the sun. I put it in a planter.
….I filled the wall lantern with LED Candles that you can set on a timer or use a remote to turn them on and off.
I like the remote. I keep it on my desk so all I have to do is pick it up as I head outside.
A simple press of the ON button and the candles go on. Press OFF and like magic, they go off again. I don’t have to open the lantern door or even touch the candles to turn them on. You can also set them on timer mode. Ingenious!!! It even comes with a battery. :-) The light is very soft, but enough so I can see where I am going while not attracting bugs.
but I know I will be moving things around more as I see how we use the deck now that the warm weather is here.
What accent colors do you use around the exterior of your house? If you would like to add some, I have a $100 Pier 1 gift card to give away to one lucky reader.
This post is sponsored by Pier 1. Thank you so much for supporting the sponsors that make In My Own Style possible. All content and opinions are my own.
Diane – I wanted the same rain boot planter you have on your deck. I kept waiting for them to go on sale at Pier1, but failed to check weekly. Now I am bummed that I just didn’t purchase it because it looks so great on your deck. I was also thinking of using it as an umbrella stand.
Hi Lisa – I love that rain boot planter and so did my daughter. When she was home two weeks ago to load up all the hand-me-down furniture we had since she bought her first house. When she saw that I had not placed a new plant in it yet for summer, she asked if she could have it for her new house. I happily gave it to her and told her exactly what you said…in the winter she could make it into an umbrella stand. Have you done a search on Google to see if someone is selling one or maybe one like it? I bet you can find something similar. Thanks for reading my blog.
Diane, I think embracing your lake home’s color is exactly right. Love the addition of turquoise and the tables.
I especially love your LED lighting solutions. The carriage light, in particular, is so handsome. I love following along as you and Ed make your new home your own. Love everything you’ve done thus far. I voted for your fireplace makeover because it is truly striking and bears no resemblance at all to your starting point.
It took a little while for me to get used to the color scheme on the outside of our home, too. Painted nearly ten years ago, in shades of taupe, with accents of black & a swipe of mustard, my first impulse was, “Oh no, this has got to go.” But then there was a roof to repair & a toilet to replace & window coverings throughout that, well, let’s just say the word “nasty” wouldn’t cover it. Then winter set in & I decided we just HAD to have fireplace. Now it’s spring & the mocha-colored awnings are unfurled & our dusty-green Martha Stewart patio collection is artfully arranged under the lilacs. Not too far away in the distance is a magnificent backdrop of snowcapped violet peaks & rolling meadows of brilliant green, dotted with brilliant wild flower blossoms of periwinkle, magenta & gold. Suddenly, my somewhat lackluster exterior has become the perfect neutral foil to balance the riotous display surrounding it. And then there’s the fact that our little home is on wheels & next month our backdrop will change to the myriad shades of teal & aqua & silvery blue along the driftwood-strewn beaches of the northern Pacific & I’m thinking I’m going to be OK with our dully but timeless motorhome paint scheme.
Hi Kathleen – I love that your house is on wheels. :-) I would love to live on the road for a few years or more and travel all through the US and Canada. What an wonderful adventure. I hope your next stop…on the beaches of the NW Pacific is wonderful. Keep an eye out for glass fishing floats. I hear that is the best place to find them.
Ooops! Posted too soon! I wanted to mention how excited I was to see the battery candles used outdoors! What an awesome idea, and perfect for my back patio AND front porch (I already have five lanterns!) THANKS!
Our home is a multi-colored “old-look” brick: grey, white, black, “very pale/muted terra cotta” … Recently we had the small areas of wood trim and garage door painted a color I thought I had matched to the mortar ~ supposedly a grey concrete color, but it turned out too green for my husband’s taste! I was out of town when it was done, he called with worry, and I suggested he stop them, but he didn’t want to do that!
So, we are stuck with it for now: it is too expensive to repaint this quickly! I would love to have actual, corrected GREY wood/trim, and black on the four entry doors!
Love the inspiration you share!
Our home is a cream color with reddish shutters. We haven’t changed anything about it since moving in. I’d love a darker color!
Well, sadly I live in an apartment right now :) But if I had my choice, I’d love to have a variety of pops of cooler like maybe robin egg blue with some red. But that might be too ambitious!
Our house is a muted yellow that had weathered blue green shutters and a white door. The shutter colors made the house look greenish – yuck! So recently we had the house power washed, we painted the shutters black and the front door red and added a black metal wall mounted star on a blank wall along the front entry. What a difference and in our budget. Thanks for the inspiration to start making our home and re decorating “our own style”. Love following your blog.
Our house has natural redwood shingles with terracotta trim. Thank you for offering the Pier 1 gift card.
Our home is a boring tan with chocolate shutters that have been fading and now look like poop, plus they are bleeding down our house now. Powerwashing will be taking place SOON, plus we are going to paint our shutters navy blue. Would love some gorgeous planter boots at my back door! :) Love your blog, Diane!
Our house has tan colored siding. Would love to buy some accessories to jazz it up a bit!
I live in a patio apartment (one level). The exterior is a tannish color. I love your three grouped tables. Your outdoors is just gorgeous!
Our house is a dark taupe with oxford brown trim, enhanced by river rock and cedar shingles!
Our new to us house is a brownish/beige brick. I am trying to decide what colors to use on the outside near the screened porch and am hoping to use a bright yellow and sage green. We shall see how that looks.
My house is red brick with black shutters, white trim and green doors. Love your lake home.
Gorgeous! The colors are so vibrant! The tables are a beautiful backdrop for your pink potted plants! Those boots are adorable! Pier 1 has gorgeous colors and you’ve done an amazing job putting it all together! What a view! I have to do something with my back yard as it backs up into the woods, so I need color! Everything is green!
The color of my house is beige with white trim and black accents, its surrounded by lush green trees and a cedar sunrise warm toned fence. I need color! You did an amazing job with all the colors and things you got from Pier 1, just beautiful! ?
I love your turquoise accents and the info about the LED candles because I have a project in mind that they would be perfect for. My house is currently a pinkish tan with a burgundy front door and accents. However, I want to repaint soon (maybe in the fall) and want to paint the house taupe with the front door and accents in some sort of blue/green like aqua or turquoise. That door mat would be perfect except coir isn’t bare-foot friendly (but maybe just have to make sure to wear flip flops when stepping outside). Thanks for the opportunity to go shopping at Pier 1.
I love the LED lights – never thought of using them outside – duh! Thanks!
I live in a 1940 stone home with black shutters. Last year I painted my front door bright Spanish Olive after having it red for many years. I also use a lot of bright olive green for accents in my home.
Your outdoor living is beautiful. My color of my home is white. It could use some pop of color for sure.
color that is on your house. What is the color name of it?
Your pretty touches on your deck are perfect–I LOVE those tables! My outdoor decor colors are aquas, turquoise & chartreuse green. Pier-1 is a great source for those colors.
Hello! My house has light taupe siding. I decorate my deck and front porch with red, turquoise, and lime green. I fill them with plants and flowers. Love your new tables. Pier One is one of my favorite stores. Thanks for sponsoring this.
My house is grayish blue with white trim and navy blue shutters. My yard has a lot of rose bushes in various colors for my pops of color.
Our exterior is a neutral color, so we accent with annual and perennial flowers. Our back porch accent colors are turquoise and light brown.
My house is light grey with white shutters and a fuchsia front door. I also bring in lime green and turquoise as the other accent colors here and there. Love those tables from Pier 1.
Our house is a tiny, tan and dark brown ranch built in 1978. We love it, and love fixing it up on a small budget!
Our “new to us” home is all done with tan brick, and taupe aluminum window frames (obviously, we need some color accents). Rather bland right now, but with some pops of color it will be beautiful (and very low maintenance….NO painting, a wonderful thing as we get older!).
The front of my house is terra cotta colored brick with dark brown shutters.
Our house is red brick, and our door and shutters are a soft grayish-green. We like it because it’s muted and looks “nature-y.” I love the side tables you chose!
My house is light gray and I use turquoise as an accent color. It looks beautiful against all the green of the trees and lawn. I just bought 2 huge planters in turquoise to flank my front porch steps and can’t wait to put flowers In them but I have to wait for warmer weather.
Our house is a soft brown.
The exterior is a khaki color!
Our home is taupe with cream accents. A blank state actually. At the moment l use a lot of green accents on planters and such. My annuals are always a riot of every color( there are just so many to choose from!) thanks for the chance to win.
Where did you get the mirrored lantern box hanging outside from? Your led candles are inside it. I’m searching and can’t find it.
The exterior of my house is mainly sage green vinyl siding with a few red bricks on lower half in front. I truly adore your home.
My house is green with cream trim. Right now my accent color is in spring and summer flowers. I have deep pink rhododendron, sweet william, and hanging baskets of new guinea impatiens. I love Pier One!!!
Our home is a medium gray tone with white trim. I love to add pops of red – geraniums, roses, and bright pillows on my white bench – even our front door is painted bright red! Thank you for all the ways your blog inspires me to be more creative in my home!
Cream stucco with sage trim and a white door. I love the remote for the candles!
My house is pale yellow with a stone front.
Our exterior is light gray with bright teal or what you call Turqoise trim. We use the bright teal and some orange to accent with. Love those table!
Pale pink! It’s fun and playful here in sunny Florida!
My house is tan with black shutters and a bright red door! And I use every color to accent and LOVE it that way… I just love color! But your view of the lake… swoon!
Savannah wicker siding with black shutters and door.
Brown and gray brick with cream trim and copper accents.
Our house is a neutral beige with multicolor brick which means I have lots of color choices to use as accents on shutters and doors. As a native Columbian I’m so glad you chose the beautiful state of SC for your new home!
our house is cream w/a brown barrel tile roof that has streaks of black thru it and white windows frames. The patios and driveway are natural colored stone-look in creams and Browns. Our lagoon style swimming pool is black marcite and our waterway has deep water that appears black. I use white wicker furniture w/big blue mounted sailfish on the walls and pops of chartreuse green and cobalt blue.
Love the lake home..so tranquil. The color of my home is creamy white white pure white shutters and a deep green door…..it’s very pretty and I love it!
Our house is brick with tan siding and green shutters.
My home is brown outside.
Our house is part red brick and part tan colored siding.
My house is pale yellow with a green roof, white trim around windows and doors, I decorate my deck with greens and pale blues and a lot of pink and yellow and blue flowers.
My home is tan with white trim. For the pop of color, I usually stick with red.
The exterior color of my home is taupe and brown – not the colors I would have preferred, but I bought the house new and it wasn’t in my budget to change them! I accent with flower colors of blue, orange, and red.
Diane, we have a very neutral creamy tan exterior. I need to use planters and such to add pops of color!
Our lake house is tan with dark red trim. I love your deck and the wall lantern!
My house is new and has light brown siding that has still not been painted:( Hoping to get it painted this summer. We are thinking about a hunter green color.
The base color on my house is called “Lost Summit”. It is a dark taupe. The trim is off an off white called “Sandstone”. My accent color is red because I have beautiful red Knockout Roses growing in my flower beds.
We’re buying our first home after renting for the 19 years we’ve been married. The house is dark gray with white trim and a charcoal front door. I’m planning on painting the door red and adding some red and blue pots to the porch.
Our home is taupe with teal shutters. I love your color, I bet it stands out in a good way! Love the flat back lantern and candles, so clever!
I just repainted my exterior and the base color is Coral Gables Biltmore which is a nice latte color. I love it!! The trim is Dark Walnut. Another beautiful color! Love the teal green!
My home is a 1925 Craftsman with newly painted dark gray wooden siding, trimmed in bright white with black screens and black doors. I am leaning towards aqua/teal/lilac accessories. Still deciding so that might change!
My home is brick with green shutters and beige siding. We replaced our green storm door with a black one and now I want to make more color changes. One thing leads to another…. We always seem to do everything piece meal mostly due to budget, but it drives me crazy sometimes trying to fit it all together! I am ready for some color changes on the exterior for sure.
I’m in South Florida and this year orange is my color to POP! I just got some new cushions for our patio furniture in a great tropical floral print and I think adding orange to the lanai will be just what we need this summer to keep cool! Thanks for sharing this giveaway with us!
My house is brick with dark green accents. I love to decorate with bright pinks!
Brick colonial with a black door and black shutters. Love your homes!
My home is beige with white trim and my favorite popping color is red. I love what you have done with your lakeside home and was just telling my husband about your move, your new mantel and your uplifting blog! Have you seen the pedal boats that look a lot like your kayak? Does anyone on your lake have that type of boat – that you’ve seen? I can hardly believe you are in your home 5 months already!
Hi Sue – Yes, I have seen the pedal kayaks and paddle boards. I want the pedal paddle board. It is made by Hobie. I have not seen either on the lake yet, but it is still early in the season. I am saving up for the pedal paddle board. What a great way to get leg exercise right on the water. It is a little pricey, $2,500+ Maybe by the time I save up, a less expensive version will be made.
My home is SW French Gray but I have a bright yellow door!
My stucco home is white with brown trim. I use terra cotta pottery as an accent color throughout the property. There are over 30 pots with roses, dalihas, and succulents adding to the color scheme. Love your lantern and candle idea for a porch light when needed.
We just painted ours a beautiful sage green! Added all new white windows and trim with a pumpkin colored door. Absolutely love it even though people still look at us funny when we tell them we painted the brick green! Love your house and all the updates you’re doing and boy what a view!!
I like to use pops of yellow and white in the back deck and garden. It really brightens up all that expanse of green!
My house is a light brick with cream siding, a mint green door and matching shutters.
The exterior of my house is natural white with rust colored stone.
I have been reading your mail for some time now.We are thinking of buying a house soon.People like you are really encouraging people like me out here. Thanks for keep coming with nice and practical ideas.
Our house is tan and black. It really needs pops of accent color like red or something.
Our house is all brick on the outside. I hope to do a white wash in the future, but for now I’m doing lots of greens and blues to offset all that red.
Diane, I LOVE your home!! The landscaping is beautiful! I love the picture with the pink flowers and the lake. I love that you have embraced your exterior color. My Lakehouse has a cedar cinnamon color which I also had to embrace. I use a lot of planters with Ferns which I am obsessed! No fuss no muss! Also I use planters on my railings! It is truly my happy place 2 1/2 weeks I will be heading North to Maine! Yippee!
I’m in the process of painting the red bricks. So far I have some of the primer down and it’s pistachio ice cream green (hoping my neighbors don’t freak out), but the final color will be a dark, almost grey, green with black doors and shutters. If it would ever stop raining we could finish.
We have a two story home with red brick on the lower and the upper is painted Ramie by Sherwin Williams. It’s a tan color. I would love to jazz it up more with pops of color when the flowers are not in bloom.
Our home has beautiful brick in soft shades of red/pink. Doesn’t sound pretty but it is! The back of the house is white siding that plays well with the pool water which is turquoise. I use light teal and green pillows and cushions to accent patio furniture.
Our home is white. Blah. But we had painted our front door a vibrant blue this fall and it really pops!
Love your turquoise! I have it in my rear porch with a a touch of royal blue and lime. Looks cool and and refreshing, goes with my unifying blue throughout the interior, and allowed me to use all of my blue pots from our previous home.
We have a red brick and soft gold siding Craftsman-style home with a nice front porch and a rich red front door (I painted it with a $4 sample can of exterior satin enamel from Home Depot!) – accessories to tie it all together. Lots of hand-me-down succulents in repurposed and repainted pots on the front porch. Ragged or painted them all with dark red-brownish paint (another sample) and used a copper metallic rub-on wax from the art store to make them look uniform though different sizes and shapes.
We have a California Bungalow built in 1918. It is painted in a very soft, light yellow. Windows have white trim with doors and screens in red. I love it! I use lots of red in outdoor furniture and flowers.
My house is light brown.
My home is orange, brown, red brick with light tan siding. I accent with dark bronze and pops of yellow.
Love your new home Diane and love reading your posts!
we live in a small cottage on an island, after leaving our old home of 26-years . the cottage is blue…the color of water and sky…with white trim. blue is about my least favorite color, but living here for the past five years, and now faced with the rather bleak prospects of having to find another rental…i must say that blue cottages with white trim are my favorite. i only hope we will be as lucky with the next house we rent…when we find it. i have loved my life in this little blue cottage and find myself already homesick for it. thank you for this generous giveaway.
I have a waterview of the Chesapeake Bay in MD, so I mostly decorate with seaglass colors. With my home’s gray exterior, I use aqua, cobalt and lime green the most. The view from your new home is lovely!
We have a waterview of the Chesapeake Bay in MD, so I decorate with all different blues and seaglass colors outside. With my home’s gray exterior, I mostly use aqua, cobalt and lime green. You have a lovely view at your new home!!
The exterior of our Florida home is tan with cream trim. Sounds a little mild but with palm trees & tropical landscaping, we love it. Love your colors & how cheerful they are!
Our home is gray brick with gray/moss trim. The front door is sanded and ready to be painted a dark aqua. Your lake house is so inviting. You will love it this summer!
My home is taupe with deep blue doors and shutters. My pop of color is yellow.
Our townhouse is red brick with a chocolate brown door. I am looking for a way to add color to my front stoop. My favorite colors to decorate with are orange and teal.
It is red brick with tan siding.
Our home is khaki tan with cream trim and a black door and roof. I use red as my pop of color.
My home has beige siding with light brown shingles and white trim around doors and windows. My front door and garden shed doors are painted a lovely raspberry red.
I really like the flat back lantern. A few of those would be perfect on my pergola.
I like my home. I find it very restful. The only thing that would make it better is a water view …or a meadow…..or woods…….ha! ha! I live in a subdivision, so the neighbors are close but they are quiet, friendly people.
The house we will be moving into is tree bark brown with lots of peeling going on. We will repaint it to be a charcoal color with a cherry red door.
My house is tan with green shutters. I really like to add reds and yellows for a pop of color!
My home is buff yellow with buff brick. I also have used various shades of turquoise as an accent, but it could use some more details. Love the mosaic tables and plants.
I have a white stucco house with teal trim – and turquoise and lime are my patio accent colors!
My house is more of the rustic colors of brown, terra cotta and tan. However, I am working on brightening up and wanting to use some beach colors such as blues, teals and whites. I am starting on the inside and will be working my way to the outside of the house….LOL….living in Oklahoma, turning my house into the “beach” may be as close as I get to it….LOL.
My house is barn red!
My house is cedar lap siding and it needed to be painted badly! We use a solid stain from Home Depot. We were going to change the color but chickened out. Then when we got to Home Depot, our color was discontinued. We went with Adobe Brown, a little darker than the original Chamois. Because we waited so long to paint, it took a lot more of the solid stain than the last time. Lesson learned, don’t wait so long! Love the new color!
My house is white with black and burgundy trim.
I would love to be your neighbor! How relaxing it looks to live where you live! Our home is red brick and some white stone accents and white painted trim. Love the spring things at pier one!
My home has natural cedar siding with soft gray trim and a teal blue front door. I love to use purple, hot pink, teal blue, and chartreuse flowers to accent the outdoor space.
The exterior of my townhouse is brick with a black front door and ivory trim. Since I rent I don’t have too much say in the matter, but at least the colors are fairly neutral and any color flowers of my choice work well.
Our home is medium brown (matches and brings out the mortar in the brick accents) with white trim and black door/shutters. Previously, it was pale gray/beige with medium blue accents. The brown really made it come to life and I’ve been so glad I chose it. I’m not very outdoorsy, so my outside decor is usually limited to seasonal decorations, but IF I plant anything, I like red and/or yellow. I think your exterior color is beautiful, especially in that setting. It reminds me of Callaway Gardens in Pine Mountain, GA. You’ll have to visit there now that you live closer ;) Thanks for a chance to win. I love Pier 1.
Our home is a light grey with white trim. We have an Iris Blue/purple front door. I use blues, violets, and white flowers in our (old) pots.
Our house is pale green, with black shutters and a purple front door. This year I’m painting the front door Sherwin Williams Mariner (medium turquoise). I bought a few turquoise pots and have planted some colorful flowers. I need to pull everything together with pillows for the front porch rockers and a new door mat.
My house is pale, pale gray with dark greige shutters, and turquoise/teal front door. I’m heading to Pier 1 to look for mats … l’ve been looking for ones with the colors you found, without luck. Thank you!
Hello! My house is white with black shutters. Exterior decking is stained weathered grey and I accent with cobalt blue!
Our house is tan with white trim and I love turquoise as well! I also use navy blue and lime green.
My house is painted a greenish gray.
Our house is a khaki color, with a red door and shutters. I like to accessorize outside with pops of yellow, it looks cheerful to me!
Love what you are doing with your new house, Diane, and your blog is my favorite! Our house is a farmhouse cape with yellow siding, black shutters and a barn red door. We have a big front porch which I love.
The exterior of my house is tan with pops of green, turquoise and red.
Our house is an 1885 craftsman that we had painted blue with white trim last summer. I painted a jute rug white with red stripes and plan to use red, white and blue this summer on the deck and porch. Your place looks lovely and relaxing!
The exterior of my house is a soft green/gray. It’s a Miller paint color called “Silverado Ranch”. The trim used to be cream but when we repainted we went a little too yellow so I need to repaint all the trim back to cream. I love accenting with any bright color, especially reds or orangey reds.
The exterior of my home (I actually think of it as being my little cottage since it only has about 1,100 square feet) is white aluminum siding with dark brown shutters. I recently had my door painted country blue. I just love it!!
My used brick home has white trim and black shutters. Accents come from shrubs and flowers.
My used brick exterior has white trim and black shutters. Accent colors come from shrubs and flowers!
Our home is the basic New England house, wood siding painted yellow, trim in white with black shutters and door. You are definitely living my dream. Hopefully in a few more years we will be doing the same thing.
I love oranges, reds and pinks. And I love your new home!!
My home is a neutral tan and acts as a perfect backdrop for my colorful planters!
My home is tan with a red/orange brick facade. We have a nice sized front porch that would look great with some of your Pier One suggestions.
My home is a light blue/gray with gray shutters and door, I have just started working on the exterior of our town-home and would love to add pops of yellow and turquoise. We have bushes to rip out and mulch to put down but hopefully it will become a relaxing place.
Our house is has a rocky brick along the bottom half so we painted our house a dark gray. We then opted to paint the garage white to give break up the look and added a white bench swing to the porch with turquoise accent pillows. As the seasons and holidays change I like to switch out the pillows to give it a fresh look.
My house is mauvey tan Hardy Plank with white trimed glass doors. I’ve been moving to turquoise accents and outdoor furniture.
The outdoor objects fade in the full on sun.
So we focus the pops of color to come from the flowers around the house.
We just had our house painted his past fall – Benjamin Moore Pebble Beach. It’s a light gray. The door color is Gunmetal. It’s a darker gray, from the same color strip.
My house is red brick but I’d love to add some decor so give it some bright colors!
We are in the middle of moving. Our new house is a cape cod cottage. It is white brick with black shutters. The shutters are too small for the windows. We want to add flower boxes, new shutters and clean up the small entry porch. Lots of ideas but need to execute it as we can afford to. I am painting a kelly green bench to add some color.
The exterior color of the house is an Olympic Acrylic Laytex pain stain, color Cedar. We live at 6000 feet in high desert mountains with very hot sun and wind. Our views are what we love.
My house is greige green with black shutters and white trim.
Congrats on your new home! It is beautiful! I added some new accents just last summer to my home’s paver patio in turquoise and yellow.
Our home is pale green with cream trim and purple-red door.
Our home is tan with lighter trim so it blends in with the mountains and trees that surround our property. I really like the color of your house so I’m glad it has grown on you, and I agree more time for relaxing and less for cleaning is always a good thing. :) Thanks for a great giveaway. I hope I win!
My house is tan with green shutters.
Front door is flanked by two windows that have a pale sage tint, so I painted the door a pale sage to make the whole door-window area pop, look larger and more inviting. Siding is warm beige-gray with white trim. I always accent with pots of purple, pink white and red flowers beside the door.
Looks great, Diane. I use hot pink and yellow. I never get tired of the combo and lime and orange always add just the right spice. Thanks!
My home is a pink-y brick and white trim; I love it! It is beautiful with any greens, pinks and whites…sorry, no yellow or red here! Thanks for the opportunity to win!
My house is white with black shutters and a black front door. I would love to add some blue accents.
I had my house re-painted early last summer and changed from a medium gray to a light grayish green (SW 6199)l. Trim is cream, shutters are a deep forest grayish-green, and I put a deep red on the door called Crabby Apple (SW 7592). I think it is my favorite color scheme in the 26 years we’ve been in this house. I’ve also been “meaning” to get to Pier One. Maybe I’ll actually get there now.
I love my house exterior – painted gray brick with a touch of the base brick color – coral – showing through. The door is a shrimpy color. The trim is cream. The green of the yard makes it pop. We are not ‘yard’ people – so we have low maintenance stuff, but we do have azaleas to bring color, and forsythia for a week or so. I would add blue hydrangeas. My favorite colors are any blue greens, so I love your teal and turquoise. I would add that to the outside b/c it is beautiful with gray brick. I love your boot planter! I think we have actual old boots that my hubs could plant some great plants in. Thank you for the great ideas and photos of your new home renovations.
Our home exterior is a pinkish brown and grey brick with grey trim and dark blue shutters. It sounds weird, but it is fairly neutral. I try to add pops of color with flowers, but could always use more. Thanks for the great tips!
Diane, Our house is a soft yellow , with soft green shutters. Red front door , soon to be turquoise.
You are living my dream and doing it well!
Our lake house is cream color with brown trim. Out back we used cream, white and teal. Looks perfect relaxing by the pool. I still pinch myself that it’s ours.
Hi Diane, You have done a really fine job of making your new home feel relaxing and warm. Love the colors and Pier 1 has helped you so much. I feel fortunate to have a Pier 1 close by our home too. The work both you and your husband have put into your new home is amazing. Just love it. I hope you manage to get in some down time and enjoy the water this coming summer. Thanks for your blog as you and your ideas are so appealing. I covered all my patio/deck furniture with pale blue denim last year and your idea of turquoise is just what I need at my home too. Thanks so much.
My front porch colors tourquiose and yellow. The house is grey and white. My back yard is the problem a mixture of colors. I like your idea of keeping everything uniformed in color. My need to highlight the tourquiose and get rid of the red,blue-keep the bulk. And beige strip cousins and go with tourquiose and yellow pillows and assesories. Need new door mats love the one you got.
Our house is cream colored base with dark green trim. I wasn’t home when the trim was painted and when I ran in to our neighbor he said “I love the turquoise trim”. I freaked out and called my husband because in my mind the color was dark green and turquoise was a more blue color. He assured me that the terminology our neighbor used was not accurate and the color was exactly as I had picked out. Dark Green. Whew!! Although, now that I have lived with dark green for 20 years, turquoise doesn’t sound bad at all!
My house is the classic red brick, white shutters, white trim and white window boxes with a red front door. I love to decorate my large front porch with pops of red and turquoise!
Cream with Green shutters and a red door.
Red and tan. I love it.
My house is light gray with a blue undertone. I LOVE and really like the pier 1 items you used.
Our new home is dark grey with white trim. I have used teal cushion on our outdoor porch.
My home’s exterior is terra cotta brick with beige siding. I accent it with pops of red and olive green via flowers, planters and garden flags.
We have a brick home with beige trim. I use mostly green accents but after seeing how great your turquoise items look, I definitely need to add way more pops of color on my back patio!
My home exterior is brick (formerly painted white). It is now a greenish grey with dark green (nearly black) shutters and doors. All of this highlights our Vermont slate roof so much better than the white. And like you, I find it helps to hide the mildew and pollen accumulation . I love it! Pier One is my ‘go to’ for home accents.
We have a tan house with cream brick. Love Pier 1 and love that lantern!
My house is light gray with charcoal trim. My front door is “cyber green”–I’m hooked on all things cyber green!
I too live on a lake. My house is tan with rust shutters and an aqua front door. I have a large covered deck with white railings. Don’t you just love the lake. I have lived on the lake for over 40 years in 4 different houses.
My concrete, block home is a pale yellow and needs repainting. I chose the brick red, metal roof to go with the real, brick trim that comprises the window sills and below each window. I also have white fascia and soffits and black, double paned windows. And to top all of that, my wood trim is painted Deepest Woodland Green (closest match found in 13 years.
I love your new house and especially all you both are doing to make it yours.
The main color is white,. We’ve just bought some really nice dark blue for all the shutters. We’re waiting for nicer weather to paint those.
We thought and thought and thought, back when we were picking out colors, and I haven’t regretted our choices for a moment! The siding is a ‘clay’ color, sort of khaki or tan, with black shutters, and white trim. I love it. We are surrounded by woods, and this color looks right at home with all the plantings and trees, all times of the year. I am however, considering trying a wow color on the front door, which could be almost anything! I love your colors, always, and the house has a good color; it’s distinctive and modern. I knew you could do something with it!
My house is beige and white. Teal is my favorite for accents inside and out.
Our home is alabaster with stacked stone, red door and taupe trim. I’m thinking turquoise accent pieces wiould be a nice compliment to the red door. Your home is beautiful.
My house is a light tan with white trim. Light teal is my favorite accent color to use outside and in.
Our 2 story, Florida Cracker style home is light tan siding up top and coffee brown on the stucco at the bottom.
The color of my home is a light canary yellow with white shudders and door.
everyday I embrace the color of my MN Cape Cod. The House is the original forest green color. I have painted the front door a beautiful sky blue – to make me happy every time I walk through it!!!
My house is grey with black shutters. Turquoise is my favorite go to color for every thing. Thanks for a chance to win.
Gray with white trim and I too accent with turquoise, so complamentary, thanks Diane!
Our home is a red brick dutch colonial with cream trim, green door and shutters. We live in the Midwest so the only color to our exterior now, is the AMERICAN FLAG!!! Our deck needs to be refinished, window boxes planted and new pillows. Love your chose of colors. Any blue is my favorite. LOVE, LOVE! The lantern with remote control candles. What a fantastic idea! Enjoy reading your blog!
My home is a traditional Colonial style and is painted brown with beige shutters. I am trying to choose an accent color that would update the look of the house.
My house is a red brick colonial with black shutters and white trim. Our front door is green. The front of the house could use some decorating.
We have a New Orleans cottage that is purple with lime green trim. After all, it’s New Orleans!
My house is mostly red brick with the wooden parts painted tan. Love the giveaway!
I have a traditional Colonial painted dark brown with white trim and black shutters. Last year I decided it needed something dramatic, so I painted the door pink! It looks crazy good and when giving directions, I just have to tell them to look for the pink door! I’m planting urns of pink geraniums with lavender colored filler and yellow spiller!
I am in love with the lantern, I have the same issue with lighting in the night. hopefully I will win the card to buy the lantern.
Our home is taupe with stacked stone accents. Our screened porch furniture is black wicker with black, khaki and red cushions and the porch swing is red. We’d love some of the wonderful side tables from Pier 1.
Our home is red brick with white trim and shutters. My hope is to paint the brick one day for more of a cottage look. Thank you for the giveaway opportunity!!!
Our home is a medium gray with black trim, gutters and shutters. In Oregon we get a lot of mold as well and the darker colors help to hide the uglies. My patio accent colors are yellow and orange with a little blue thrown in here and there.
My house is Carolina Blue with black shutters and a brick red door. I love your turquoise accents. I am thinking navy and red for this summer!
My house’s exterior is a soft pale green with white trim. The front entryway door is a custom color that resembles the cedar colored steps and pergola we built. With the color of the steps/pergola/door and the pale green siding, our house now blends in better with the other houses in the neighborhood, most of which are brick (ours is vinyl siding).
I like to use pinks and purple accents in flowers. They look very nice against the green siding.
We have a greenish/gray exterior with white washed brick. Its a 1960s ranch home with a concrete porch that currently has ZERO decorations. Definitely need to add some front porch charm!
Our home is beige brick with black shutters. Need a pop of color for the summer. Pier One would be a great place to find that!
My house is Colonial Cream with a green front door. I accent our outside deck with teal and lime.
Our home is warm red brick with charcoal trim and charcoal shingles.
The exterior color of our house in a non-descript grey/green, but, the roof is a fantastic bright red metal roof. We have added red patio furniture and some flower pots, but I sure think brining in one more pop of other color would be good. Just no idea which color?
My house is cream/brown brick trimmed in green. Our door is painted a terra cotta color. Love your home.
We have a brick house and will not change that. My husband would die! I did paint the front door yellow. On our patio the cushions are shades of blue with green. There is a little side table that is blue and some tables with mosaic tops in shades of blue.
My roof is burgundy/brown, shutters burgundy, trim almond!! Needing to decorate my front porch for the spring/summer!!! love pier one!!
Stucco beige is the exterior color. Thanks for the giveaway!
Our home’s exterior is light blue with white accents and cream colored brick. You are doing such a great job renovating your new home. I love decorating with turquoise. It makes me happy. I would love to win this and update with some new things.
Currently my house is yellow but I’m planning on switching some things up. It’s a Craftsman bungalow so I’m looking at all the earthy colors. Now I just need to decide….which is the most difficult part!
Your deck is looking so pretty… Aww that view! ❤️ I use the “classics” black and white with a few pops of red. It looks great with the woods behind us.
Living in the South my whole life, I have a love/hate relationship with pollen. It is a sure sign warm weather is close, but what a mess it makes! One thing you might not know is pollen is food for mold/mildew. Yes, so true. To make getting the deck ready each spring is gearing up in face mask, work shoes and work clothes to sweep the pollen off EVERYDAY. Then straight to the shower. It’s my morning chore. Not fun, but makes pressure washing the deck so much easier after pollen season.
I use black, tan, and burgundy …. Love how you can do some with them!
My house is light tan with pale gray trim, but we’re getting ready to paint it – Dark gray with crisp white trim. Exciting!! Just LOVE your new house!!
Our house is gray with white trim (actually being resided starting tomorrow!). We currently have burgundy shutters, although we MAY be considering replacing them with navy. My vote is for keeping the burgundy, but I will consider hubby’s idea too once we see the siding hanging on the house. We have navy seat cushions and a navy wind chime. I have not been to Pier 1 in YEARS, but seeing the fabulous items you buy there…I am going to need to make a trip!
Home sweet home is brownish/beige brick with black running through. Trim is clay beige. Outside accents are a sea of flowers in bright yellow and hot pink geraniums. Yummy!
The exterior of my lake house is a light tan color. I love your door mat…….those are my colors at the lake too! The colors mimic the water, sky, grass and leaves. Really needing to update my deck so keeping my fingers crossed I win the giveaway. Thanks for the chance.
My house is a taupe color with white accents. I use white and red as accent colors. Thank you for the opportunity to win a Pier 1 git card!
Ours is wine colored brick and I too use the teals and greens.
Our home is brick with almond trim. The back patio needs help and I am thinking turquoise may just be the answer!!!
I live in a condo. Everything is white and red brick. I am always looking for fun, colorful things to make my little deck area pop. Otherwise, it’s just too boring. BTW, I absolutely love the teal of your home.
We finally changed our paint color after 9 years, now a silvery grey with brick accents. I use turquoise and red to pop things up!
Our exterior is brick with greige trim and Charleston green door. I use either coral or plum accents that work great with color tones in brick. Coral azaleas make springtime my favorite season for exterior pics.
My home’s exterior is tan with blue/green shutters.
Olive green siding with tan trim. A craftsman vibe. I love everything you’ve done with your lake house!
Tan with black shutters. My outdoor go to colors are blues and turquoise.
our exterior is shades of beige.
My house is gray and I love to use lime green and white as accents.
Our home’s main exterior paint color is called “Baked Potato” with “Milk Mustache” as the trim! I love it!
My house has a light gray siding with a charcoal roof, white trim (that desperately needs repainted) and a field stone facade around the garage.
My home exterior is in transition. Several shades of gray as we renovate with stone and new siding. Need some color pop!
My home is brick with cream and black trim. This year though I am adding turquoise to the deck with a new patio umbrella and cushions. I can hardly wait.
Pale almond yellow with sage green trim and roof. Love my color and have re-painted twice with the same combo because…..it works!!
My house is brick with black shutters and white Windows. It needs a zap of color!? Thanks, Diane.
My home could use some jazzing up! It’s red brick with light tan sliding/accents. It has a small front porch that is screaming for some help.
My home is a light gray-blue color with white trim and brick red accents (the metal roof inspired the red accents!).
We’ve got brick with a bit of sage siding. Your place at the lake looks so serene. Good for you!
Our house is a light gray with white trim.
My home is beige with brown trim. I love turquoise as an accent color, it’s so calming and peaceful.
My home is brick exterior with cream colored paint accents. It is pretty basic and not too exciting! I need some Pier One updates!!
My home is khaki with white shutters and my accent colors are a beautiful Greek blue and yellow. | 2019-04-19T12:30:17Z | https://inmyownstyle.com/exterior-color-for-homes.html |
Do You Have All The Residence Security That You Want? Attempt These Ideas!
Your auto registration is greatest stored someplace other than your glove compartment. This will forestall anyone from understanding the place you reside. You ought to maintain them with you or store them in an alternate spot in the automobile. They’ll all the time need to be close by in the occasion you get pulled over. For those who personal a home, then you definitely perceive the significance of preserving it secure. There’s nothing worse than having your property severely broken. The house wherein you live is usually your most substantial investment, and it’s the place you conduct your life. Read on for advice to keep this most precious asset safe.
Do not go away notes on your door for relations or people which can be coming to service your private home. You might think nothing of it, but it’s letting everybody know that no one is inside. It is a good idea to offer folks a call ahead of time and provides them directions. Program your lights to turn on and off at random intervals with a timer. This makes it easier for you as you will not have to flip the switch, but it additionally ensures the lights proceed to go on and off, even when you’re not at home for a long time frame.
Should you’ve not too long ago bought a home, be sure you change the locks and alarm go codes. Many individuals just take this stuff as is and don’t give them one other thought, however take into account that almost anyone may have a replica of the key or the go code. That can embody neighbors who you do not really know. Be safe and change out both while you purchase. You might want to have your safety system checked yearly. A safety skilled ought to visit to assist with the testing process. There are many things that can reduce the standard of your system. Generally, it’s possible you’ll need a professional to find the problem.
Some folks believe the price of a home security system is prohibitive.
If you are in search of an excellent place to hide a spare key, think about taping one to the inside of your canine’s collar. This is significantly useful when you have a large canine that is not very friendly with strangers. You will have a spare key close , and you won’t have to worry about anybody getting access to it. You probably have a door in your storage that leads to the inside of your own home, just be sure you preserve your storage door down when no one is out there. Having an open door gives a burglar a place to enter, which suggests you and your loved ones may be in danger.
Don’t depart an extra key below your doormat or another place that a burglar would look for it. If you already know that you have an inclination to misplace your keys, it would be a good idea to leave an additional set with certainly one of your neighbors, or you’ll be able to go away them inside your car. As foolish as it might seem, stop having newspapers delivered in case you are happening vacation. Intruders will see the entire papers piling up and will realize that no one is house, making it more probably for them to interrupt in. Name the delivery firm and tell them when you’ll come again and once you need them to start delivering once more.
One comparatively inexpensive means to add an additional layer of protection to your house is to put in movement sensor lights for the outside of your own home. Within the evening hours, this lighting can provide further safety and a cheap way to gentle your entrance entrance means whenever you arrive. By rigorously inserting them across the exterior of your property, you create a perimeter that can not be breached.
Whether you’ve simply bought a home, constructed a home, or have been in your house for quite some time, you’ve thought about dwelling security. Have you taken any action?
If you want your home to be protected and secure, it is important to have a security analysis preformed by a good company. This will assess the weak factors of your property security and will assist you perceive what areas need extra protection and what areas have enough protection to keep you secure. You probably have jet skis, boats, or something similar, have them inside your garage or shed when not in use. Intruders see this stuff and assume you have some huge cash. This offers them ammunition to break into your own home and search for different invaluable gadgets. Additionally, never leave the keys to these things in the ignition.
Don’t leave notes on your door for relations or people which might be coming to service your house. You could think nothing of it, however it is letting everybody know that no one is inside. It is a good suggestion to offer people a name ahead of time and provides them instructions. Program your lights to activate and off at random intervals with a timer. This makes it easier for you as you will not need to flip the change, however it additionally ensures the lights proceed to go on and off, even should you’re not at house for an extended period of time.
Lock up your house, even if you’re round. Many individuals suppose that their neighborhood is the most secure out there. They will leave their doors unlocked all day (and night time long) with out a second thought! That is inviting hassle. Make it a behavior to lock those doors (and home windows) even in case you’re dwelling. It’s most likely a very powerful primary thing you are able to do for your loved ones’s overall safety.
Do not keep your spare key in a spot straightforward to seek out for intruders.
By no means reveal any personal data to someone who’s at the door or calling your home that you have no idea. Be sure that your youngsters comply with the identical policy as properly, as this could result in the wrong individuals getting personal data. This may make it harder for somebody to find and rob your house. Plant an indication that discourages folks from soliciting close to your house. This may forestall people from coming to your door that you just do not know. When you have this signal posted and there’s someone who desires to rob your house, they may feel uncomfortable coming up to your door as it should look suspicious.
When planning to go away for a holiday, you’ll want to turn off the ringers on your private home telephones. In case your cellphone rings and is not being answered, criminals will realize that you just’re away. Don’t open your door for strangers. These days, thieves are creative when thinking of the way to get homeowners to open a door and allow them to in. Therefore, solely enable people you know and predict to enter your property.
Ensure that to decide on an alarm firm that provides monitoring. An alarm that simply buzzes if an intruder tries to enter is statistically proven to be principally ineffective. Once you add the additional monitoring nonetheless, you might have a direct link to someone who can name the police and get you help. There may be an extra charge for a monitored alarm, however it’s properly worth the fee.
Ensure to decide on an alarm company that gives monitoring. You wouldn’t have to change the actual locks, a locksmith can re-key the locks to make them inaccessible with any of the previous keys.
Verify the road tackle on the finish of your block to guantee that it is noticeable in the event of an emergency. Should you see that it appears illegible, name your city heart to see if you can get a brand new sign for your avenue. That is essential as firefighters or police vehicles might want to get to your own home immediately in an emergency. When you will have little children, there’s all the time a concern that they are going to by some means get lost from the house. If you do not want to spend money on a whole dwelling security system, you should buy cheap single alarms. You possibly can place these alarms on doors and windows, and they will go off if one of many children opens them.
Safety of your private home begins with action. Take these tips and begin to make use of them each single day. When you get the grasp of them, learn extra articles like this one and continue to add to your routine and expertise. As you continue to learn, you will continue to higher your private home security, too. Minimize the bushes around your private home. If someone is excited about breaking in, the very first thing they’re going to do is search for a place the place they’ll cover as they attempt to discover their method inside. If you want your yard to look aesthetically beautiful, plant flowers as an alternative.
There is no such thing as a level in investing in an alarm system which doesn’t totally shield your home, of course. You’ll want to have sensors in place on each single window and door to be sure nobody can get inside. If you happen to don’t, you may be gambling with the truth that the burglar might not consider getting into in the identical manner you expect them to. Ensure you at all times do your analysis before hiring a company to put in your property security system. Discover firm reviews on the Web and ensure they are in good standing with the Chamber of Commerce and Higher Business Bureau. You’re hiring this firm to furnish your property with a security system, and you want to just be sure you can belief the company your coping with.
Always lock your home, irrespective of how briefly you anticipate to be gone.
Now that you’ve had a superb probability to study more about dwelling security, you can higher make a decision concerning which sort of system to get. It could actually appear difficult desirous about wi-fi choices vs wired choices and extra. Use what you’ve got learned so that you just’re ready and able to go. If you realize you’re going to be away from house for a while, turn the quantity in your telephone down as little as attainable. If a burglar is staking out your house, a ringing telephone might be just the confirmation she or he must know you aren’t there.
Don’t do any landscaping that can obscure the entrances of your property. Whilst you might imagine it is a good idea to plant a huge rosebush in entrance of your lounge home windows, this gives a thief a place to hide while they figure out a method to get into your property. A number of the advantages of a hard wired house security system is that it is extra reliable than a wireless system. There aren’t any batteries to switch, and the system doesn’t depend on radio frequency waves. This means fewer false alarms which might mean a superb if the police respond for no purpose.
Your auto registration is best stored someplace other than your glove compartment. This will stop anybody from knowing where you reside. You must preserve them with you or store them in an alternate spot in the automobile. They’ll at all times must be shut by in the event you get pulled over. Should you own a house, then you definately perceive the importance of holding it safe. There’s nothing worse than having your property severely damaged. The home by which you reside is usually your most substantial investment, and it is the place you conduct your life. Read on for recommendation to keep this most treasured asset safe.
If you are moving into a brand new house, the first thing you should do to make your home safer is to alter the locks. You do not need to alter the precise locks, a locksmith can re-key the locks to make them inaccessible with any of the previous keys. The place are your door’s hinges? If the hinges for your door are on the skin of your home, you need to move them to the within of your own home. Having exterior hinges is an easy method for burglars to grant access to your house. All they must do is knock the pin out of the hinge.
Thieves have put them up so as to see if people are house to take them down. Or invest in a set of curtains that may be drawn to prevent potential intruders from targeting your valuables.
You may have worked laborious to create your property right into a haven. Nevertheless, this may spoiled once you experience a home break-in. If this thought worries you, you need to do something about it. This text will discuss actions you can take to guard your home and your family from unwanted dwelling invaders. Set up a peep gap to be able to see who’s at your door earlier than you open it. Criminals will knock at a door so that they can push previous you if you open it. It’s best to by no means open a door without figuring out the person that is on the opposite facet of it.
Secure your garage. Intruders may simply break into your storage and access your property. A C clamp helps for storage doors on a monitor. The clamp actually keeps the door closed if tightened close to the observe roller. Test the batteries of your smoke detector every week to determine if they’re operating low. If your smoke detector isn’t on, it is not going to choose up the smoke of the fireplace, which can result in a catastrophe. Use quality batteries that final a very long time in your smoke and carbon monoxide detectors.
In case you have an hooked up storage, remember to secure it as effectively. Numerous persons are afraid that burglars will be able to break into their garage, which can result in them breaking into the home. Fortunately, you may prevent this. If your storage lifts up on a observe, strive using a C-clamp. This will forestall your door from opening up if the clamp is near its roller. If you wish to maintain certain rooms in your house personal, you don’t need to lock every door with a key. Use a code-entry lock for any door you don’t want others opening. You can set up them your self or you possibly can rent a home security firm.
Is there anything useful in view? To guard your family from harm?
You probably have valuables, and also you need a spot to store them, look no additional than the partitions of your private home. In between the studs is quite a lot of empty space, and you may simply store jewellery or anything you do not need a burglar to have access to. Simply install a fake electrical outlet, and use it to take things out and in of the wall. Ensure that your own home number are visible from the street. If there’s an emergency, it can take longer for the police to find your own home if the numbers are hid in any means or too small. Happily, it’s fast and straightforward to fix this drawback.
For those who stay in a snowy space, remember that a lack of footprints in your yard can signal to a burglar that you are out of town. In case you are planning to be away, then, ask certainly one of your neighbors to walk around your yard for you so that no one would be the wiser. When doing yard work or fixes on the skin of your private home, you’ll want to put ladders and tools away when you’re accomplished. When you preserve out ladders, thieves can easily climb them to get into your house. At the identical time, they might use tools, like hammers, to interrupt your home windows.
In term of solid advice, you’ve just learn a large amount of it. How are you going to make use of it in your house? Stay knowledgeable about this matter and hold protecting your property and your loved ones. Verify your native hardware or dwelling enchancment store to see if they promote alarm monitoring company signs. Quite often, you could find one that you just put in your yard. Even in case you don’t even have a house alarm system, only a signal saying you do deters would-be burglars from focusing on your property.
If you’re in search of an excellent place to cover a spare key, think about taping one to the inside of your dog’s collar. This is significantly useful when you have a large canine that isn’t very pleasant with strangers. You will have a spare key shut , and you won’t have to fret about anybody gaining access to it. When you’ve got a door in your garage that results in the within of your own home, just remember to maintain your storage door down when nobody is on the market. Having an open door gives a burglar a place to enter, which means you and your family may be at risk.
The most effective methods to keep your own home protected is to get to know your neighbors. This is a pretty cheap way to provide light and safety to your property.
You want to inquire about whether you can buy or lease the house security equipment. Buying equipment could be dear upfront, but it surely’s a single price versus a month-to-month cost. Leasing could seem cheaper however may require contractual agreements and charges. Evaluate each avenues to see which one is best suited to your needs. Now that you’ve got learn the information that have been discussed right here, it is best to really feel higher about transferring forward with home security. It is a very important resolution, and you could remember the recommendation you’ve learn. You want to be certain that you’ve offered your loved ones with a system and service that may help maintain everyone safe.
Ensure that your house has high quality locks on all of the windows and the doors. Home windows must have locks to keep burglars out, and they should have burglar-proof glass. Your doorways ought to both be manufactured from metal or solid wooden. They should have heavy-obligation, strengthened strike plates. The best locks to have for them are both knob-in-lock units with lifeless latches or deadbolts.
If you are happening trip, don’t cancel the delivery of your mail or your newspaper. While you do this, you by no means know who could stumble across the data that you are going to be away from dwelling. Instead, ask a friend or a family member to help you out. Refrain from using candles in your house until it is completely necessary. In case you do burn a candle, just remember to blow it out when you are completed. It is important that no burning flame is left unattended because one slip can destroy your home and potential damage your family members.
It would not take long for a thief to steal thousands of dollars value of stuff.
Do not ever place your spare key beneath your mat or next you a plant field. Although you might assume that you simply’re giving yourself one thing you could use to get into your own home whenever you’ve misplaced your keys, you’re really inviting intruders inside your home. Intruders know in regards to the traditional hiding spots. Ask a friend, neighbor or relative to maintain your extra keys for you. Keep away from being shy. Discuss to your neighbors and those on your block. Hold your eye on their homes, and ask for assist to maintain yours safe too. Don’t ignore the gossip. You could possibly be taught necessary security information, reminiscent of if strangers have been lurking around the neighborhood.
In time period of strong recommendation, you have got simply read a considerable amount of it. How are you going to use it to your residence? Keep informed about this subject and hold defending your home and your family. Verify your local hardware or residence enchancment store to see if they promote alarm monitoring company signs. Very often, you will discover one that you put in your yard. Even if you don’t even have a house alarm system, only a signal saying you do deters would-be burglars from concentrating on your property.
Movement sensitive lighting could be supplied by your security company. Most corporations offer this option which detects within a given distance of your house and alerts you that someone is approaching. This may make an intruder hesitant to break in, and it’ll offer you extra security everytime you arrive residence late at night time. When trying to find a home safety agency to imagine accountability for monitoring your property, make some extent to solicit recommendations from others in your neighborhood. Ask about previous experiences and response occasions in emergency situations. In this means, it is possible for you to to determine whether a potential company is value looking into additional.
Canines make an important safety system. They are protecting of their residence and proprietor and will alert you if someone is in your property. It would not even should be a big powerful canine. Small dogs are noisy and unpredictable and superb at deterring burglars. You probably have a house alarm system, ensure all of the wires are hid. If a burglar needs to break into your property, he may minimize any wires he sees earlier than following through along with his plan. Depending on the place the wires are, conceal them with crops, rocks or other natural trying items.
These will only open if one in every of your loved ones members is there, making certain that nobody can break in because of a key they’ve discovered, selecting the lock or foiling a lesser grade lock.
If you’re occurring vacation, do not change your answering machine telling everyone that you’re going to be away. Burglars will call this quantity and see that it’s open season on your home. Maintain your common message and advise family and friends members to name your cellular phone when you’re away. Get a family canine to assist guard the home when you are away. Canine not only signify that somebody in the house could also be dwelling, but also can put concern within the eyes of potential intruders. Don’t set up doggy doors, as intruders can use these to get into your house.
Make certain your home has high quality locks on all of the windows and the doorways. Home windows should have locks to keep burglars out, and they need to have burglar-proof glass. Your doors ought to either be manufactured from metallic or stable wood. They should have heavy-responsibility, bolstered strike plates. One of the best locks to have for them are both knob-in-lock sets with dead latches or deadbolts.
Don’t ever place your spare key underneath your mat or next you a plant box. Though you may assume that you simply’re giving your self one thing you may use to get into your own home whenever you’ve misplaced your keys, you are truly inviting intruders inside your house. Intruders know in regards to the usual hiding spots. Ask a pal, neighbor or relative to maintain your further keys for you. Keep away from being shy. Talk to your neighbors and those in your block. Maintain your eye on their houses, and ask for help to maintain yours protected too. Don’t ignore the gossip. You may learn necessary security info, such as if strangers have been lurking across the neighborhood.
You can be fined and charged as a result of your safety system labored.
With all the new expertise nowadays, you may ditch your outdated set of house keys. The latest in residence safety now lets you have the choice of key-much less entry into your home. A particular gadget reads predetermined fingerprints programmed by you, and the door will solely open with there’s a match. Before letting a house safety consultant inside, ask for identification. Many thieves use this tactic to enter a house. This could possibly be quite dangerous. Act cautiously to keep away from potential dangers.
Ask your alarm system if they supply separate entry codes for cleaning individuals or upkeep males. In the event that they do, reap the benefits of this characteristic. In many cases, you can arm the system to permit entry with that code solely at particular instances of day. This may help forestall potential thieves from coming into your house during the night hours or at other occasions after they know you may not be at house.
In case you have put in a wi-fi DIY house safety system, you possibly can set it to call you or as much as 10 other individuals in case of a break-in. Nevertheless, you can not set 911 as one of many numbers to name, and there is no police backup. The system is bought extra by apartment dwellers than house homeowners. If it’s essential make the surface of your property secure, you can obtain this comparatively inexpensively by installing lights with movement detectors. This can be a fairly cheap means to offer gentle and security to your property. When positioned appropriately, no one will be capable of break in unannounced.
The safety of your property relies on your actions exterior the house as properly. Don’t go away your garage door opener in plain view inside your car. Password defend your mobile phone and computers that you use outdoors the home as nicely. By no means maintain vital paperwork inside your automobile the place a thief can find out where you live and determine if you end up at dwelling and when you’re away.
It could possibly seem troublesome thinking about wireless options vs wired options and extra. Use what you might have discovered so that you simply’re prepared and ready to go.
Faux you are a burglar. By taking on the function of an intruder, you’ll be able to check for vulnerable areas around your property. Really suppose arduous about methods you’ll get into your house when you had been a felony. Test the storage in addition to sheds or other places you keep invaluable possessions. Dwelling security is a vital matter for any homeowner, however is also one that too many people fail to study with any sense of urgency. With a purpose to ensure the security of your private home, is helpful to spend some time learning about what is available to assist hold issues secure. Continue studying to realize a deeper understanding.
In the event you’ve recently purchased a house, make sure you change the locks and alarm go codes. Many individuals simply take these items as is and don’t give them another thought, but take into account that just about anyone could have a duplicate of the important thing or the go code. That can embody neighbors who you don’t actually know. Be protected and alter out both whenever you buy. It’s essential to have your safety system checked annually. A safety skilled ought to visit to assist with the testing course of. There are a lot of issues that may scale back the quality of your system. Sometimes, you might need knowledgeable to find the issue.
Use exterior lights that have motion sensors. They’ll flip on when individuals walk inside a certain distance of your house. You can be alerted to motion, however most importantly, it’ll deter burglars or no less than make you aware of their presence. Do not forget that the bulbs should be changed in order that the lights keep working. Maintain a flashlight with good batteries in each room of your private home, simply in case you lose power. Power outages are widespread to all kinds of emergency situations, so having flashlights handy will enable you to maneuver in the dark. This could come in handy if somebody has minimize your power and is attempting to interrupt in.
Get a household dog to assist guard the house if you find yourself away.
With the entire new technology nowadays, you may ditch your outdated set of house keys. The latest in dwelling safety now means that you can have the option of key-much less entry into your home. A particular system reads predetermined fingerprints programmed by you, and the door will solely open with there’s a match. Before letting a house safety representative inside, ask for identification. Many thieves use this tactic to enter a home. This might be quite dangerous. Act cautiously to keep away from potential risks.
If you wish to have a dog at residence to deter burglars, do not invest in a guard canines. These canines are educated to do their job and will not be intended to be loving pets. As a substitute, pick up a dog at your local shelter, get him obedience training and give him all the love you’ll be able to. Contemplate hiding a spare key in your dog. If you have canine who have free entry to the outdoors, try taping a key securely to the within of one among their collars. This can make your key accessible should you lock yourself out, whereas keeping your home secure. If in case you have a number of dogs, choose the canine who’s least pleasant with strangers.
Earlier than you fall asleep, lock your windows on the primary floor of your house. An unlocked window invitations undesirable visitors. Even in case you suppose you reside in a protected neighborhood, thieves know no boundaries. You should not assume that your open window will go unnoticed. Hold those windows locked so your house is not going to be a simple target. Don’t use price as the main factor in choosing an organization to offer security for your residence. Whereas it is always nice to search out something that is not very costly, this could have numerous drawbacks. Cheaper safety corporations are infamous for offering lower than attentive service, which means your home may be in danger.
Guantee that none of these block the home windows and doorways of your property. Burglars usually tend to burglarize properties that look like they’ve a variety of places for them to hide from nosy neighbors.
Have you ever taken a look at your options regarding residence safety programs? It’s very important that you already know what you are facing so that you just make a great determination. As a matter of truth, good shouldn’t be the best, so you want to have the ability to make the very best decision. Maintain reading to learn more about your private home security options. Now you already know your choices, and you can better make a decision concerning home security. Should you use the information and methods which have been given to you, then you’ll be nicely in your strategy to enjoying peace of mind. Put the safety of your family first.
The concept of dwelling safety sounds appealing to many people, however unfortunately, many haven’t adopted the idea. The primary barrier of entry for house safety is the value. Some can’t afford the installation charges and month-to-month costs wanted to use a house safety system. Luckily, you’ll find cheaper residence security alternate options on this article. Dwelling security methods provide different triggering options apart from having an alarm sound. Most methods can be set to sound an alert when anybody enters the house. This is helpful for folks who’ve small youngsters, because it helps maintain them from leaving the house.
Whether you’ve got simply purchased a home, constructed a house, or have been in your house for quite some time, you have thought about house safety. Have you taken any motion? It’s time to read about house security programs as a way to make the precise determination for you and your family. Do not base your private home safety resolution solely on price. While some systems are cheaper, they might not supply the extent of protection that your property wants. If your house has loads of windows, for instance, you want to make sure all of those home windows are armed with an alarm. Make sure that your security wants are truly being met earlier than deciding on your system.
Preserve the outside areas in your own home so they are properly lit.
The security of your private home relies on your actions exterior the house as well. Do not leave your storage door opener in plain view inside your automobile. Password protect your cellphone and computers that you just use exterior the home as effectively. Never maintain vital documents inside your automotive the place a thief can find out where you reside and determine if you find yourself at home and when you are away.
It is time to get a greater take a look at home security techniques. You need to make certain that you’re conscious of what it’s a must to choose from. What are you aware about residence security? Continue reading to search out out more about your choices so that you can decide what is finest. Make certain that your own home is always occupied. Buy timers for electronics, lights, radios and TVs so that they will activate and off at different intervals. This way, your house will at all times look occupied. This may hold individuals from breaking in.
Examine the street address at the end of your block to guantee that it is noticeable in the occasion of an emergency. In case you see that it looks illegible, name your town middle to see if you can get a new sign in your street. That is essential as firefighters or police vehicles will need to get to your house immediately in an emergency. When you have got little children, there’s all the time a concern that they will one way or the other get lost from the home. If you do not need to put money into an entire home security system, you can buy inexpensive single alarms. You possibly can place these alarms on doors and windows, and they’re going to go off if one of the children opens them.
Stroll exterior of your private home at night and see what is visible by way of your home windows. If you have a transparent view of your valuables, particularly easily stolen electronics, then so do potential thieves.
You have got worked hard to create your property into a haven. However, this can spoiled while you experience a house break-in. If this thought worries you, it is best to do one thing about it. This text will talk about actions that you can take to guard your own home and your loved ones from undesirable house invaders. Set up a peep hole so to see who’s at your door earlier than you open it. Criminals will knock at a door in order that they will push past you while you open it. You must never open a door without understanding the individual that is on the other facet of it.
By no means reveal any personal information to someone who is at the door or calling your own home that you just have no idea. Make sure that your youngsters observe the identical coverage as nicely, as this will lead to the flawed people getting personal info. This can make it harder for someone to find and rob your home. Plant a sign that daunts individuals from soliciting near your home. This will forestall folks from coming to your door that you just do not know. When you have this sign posted and there is somebody who desires to rob your house, they may really feel uncomfortable coming up to your door as it is going to look suspicious.
Don’t ever place your spare key beneath your mat or next you a plant box. Although you would possibly think that you just’re giving yourself one thing you might use to get into your home whenever you’ve misplaced your keys, you’re truly inviting intruders inside your home. Intruders know about the standard hiding spots. Ask a friend, neighbor or relative to maintain your additional keys for you. Keep away from being shy. Speak to your neighbors and people on your block. Preserve your eye on their homes, and ask for assist to maintain yours secure too. Do not ignore the gossip. You could study essential security data, reminiscent of if strangers have been lurking around the neighborhood.
Don’t go away notes in your door for relations or people that are coming to service your house. You may suppose nothing of it, however it is letting everybody know that nobody is inside. It is a good idea to give individuals a call forward of time and give them instructions. Program your lights to activate and off at random intervals with a timer. This makes it simpler for you as you won’t should flip the change, nevertheless it additionally ensures the lights proceed to go on and off, even in case you’re not at home for a protracted period of time.
Before letting a home safety consultant inside, ask for identification.
To make it hard for anyone to get into your private home undesirable, make your exterior doors ready. Each single considered one of them should have a good one-inch deadbolt installed as a minimum. This gadget makes the door significantly harder to break into than a simple knob-lock, providing you with more time to call police or probably just convincing an intruder to surrender and depart. It is very important activate your security system when you’ll be away or at evening. When you ought to fall asleep and neglect to set the system it’s useless. In case you are somebody who is commonly distracted or has an issue remembering issues, add activating your system to your guidelines of necessary things to recollect.
Make sure to decide on an alarm company that gives monitoring. An alarm that simply buzzes if an intruder tries to enter is statistically proven to be mostly ineffective. Once you add the extra monitoring nonetheless, you’ve gotten a direct hyperlink to somebody who can call the police and get you assist. There could also be an extra charge for a monitored alarm, but it’s well worth the cost.
Watch what you say on social media. Within the period of constant Twitter and Facebook updates, it’s straightforward to turn out to be too lax on what you share. Regardless of how excited you might be about your upcoming vacation, social media is not the place to broadcast your trip. It’s too easy for somebody who is just not a friend to learn of your plans, permitting them to interrupt in when they know you are away.
Irons, stoves and toasters ought to all be unplugged, as electricity can move at a really high charge if left plugged in. This may stop a hearth or electrocution in your house.
To make it onerous for anyone to get into your private home unwanted, make your exterior doors ready. Every single considered one of them should have a great one-inch deadbolt put in at the least. This device makes the door considerably harder to break into than a easy knob-lock, supplying you with more time to name police or presumably simply convincing an intruder to surrender and depart. It is important to activate your safety system when you will be away or at night. If you ought to fall asleep and overlook to set the system it is useless. If you’re someone who is often distracted or has a problem remembering things, add activating your system to your guidelines of vital things to remember.
Installing an alarm system in your house can vastly improve security. Potential burglars may be scared off by seeing that your private home has an alarm system. If a break-in does occur, a loud audible alert will usually send the intruder running, and the alarm system will rapidly and effortlessly alert authorities to the scenario. Ensure to rent a house safety firm with a very good status in your community. Verify references with your mates and neighbors, in addition to institutions just like the Higher Business Bureau. Discovering an organization with a great repute is essential because you need to ensure your company will stand behind their security plan and promises.
The supplies of your property needs to be hearth resistant. Your property will get added protection, particularly in case your setting is dry and has power traces. Stopping hearth hazards is a key precaution to take since the damage it causes could be appreciable. Be cautious of salespeople that come to your door. Make sure to ask for their credentials if they ask to come back into your own home. Ask them to slide their identification under your door. There are lots of skilled burglars that may use this tactic for checking out a house. If You are feeling uncertain about them, Strive checking with their workplace before allowing them in.
The primary thing you have to do when you’re transferring into a brand new place is have the locks changed. Even if the tenants turned their keys in, they might have made copies. Discover a reliable locksmith who can replace the locks or do it your self. In case you are a smoker, put out your cigarette in a cup of water to stop a fire hazard. This ought to be done earlier than you put it in the trash, as you run the chance of the bud not burning out while you rub it in your ashtray. Smoke exterior to cut back all risk of a fire occurring in your home.
This makes it much much less probably that your system will likely be compromised.
Secure your storage. Intruders may easily break into your garage and access your home. A C clamp helps for storage doors on a observe. The clamp truly keeps the door closed if tightened near the observe curler. Examine the batteries of your smoke detector every week to find out if they’re working low. In case your smoke detector will not be on, it will not choose up the smoke of the fire, which can lead to a disaster. Use quality batteries that final a really very long time in your smoke and carbon monoxide detectors.
You should never use your birthday because the password in your numeric keypad. Personal data, such as a birthday may be acquired on the Web. If you happen to use this as your password, chances are you’ll make it easy for a burglar to rob you. Suppose instead of a more artistic solution to keep monitor of your code. When going on vacation, depart your automobile in your driveway. If this is not attainable, ask your neighbor if she or he will park in your driveway. If intruders see a automobile in the driveway, they are going to assume somebody is house. This implies they will avoid breaking into your home.
Find out how lengthy an organization has been in operation earlier than signing a house security contract. Companies in business for many years engender nice confidence and belief. You will have much more confidence in your choice should you persist with a company that has a confirmed track document. Do you’ve sliding patio door in your home? In the event you do, make sure that you will have taken steps to make them more secure. One cheap approach you are able to do this is to buy a closet rod and lower it to suit tightly into the track behind the door which slides open and shut.
Crooks will almost by no means go from outlet to outlet on the lookout for valuables. Ask them to identify themselves, or test via a window, peephole or perhaps a video system. | 2019-04-21T18:20:57Z | http://www.homedesignorlando.tk/category/security-system/page/3 |
A M Martínez-Sala, J Monserrat-Gauchi, C Campillo Alhama (2017): “The relational paradigm in the strategies used by destination marketing organizations”. Revista Latina de Comunicación Social, 72, pp. 374 to 396.
Introduction and objectives. This articles presents the results of a study on the degree of interactivity of the official tourism websites of the main Spanish sun and beach destinations, given their importance in achieving a two-way communication. The study also evaluates key aspects related to social media and the social web, which are also necessary to achieve two-way communication and establish relationships with the public. Methods. The study is based on content and functional analysis of a series of indicators that provide descriptive information about the status of the official tourism websites and a score that allows for a comparative analysis among them. Results and conclusions. The results show significant shortcomings in the field of interactivity, but also an important development regarding social media and social web tools. The article ends with the proposal of a series of good practices that are necessary to implement to improve the relational aspects of tourism websites, which are essential tools in tourism marketing and communication.
1. Introduction. 2. The relational and collaborative approach to marketing and communication strategies. 3. Social web and interactivity. 4. Hypotheses, objectives and methods. 5. Results. 5.1. Results on interactivity. 5.2. Results on the social web and presence in social media. 6. Discussion and conclusions. 7. References.
One of the factors that has determined the evolution of tourism is the emergence of new media (Bonilla, 2013). Information and communication technologies [ICT] are increasingly used by people to plan trips and choose destinations due mainly to the large volume of information and opinions that are published on the Internet by other tourists (Prat, 2012: 240).
The Internet has become an indispensable tool in the planning and development of travelling, as well as one of the main channels for the marketing of a destination (Caro, Luque & Zayas, 2015). The Internet and online marketing and communication channels are evolving quickly and appropriately, and are identifying very quickly the needs of the tourist 2.0 and of tourism 2.0 (Domínguez Vila & Araújo Vila, 2014). The tourist 2.0 refers to an informed and participatory traveller who no longer makes his travelling-related decisions based exclusively on the advice given by a travel agency (Suau Jiménez, 2012: 144). Instead, the new tourist takes into account all the information he collects from the Internet. It is precisely the need for information which has made websites a key instrument for the communication of tourism destinations (Fernández Cavia, Díaz-Luque, Huertas, Rovira, Pedraza-Jiménez, Sicily, Gómez & Míguez, 2013; Fernández-Cavia & Huertas-Roig, 2009; Díaz-Luque, 2009). Hallet & Kaplan-Weinger (2010), Lee & Gretzel (2012), Luna-Nevarez & Hyman (2012) and Morrison (2013) consider tourism websites as the main tool in destination selection and trip planning.
In addition, in accordance with the new roles of the consumer as content producer and prescriber of products and services, recommendation systems, and the opinions and experiences of other travellers, etc., websites are, together with information, the determining elements when selecting a tourism destination, planning the trip itself and its components (Caro et al., 2015). Along this line, Huertas Roig (2008) points out that the information that comes from the experience of other travellers exerts a great influence on the decisions of other users.
The current consumer, which has been renamed adprosumer (Caro et al., 2015), like the tourist 2.0, requires two-way communication channels to receive information and interact. For this reason, the tourist 2.0 prefers to learn from wikis, forums, blogs, etc. (Schmallegger & Carson, 2008). The exchange of information and experience generates a high degree of satisfaction in users. This is the main reason for the use of these spaces (Chung & Buhalis, 2008) and the basis of their success as a promotion and marketing channel. Two-way communication channels enable organisations to establish links with users and to obtain feedback from users, and according to authors like Wright, this is the smartest decision organisations can take (2006: 4).
Along with the success and the massive use of the Internet and more specifically of the social web or Web 2.0, this channel has a lower influence in the selection of the destination and the vacation package in comparison to other tourist products and services such as accommodation and transport (Google Travel Spain, Institute for Tourism Studies, Exceltur, Allianz, the Tourism Department of the Spanish Ministry of Industry, Energy and Tourism & AddedValue, 2013). This reality has inspired this research study, which focuses on the implementation of the features and relational tools by official tourism websites. Their evaluation is based on an analytical model focused on measuring the interactivity and social function of the websites, as well as the presence of tourism destinations on social media. The objective is to determine whether the websites respond to the expectations of the tourist 2.0 and thus effectively fulfil their role as the main promotion and marketing channel.
In 2004, Philip Kotler argued that transactional marketing had evolved into relational marketing, in which the main purpose is to establish relations with consumers to retain them, and finally into collaborative marketing, which is based on a new individual that, through relations, helps the organisation to create value and to attract new consumers (Serrano Cobos, 2006).
Pérez & Massoni (2009) also allude to the need to reorient the approach to the relations of the organisation with their audiences in his New Strategic Theory (NST). The paradigm of the NST displaces the interest from the economic sphere to the complexity of the public and the individual, focusing on relations and the relational human being.
Technological development has been instrumental in the evolution of the consumer towards a new figure known as prosumer (Toffler, 1980) or adprosumer (Caro et al., 2015), who uses the Internet and digital channels to interact with mass audiences, apparently, out of the control of the organisation. Organisations also use them to interact with their consumers and that is why relational and collaborative marketing are closely related with marketing 2.0 (Gálvez Clavijo, 2010: 18).
Marketing 2.0 also advocates for a focus on individuals and on the dialogue between organisations and consumers, which requires a change in the traditional orientation of this discipline from the organisation towards consumers, who constitute a market consisting of conversations (Levine, Locke, Sears & Weinberger, 2008), connected spaces where customers become agents and collaborative, participatory and interactive social media (Cortés, 2009). As a result, organisations must provide them with the necessary channels so that they can participate and interact with their brands, products and services, thus promoting personalised relations that generate engagement (Campillo Alhama, Ramos Soler & Castelló Martínez, 2010).
The relational approach implies a new way to conceive and implement marketing and communication strategies. They must answer to an individual who, thanks to the massive implementation of the Internet and mobile devices (Asociación para la Investigación de Medios de Comunicación, 2015; Google Travel Spain et al., 2013), which can access universal content freely, from anywhere and at any time, and can even generate content. The development of ICT and relation, information and communication technologies [RICT] (Marfil-Carmona, Hergueta Covacho & Villalonga Gómez, 2015), and the consequent expectations of users, derive on the need of developing formats and models that are adapted to the new communication and consumption environments, which includes the object of study: the website. This channel, together with other representatives of the web 2.0, offer organisations many opportunities to interact with their consumers and achieve conversion, loyalty and recommendation thanks to the conversations they can establish (Castelló Martínez, Del Pino & Ramos Soler, 2014: 24).
In the field of tourism websites, in the heyday of the marketing 2.0, new marketing variables begin to be integrated: e-market research, online channels that allow the constant analysis of the audience and their behaviour; e-attention, web pages incorporate links and spaces in which users are served in relation to consultations; e-public relations, both through the web and newsletter that disseminate information that contributes to the creation and maintenance of the image of the tourist destination; and relational e-marketing or social media marketing, in relation to the creation of spaces on the web that promote the interaction of users: online chats, forums, etc., as well as social media, such as blogs, Facebook, Twitter, etc. (Martínez González, 2011).
The relational approach to the marketing and communication strategies of destination marketing organisations [DMO] is only possible through the implementation of channels and tools that enable organisations to interact and converse with their audiences, and allow the members of the audience to interact among them. The analytical model therefore focuses on the integration of some of the aforementioned marketing 2.0 variables: e-attention, e-public relations, and e-marketing. All of these variables depend on the interactivity and social functions of the websites and are key to fostering relations with the public.
The terms prosumer (Toffler, 1980) and adprosumer (Caro et al., 2015) allude to an individual who not only receives the information generated by the organisation, but also filters and assimilates information and then disseminates it again after he has reinterpreted it based on his own experiences and knowledge (Prahalad & Ramaswamy, 2000).
Interactivity and two-way communication are characteristic features of the social web, a space where information is not only provided, but also shared, complemented with hyperlinks to other websites, with comments from users, etc., generating content in a decentralised way (Caro et al., 2015).
Cho & Cheon (2005) break down the concept of interactivity of the websites into three levels of interaction: user-message, user-manager and user-user. This research focuses on user-manager and user-user interaction, since they are the less developed levels in the official tourism websites (Míguez-González & Fernández-Cavia, 2015; Huertas, Rovira & Fernández-Cavia, 2011). The study also takes into account the third level of interaction (user-user), due to the influence of the opinions of users in the evaluation of products, services and organisations by other users, and on their loyalty (Gruen, Osmonbekov & Czaplewski, 2005). This reality acquires special importance in sectors such as tourism, in which a large number of products and services refer to experiences and emotions (Senecal & Nantal, 2004; Buhalis, 2003). The current tourist wants to buy more of an experience than a product or service and the experiences of other users help him to plan and imagine his own (Camarero Rioja, 2002; Senecal & Nantal, 2004) and influence his final decision by bringing an element of objectivity that is used to contrast commercial information (Ricci & Wietsma, 2006).
The World Tourism Organisation & the European Travel Commission (2008) argue that interactivity is one of the most important aspects when it comes to developing and maintaining a quality tourism website. In this regard, authors such as Díaz-Luque, Guevara & Anton (2006), Huertas Roig & Fernández-Cavia (2006), Huertas Roig (2008), Huertas et al. (2011), Luna-Nevarez & Hyman (2012), Fernández-Cavia, Vinyals Mirabent & López Pérez (2013) and Fernández-Cavia et al. (2013), include interactivity as an indicator of the quality of the official websites of tourism destinations, concluding that those that encourage it have an increased chance of success.
Interactivity is measurable and gradual (Steuer, 1992) and, therefore, digital channels can be evaluated depending on their level of interactivity, and hence their quality.
Despite their relevance, the studies carried out to date have detected a limited implementation of interactive resources at the user-manager and user-user levels in the official tourism websites. Huertas Roig & Fernández-Cavia (2006) and Díaz-Luque et al. (2006) have showed that the interactive resources at both levels were virtually non-existent. Years later, and despite the technological development, Huertas Roig (2008) and Huertas et al. (2011) also confirmed the almost total absence of tools for communication between users, and recommended the use of tools such as online chatrooms, contact sections, among others, to enhance users’ interaction with website managers (Huertas et al., 2011). Luna-Nevarez & Hyman (2012), Fernández Cavia, Vinyals Mirabent et al. (2013) and Fernández-Cavia et al. (2014) conclude that interactivity is one of the areas that requires further development. The last two cited research works also show that the relational aspects of the websites, interactivity, social web and mobile communication, obtained the worst results, with the exception of the social web. This parameter is well valued because websites often provide the necessary mechanisms to users to share content on social networks and similar websites (Fernández Cavia, Vinyals Mirabent et al., 2013). However, and although most of the destinations are present in the major social networks, virtually none of their websites integrates these social networks within their structure as it is advised (Fernández-Cavia et al., 2013; Fernández Cavia, Vinyals Mirabent et al. 2013; Blackshaw & Nazzaro, 2004; Caro et al., 2015).
Míguez-González & Fernández-Cavia (2015) also carried out a research study in the field of interactivity and the social web and their results are not much different from those achieved in previous research.
The limited implementation of resources and tools that facilitate the participation of the user is due to the fact that their results on sales are mid-long term (Domínguez Vila & Araujo Vila, 2014), the fear of comments, as well as the lack of staff to respond properly (Chamorro Martín, 2006). However, the greater the participation of the user, the greater their loyalty and identification with the organisation and the more information that will be available.
In the context of relationship marketing and based on the online reality, the objective of this research, as mentioned, is to analyse the capacity of the main Spanish sun and beach tourism destinations to manage relationships with their public through their official websites and social media. This analysis will be used to determine whether, as Martínez González (2011) points out, DMO have adapted themselves to the requirements of today’s users and consumers.
The strong dynamism that characterises the online environment requires a constant review of websites through the use of analytical models that are updated based on the new roles of users and technological developments. Based on this reality we have formulated the main research hypothesis of this research study: official tourism websites incorporate tools and spaces that enhance user-manager as well as user-user interaction. The second hypothesis is that tourism destinations include in their official websites the tools and functions that are characteristic of the social web and are present in the main social media.
O1. Measure the degree of interactivity of websites at the user-manager and user-user levels.
O2. Assess the implementation of the tools and functionality of the social web.
O3. Identify the social media in which the tourist destinations are present.
The research is based on an empirical and analytical method and on the review of literature on the role of the Internet in the tourism sector, on the relational and collaborative trends in public and private organisations, and on web interactivity and the social web. An exploratory analysis is performed based on the case study of the official tourism websites of the Spanish sun and beach destinations, due to their relevance in the Spanish tourism industry. Data collection is based on observation, the use of websites, and the monitoring of the communications established as user with the websites’ managers. The period of analysis covers from 1 January to 29 February, 2016.
The sample is formed of the Spanish sun and beach destinations with the heaviest national and international tourism traffic. Catalonia, Canary Islands, Balearic Islands, Andalusia and Valencia are the autonomous communities that receive the largest volume of international tourism traffic (Instituto de Estudios Turísticos, Instituto de Turismo de España [Turespaña] & Ministerio de Industria, Energía y Turismo, 2014a). Andalusia, Catalonia and Valencia, in that order, lead the ranking of national tourism destinations. Canary Islands and the Balearic Islands are not in the top five destinations but received 4% and 2%, respectively, of the resident tourists (Instituto de Estudios Turísticos, Turespaña & Ministerio de Industria, Energía y Turismo, 2014b).
The final sample includes 20 different regional websites: 5 corresponding to autonomous communities and 15 to provinces and islands, as in the case of the Canary Islands. The latter types of websites have been included in order to work with a representative and convenience sample. The selection was based on the following criteria: they had to be official websites of Spanish sun and beach tourism destinations (autonomous communities and provinces/islands) that target the final tourist and offer full access and navigation (Table 1).
The analytical model proposed here (tables 2 and 3) updates the models proposed by Díaz-Luque et al. (2006), Huertas Roig (2008), Huertas et al. (2011), Fernández-Cavia, Vinyals Mirabent et al. (2013), Fernández-Cavia et al. (2013), Fernández-Cavia, Rovira, Díaz-Luque and Cavaller (2014), and Míguez-González and Fernández-Cavia (2015) with new indicators and based on the relational approach demanded by the current marketing and communication strategies. This review is required by the constant evolution that characterises the online environment.
The analysis of interactivity brings together a total of 12 indicators, distributed into two levels of interaction: user-manager and user-user (Table 2).
Internal channel for tourism-related consultations from users.
1: Yes, but they are not personalised, detailed and delivered quickly.
2: Yes, they are delivered quickly and personalised way.
Necessary data so that users can contact the web managers through other online (email) and offline (phone, mail, etc.) channels.
1: Yes, but they are inoperative or incomplete (links). They provide data of related organisms, but not of the web’s managers.
Evaluation mechanisms: surveys, forms, voting systems etc.
Periodic dissemination of subscription-based customised newsletters.
1: Yes, but it is not customised to subscribers’ language or interests.
1: Yes, but comments have to be reviewed by web managers before their publication.
1: Yes, but it is not operational or does not take advantage of the interaction with managers (customisation) or other users.
External users’ club or community accessible from the website (users’ blogs, etc.) and managed by DMO.
Spaces and tools for user-user interaction with respect to comments on content published by the DMO.
1: Yes, but contents have to be reviewed by web managers before their publication.
Spaces and tools for user-user interaction with respect to comments on contents published by users on website.
The websites’ use of tools and functions of the social web and their presence in social media is evaluated by means of 9 indicators (Table 3).
1: Yes, but it has limitations (to subscribe, channel, topic etc.) or is not operational.
0: No/Yes, but is not for tourists.
1: Yes, there are sections with blog format / Yes, but it is not operational.
Presence in microblogging networks, like Twitter.
1: Yes, but it is not integrated in the website.
Presence in specialised recommendation-based social networks, like TripAdvisor and Minube.
Presence in image-based social networks like Instagram, Flickr, Pinterest.
Presence in video-based social networks like YouTube and Vimeo.
Integration of contents published on social networks and social media.
Tools for sharing the website’s contents on social networks/social media.
Source: authors’ own creation based on Fernández-Cavia, Vinyals Mirabent et al. (2013); Fernández-Cavia et al. (2013); Fernández-Cavia et al. (2014) and Míguez-González & Fernández-Cavia (2015).
The indicators are evaluated through content and functional analysis. To this end, first, the indicators are subjected to a systematic and objective textual and visual observation. After the indicators are identified, their functionality is measured through real tests from the point of view of the expectations of the tourist 2.0. The interactivity and functionality of the social web are not manifest elements that can be assessed through content analysis, hence the need to evaluate them based on their use. This entails registering in the website as a user and observing what the website requires, what it provides; making queries, and evaluating the answers; testing the operativity of the links, posting comments, replying to other comments, etc.
In general terms, with regards to the functionality of the tourism websites in the field of interactivity and the social web, tourists require two-way communication channels to learn, share experiences and engage in defined and specific conditions (Tables 2 and 3).
The results of the content and functional analysis were subsequently quantified with the following scale: 0-2, unlike some of the aforementioned models (Fernández-Cavia, Vinyals Mirabent et al., 2013; Fernández-Cavia et al., 2013). However, in line with the aforementioned authors, the use of a binary scale was ruled out since some indicators may occur partially, not in optimal conditions (Tables 2 and 3).
The level of depth of analysis depends on each indicator and each website and has required the analysis of several levels, from the level 0 or home to the 5th, 6th or 7th level.
Based on the proposed model and the resulting average scores we established an index of interactivity, ranging from 0 to 2 points, where 2 indicates an optimal level of interactivity. Similarly, the presence in social media and the use of the tools and functions of the social web is measured with a 0-2 scale, where 2 is the maximum value. The average of both indices determines the relational capacity of the website based on the same scale (0-2). This scale describes the extent to what the websites satisfy the expectations of tourists 2.0 and thus provide two-way communication channels between the websites’ managers and users (Suau Jiménez, 2012) and allows us to collect useful information to make recommendations (Caro et al., 2015).
Globally, the websites of the autonomous communities of Spain offer better results. Although some of the websites promoting provinces, such as Barcelona, or islands, like Tenerife and Lanzarote, obtained surprisingly high scores (Table 4).
Despite the importance of interactivity, the results show a limited evolution in relation to previous research studies. Most websites fail in the implementation of the tools and functionality needed to establish a two-way communication channel between the website’s managers and users, and among users.
With regards to the level of user-manager interactivity (Table 5) the average (1) is exceed only in the presentation of data about the managers of the websites and the built-in channel to contact the websites’ managers. Some websites even limit the range of issues about which users can make questions. Catalonia, for example, only allows users to request publications and for other types of queries it redirects users to the website of the Catalan Agency for Tourism. Another common practice is the integration in the website of a channel to perform queries. Instead, websites rely on external tools such as Outlook Express email service, which limits the interaction abilities of users, who usually opt for platforms like gmail.com and hotmail.com. This occurs on the websites of the Canary Islands and Alicante. Andalusia only lists tourism information offices as well as other tourist agencies next to a search engine to locate them.
With regards to the analysis and monitoring of the queries, the study confirmed that most websites respond quickly and that the responses are personalised although, in general, the information they provide is partial. For their evaluation, we made a query about locations and conditions for water sports. And although the websites of most destinations answer questions about their locations, few of them provide information about the conditions.
Another type of frequent response is given by the websites of destinations such as Valencia, Alicante and Gran Canaria, which only provide data on specialised companies and ask users to contact these companies to solve their doubts. Finally, Catalonia, Barcelona, Tarragona, Valencia, Almeria and Huelva do not answer users’ questions.
The indicators in which the websites obtained the lowest scores, in general terms in the user-manager level, are those relating to the comments on their textual and audiovisual contents, their rating by users, and the dissemination of the newsletter. Finally, none of the websites incorporates an online chat room.
By regional typology, the results are similar between the regional websites, which reached an average rating of 0.74, and the provincial/island websites, which reached an average rating of 0.72. However, there are differences with respect to indicators such as the newsletter and the ability to comment, and rate content, which performed better among the regional websites.
Average for websites of autonomous communities.
When it comes to user-user interactivity (Table 6), there is a difference between the two types of websites under analysis. The websites of autonomous communities achieved a score of 1.08 while the provincial/island websites reached a rating of 0.32. The high score obtained by the websites of the autonomous communities is primarily due to the fact that the websites of Valencia and Andalusia achieved the maximum score. The rest of the websites reached different results. Canary Islands and Catalonia, with a score of 1 and 0.4, respectively, reached an above-average score in the field of user-manager interactivity, but the website of the Balearic Islands, which does not offer any of the tools considered at this level, affected the average global score for the field of interactivity.
Among the websites of the autonomous communities we can highlight the creation of users’ clubs or communities that are made accessible from the website, mainly blogs, and to a lesser extent built in the website. Only the Valencia Community, Andalusia and the Canary Islands have created an authentic user community that, after registration, allows users to publish their own content, and recommend, rate and comment the content posted on the website, by the operator or other users. Other websites that offer the user-registration option allow users to store information through applications such as Cuaderno de viaje (“Travel log”), in the case of Alicante; Mi Granada (“My Granada”), in the case of Granada, and Tu itinerario (“Your itinerary”), in the case of Malaga. However, this information cannot be published or shared, which makes it difficult to consider these websites as genuine communities. The worst scores were obtained with respect to the possibility given to users to comment on the contents published by other users and the contents created by the websites’ managers. Only Valencia and Andalusia provide the tools necessary to do so.
None of provincial/island websites exceeds the average score reached in the user-user interactivity indicators (1). The best rated indicators correspond to user clubs and communities accessible from the website, which obtained a score of 0.87 because the websites of Barcelona, Valencia, Alicante, Huelva, Tenerife and Lanzarote include hyperlinks to their respective blogs. In some cases, as in Tenerife, these clubs or communities are built into the website. In other cases, as in Lanzarote, the blog has been created in the free-to-use WordPress platform and is not associated with the domain of the website, contrary to the recommendations of Míguez-González and Fernández-Cavia (2015). In the rest of the indicators, the maximum average score is 0.33 and it corresponds to the least-used tools and features, as it occurs in the websites of the autonomous communities: the possibility to comment on the content and the comments of other users. In this area, the case of Almeria stands out as it reserves the right to publish users’ comments (a positive comment had not been published even three weeks after it had been posted).
In general terms, the results can be described as positive in this indicator. The average score (1.40) is higher than that obtained with regards to interactivity despite the latter is a feature that has been required since longer time ago. According to the regionality, the websites of the autonomous communities reached a higher score than the websites of the provinces/islands. The individual analysis indicates that only two websites do not reach the average score (1), precisely one from each category: Tarragona and the Balearic Islands. At the other end, the websites that obtained the highest scores are those of Barcelona and the Valencian Community, both with 1.78 (Table 4).
Presence in recommendation-based social networks like Facebook and Google+.
Presence in specialised recommendation-based sites like TripAdvisor.
Presence in image-based social networks, like Instagram and Pinterest.
The least used social media and tools are: RSS contents (25%), the inclusion of links to external recommendation-based social networks specialised in touristic products and services, such as TripAdvisor and Minube (35%), blogs (35%) and the website-integration of the contents generated on social networks (55%). The rest of the indicators obtained the maximum score, in most cases in over 90% of the websites. Recommendation-based social networks like Facebook and Google+ stand out as they are included in 100% of the analysed websites.
By regional typology, the websites of the autonomous communities have largely implemented this type of resource. All of these websites are present in external microblogging, recommendation-based, image-based and video-based social networks. However, some of the provinces are not yet present on essential social networks such as Twitter (Tarragona) and YouTube (Almería). Almeria, in particular, includes YouTube videos on its website, but does not have its own account on this platform. The most important social networks are Facebook (100%), Twitter and YouTube (95%), and Instagram (80%). The rest of the social networks are less important in the sample of websites. Pinterest is used by 50% of the websites, Google+ by 45%, and Flickr by 35%, while Vimeo is only used by Castellón.
Some destinations have yet to implement the option to share the contents of the website through social networks, as in the case of Tarragona and the Balearic Islands. There are also cases in which the resource is used partially: for example, the website of Lanzarote just allows users to share specific contents such as photographs.
Finally, with regards to the website’s integration of content generated on social networks, the situation is similar between the websites of the provinces/islands and the autonomous communities. Only 40% of the websites do not show the comments users post on their social network profiles. Catalonia, for example, does not integrate this type of content in its website (only on its blog) while Castellón’s website only shows the number of users and comments.
The low degree of interactivity detected with the analysis coincides with the results of previous research works, such as the one carried out by Huertas et al. (2011), which points out that while websites do encourage user-message interactivity, they do not encourage the other two interaction levels identified by Cho & Cheon (2005), despite these levels are a decisive factor in the visibility of the website and in achievement of the marketing and communication objectives of the tourism destinations. Despite the advantages offered by two-way communication (Chung & Buhalis, 2008) and the incorporation of the opinions and experiences of other users (Blackshaw & Nazzaro, 2004), the analysed websites have not improved their resources to enable users to interact with other users and the site managers. Broadly speaking, the analysed websites are not characterised by a high degree of interactivity in any of the analysed levels, which refutes the main hypothesis, except for the websites of Valencia and Andalusia, which do not achieve the maximum score but obtained 1.42 and 1.58 points, respectively.
Míguez-González and Fernández-Cavia (2015) also confirmed the limited interactivity at the user-user and user-manager levels. In the first level the authors allude to the need to generate spaces for users to publish their opinions, recommendations, etc., but also raise the possibility of replacing them with external social media to avoid unnecessary human and economic costs. The results confirm this trend, but we should also note the convenience of giving visibility to the contents published on these social media on the tourism websites. This is done by Gerona, Barcelona, The Valencian Community, Valencia, Alicante, Castellón, Andalusia, Granada, Malaga, Cadiz, Canary Islands and Lanzarote in specific sections known as “Social Room”, “Social Wall”, “Social Media Room”, or in the Home page. The integration of this type of content, which is updated with frequency, improves the credibility and acceptance of the website (Fernández-Cavia et al., 2013; Fernández Cavia, Vinyals Mirabent et al., 2013) due to the great value that users grant to the opinions and comments of other users (Blackshaw & Nazzaro, 2004; Caro et al., 2015).
On the second level, user-manager, the results are also consistent with those obtained by Míguez-González & Fernández-Cavia (2015), who allude to the deficient use of tools that enhance the interaction of users with the site managers and recommend the implementation of systems that allow users to vote, rate, etc. In this regard, the results show that the situation has improved slightly in the case of the websites of the autonomous communities, but in the case of the websites of the provinces/islands, and that tools such as online chats are still not implemented in any of the analysed websites. It is therefore concluded that the analysed websites, in general terms, do not meet the expectations of the tourist 2.0 with regards to information, the ability to share experiences and establish relations with other users (Suau Jiménez, 2012; Caro et al., 2015).
Among the indicators evaluated in relation to interactivity, it is advisable to recommend the tourism websites to enable spaces that allow users to publish their own contents, experiences, photos and videos, as well as to make comments on the textual and audiovisual contents published by the site manager and other users. The fear of negative comments and the loss of control over the information on the brand, the main obstacles for the full implementation of the web 2.0 model, must be overcome to favour a relational approach by the brands and the acceptance that the latter are owned and built by the consumer.
Similarly, tourism websites should integrate built-in channels for user to make queries and improve the responses of DMO. As it has been confirmed, in most cases, and despite replies are provided quickly, the information tourism websites provide is partial or only redirects the user to other websites or companies, and there are some websites that do not even reply.
With regards to the use of the tools and functions of the social web and social media presence the results allow us to partially verify the second hypothesis. Tourism destinations are all present in the major social networks but not all of them integrate in their websites the contents posted in these social networks nor enable user to share the textual and audiovisual contents of social networks through them. Therefore, it is concluded that DMO largely satisfy the new expectations of the tourist 2.0 with regards to the interaction with other users (Schmallegger & Carson, 2008), the ability to share experiences and obtain information (Caro et al., 2015), based on the experiences of other users and through wikis, forums, blogs, etc. (Schmallegger & Carson, 2008).
In general terms, the tourism destinations appear to have little interest in promoting relations with their users and between users through their websites, but they are interested in doing so through social media. Most of the analysed tourism destinations have included in their marketing and communication strategies the main social networks: Facebook, Twitter, YouTube and Instagram. Luna-Nevarez and Hyman (2012: 104) and Míguez-González and Fernández-Cavia (2015: 28) also identified Facebook and Twitter as the most used social networks, and YouTube also as a fairly-widespread platform. The research confirms the important evolution of YouTube, which is used by 95% of the tourism destinations, and the increasing prominence of Instagram, used by 80%. However, we should also note the possibility of improving the results of their strategies through the use of specialised recommendation-based external social networks in tourism products and services such as TripAdvisor and Minube, which are linked-to in only 35% of the analysed websites. With regards to blogs, and contrary to the belief of Martínez González (2011), who consider them a predominant tool of marketing 3.0, they are hardly used by the analysed destinations.
Morrison (2013: 73) affirms that the websites of DMO have become powerful tools for marketing and, in the suitable channels, to establish communication with current and potential tourists. However, the research proves that destinations are focusing all their efforts on social networks and are neglecting other tools and features which foster dialogue with their users through the website. Promoting the interactivity and social functions of the websites improves the user experience and allows DMO to attract new users through reviews and opinions. In addition, equipping websites with spaces and tools that allow users to interact with the site managers and other users makes them an invaluable source of information about current and potential consumers. In this regard, we agree with Míguez-González & Fernández-Cavia (27: 2015) and Li & Wang (2010: 545), as we have confirmed that the efforts made by public organisations to establish relationships with their consumers are focused outside the official websites. This confirms the description offered by Martínez González (2011) of marketing 3.0 as a stage characterised by greater use of social networks, blogs and clustersto the detriment of the use of the website.
The observed reality does not allow us to conclude that Spanish destinations are implementing the premises of relational and collaborative marketing (Serrano Cobos, 2006), nor that they have adopted the concept of RICT (Marfil-Carmona et al., 2015) as they are not enhancing the possibilities of the website to establish relationships with their users and achieve conversion, loyalty and recommendation (Castelló Martínez et al., 2014: 24). Tourism destinations need to implement a new approach to their commercial communication, which is known as public relations 2.0 (Aced, 2013: 65).
The research we have carried out, focused on the websites for national and regional (of autonomous communities, provinces and islands) sun and beach destinations, raises new issues that have to be addressed from a broader perspective that covers municipal websites and even international websites in order to gain insight into the extent to what the relationships established through digital media contribute to the success of the tourist destination. Similarly, this study highlights the need to complement the obtained results with an evaluation based on the point of view of the users, like the one carried out by Fernández-Cavia et al. (2013), in order to determine the extent to what the efforts made by the tourism destinations to establish relations with their users contribute to the improvement of brand perception and loyalty.
This work also proposes the development of a future research project about the use of social networks by DMO. The high number of social networks on which DMO are present questions their ability to properly manage them. Along this line, we consider it is appropriate to pursue this research about the implementation of relational and collaborative marketing in the tourism sector, in the field of social networks.
C Aced (2013): Relaciones Públicas 2.0. Cómo gestionar la comunicación corporativa en el entorno digital. Barcelona: UOC.
J Bonilla (2013): “Nuevas tendencias del turismo y las tecnologías de la información y las comunicaciones”. Anuario Turismo y Sociedad, XIV, pp. 33-45.
D Buhalis (2003): eTourism: Information Technology for Strategic Tourism Management. Essex: Pearson Education Limited.
M Camarero Rioja (2002): “Tipología de la demanda turística española. El turista posmoderno y las tecnologías de la información”. In IV Congreso Turismo y Tecnologías de la Información y las Comunicaciones Turitec 2002, Actas de Turitec 2002. Málaga: Universidad de Málaga.
C Campillo Alhama, I Ramos Soler, A Castelló Martínez (2014): “La gestión estratégica de la marca en los eventos empresariales 2.0”. ADResearch, 10(10), pp. 52-73.
JL Caro, A Luque & B Zayas (2015): “Nuevas tecnologías para la interpretación y promoción de los recursos turísticos culturales”. Pasos Revista de Turismo y Patrimonio cultural, 13(4), pp. 931-945.
A Castelló Martínez (2010): Estrategias empresariales en la Web 2.0. Alicante: ECU.
A Castelló Martínez, C del Pino Romero & I Ramos-Soler (2014): “Twitter como canal de comunicación corporativa y publicitaria”. Comunicación y Sociedad, XXVII (2), pp. 21-54.
C Cho, C. & HJ Cheon (2005): “Cross-cultural comparisons of interactivity on corporate web sites”. Journal of Advertising, 43(2), pp. 99-115.
D Chung, J. Y. & Buhalis (2008): “Web 2.0: a study of online travel community”. In O’Connor, Peter; Höpken, Wolfram & Gretzel, Ulrike (Eds.), Information and Communication Technologies in Tourism 2008 (pp. 70-81). Viena: Springer.
P Díaz-Luque (2009): “Official Tourism Web Sites and City Marketing”. In Gascó-Hernández, Mila & Teresa Torres-Coronas (Eds.), Information Communication Technologies and City Marketing. Digital Opportunities for Cities around the World, (pp. 152-183). Hershey: Information Science Reference.
P Díaz-Luque, A Guevara & S Antón (2006): “La presencia en Internet de los municipios turísticos de sol y playa. Mediterráneo y Canarias”. In VI Congreso Turismo y Tecnologías de la Información y las Comunicaciones Turitec 2006, Actas de Turitec 2006 (pp.432-443). Málaga: Universidad de Málaga.
T Domínguez Vila & Araújo Vila (2014): “Gestión de las redes sociales turísticas en la web 2.0”. Revista de comunicación Vivat Academia, (129), pp. 57-78.
J Fernández Cavia, P Díaz-Luque, A Huertas, C Rovira, R Pedraza-Jiménez, M Sicilia, L Gómez & M Míguez (2013): “Marcas de destino y evaluación de sitios web: una metodología de investigación”, Revista Latina de Comunicación Social, 68(993), pp. 622-638.
J Fernández-Cavia & A Huertas-Roig (2009): City Brands and their Communication through Web Sites: Identification of Problems and Proposals for Improvement. In Gascó-Hernández, Mila & Teresa Torres-Coronas (Eds.), Information Communication Technologies and City Marketing. Digital Opportunities for Cities around the World (pp.26-49). Hershey: Information Science Reference.
J Fernández-Cavia, C Rovira, P Díaz-Luque & V Cavaller (2014): “Web Quality Index (WQI) for official tourist destination websites. Proposal for an assessment system”. Tourism Management Perspectives, 9, pp.5-13.
I Gálvez Clavijo (2010): Introducción al Marketing en Internet: Marketing 2.0. Antequera: IC Editorial.
TW Gruen, T Osmonbekov, & AJ Czaplewski (2005): “eWOM: The impact of customerto-customer online know-how exchange on customer value and loyalty”. Journal of Business Research, 59(4), pp. 449-456.
R Hallet & J Kaplan-Weinger (2010): Official tourism websites: a discourse analysis perspective. Bristol: Channel View Publications.
A Huertas Roig (2008): “Aplicación de la Web 2.0 a los destinos turísticos. Implantación y diferencias”. In VII Congreso Turismo y Tecnologías de la Información y las Comunicaciones Turitec 2008, Actas de Turitec 2008 (pp.268-283). Málaga: Universidad de Málaga.
A Huertas Roig & J Fernández-Cavia (2006): “Ciudades en la web: Usabilidad e interactividad de las páginas oficiales de los destinos turísticos”. In VI Congreso Turismo y Tecnologías de la Información y las Comunicaciones Turitec 2006, Actas de Turitec 2006 (pp.403-421). Málaga: Universidad de Málaga.
A Huertas, C Rovira & J Fernández-Cavia (2011): “Interactivity as a key factor in city website visibility and place brand communication”. Journal of Town and City Management, 2(2), pp. 132-142.
W Lee & U Gretzel (2012): “Designing persuasive destination websites: a mental imagery processing perspective”, Tourism management, 33(5), pp. 1270-1280.
F Levine, C Locke, D Sears & D Weinberger (2008): El manifiesto Cluetrain. El ocaso de la empresa convencional. Barcelona: Deusto.
websites: Evidence from China”, International Journal of Tourism Research 12(5), pp. 536-549.
C Luna-Nevarez & M Hyman (2012): “Common practices in destination website design”, Journal of destination marketing & management, 1(12), pp. 94-106.
R Marfil-Carmona, E Hergueta Covacho & C Villalonga Gómez (2015): “El factor relacional como elemento estratégico en la comunicación publicitaria”. Anàlisi. Quaderns de Comunicació i Cultura, 52, pp. 33-46.
MI Míguez-González & J Fernández -Cavia (2015) “Tourism and online communication: interactivity and social web in official destination websites”, Communication & Society, 28 (4), pp. 17-31.
A Morrison (2013): Marketing and managing tourism destinations. New York: Routledge.
A Pérez & S Massoni (2009): Hacia una teoría general de la estrategia. Barcelona: Ariel.
CK Prahalad & V Ramaswamy (2000): “Co-opting Customer Competence”. Harvard Business Review, vol. 78(1), pp. 79-90.
JM Prat (2012): “Análisis de la dinámica relacional generada por las websites de Internet en el desarrollo de los turismos marginales”. Pasos revista de Turismo y Patrimonio Cultural, 10(3), pp. 239-251.
F Ricci & RTAWietsma (2006): “Product Reviews in Travel Decision Making”. In M. Hitz, M. Sigala & J. Murphie (Eds.). In Proceedings of the International Conference on Information and Communication Technologies in Tourism 2006 (pp. 296-307). Vienna, Austria: Springer.
D Schmallegger & D Carson (2008): “Blogs in tourism: changing approaches to information exchange”. Journal of Vacation Marketing, 14(2), pp. 99–110.
S Senecal & A Nantal (2004): “The influence of online product recommendations on consumers’ online choices”. Journal of Retailing, 80 (2), pp. 159-169.
J Steuer (1992): Defining Virtual Reality: Dimensions Determining Telepresence. Journal of communication, 42(4), pp.73-93.
F Suau Jiménez (2012): “El turista 2.0 como receptor de la promoción turística: estrategias lingüísticas e importancia de su estudio”. Pasos, Revista de Turismo y Patrimonio Cultural, 10 (4), pp. 143-153.
A Toffler (1980): La tercera ola. España: Plaza & Janés.
World Tourism Organisation & the European Travel Commission (2008): Handbook on E-Marketing for Tourism Destination. World Tourism Organisation.
J Wright (2006): Blog marketing. La nueva y revolucionaria forma de incrementar las ventas, construir su marca y obtener resultados excepcionales. México: McGraw Hill Interamericana.
Article received on 12 on December 2017. Accepted on 15 March.
Published on 17 March 2017. | 2019-04-20T06:16:36Z | http://www.revistalatinacs.org/072paper/1170/20en.html |
Hack Features:- Dumb Goalkeeper - The AI goalkeeper will stand still and not jump. Works offline & online!- Dumb Wall - The AI wall will stand still in the goal and not jump. Works offline & online!
HD Movies and TV shows — updated daily! 10 years with 130,000+ members and counting.
Reigns: Game of Thrones is the heir to the award-winning HBO® TV series Game of Thrones® and the smash-hit swipe ‘em up series Reigns from Nerial and Devolver Digital. Through the fiery visions of Melisandre, claim the Iron Throne as Cersei Lannister, Jon Snow, Daenerys Targaryen, and more to carefully navigate the complex relationships and hostile factions of the Seven Kingdoms. Employ ruthless tactics to outwit political rivals and wield impervious charm on your fickle bannerman. Maintain the balance and favor of the people to extend your reign and maybe, one day, survive the horrors of the coming winter.A Formidable Cast: Rule from the Iron Throne as Cersei Lannister, Jon Snow, Daenerys Targaryen, Tyrion Lannister, Sansa Stark, and more. Change between each king and queen you unlock to face challenges and mysteries unique to their story.Impose Your Will: Swipe left or right to change the fate of the Seven Kingdoms forever as you hear the impassioned pleas and unpredictable demands from the people of Westeros. If a particular character becomes bothersome, tear their card in half to unburden Your Majesty with their concerns – but at what cost?Reenvision Westeros: Melisandre’s visions are your playing field and extend beyond the TV series to imagine the many fates of those that would sit upon the Iron Throne. Rebuild the Great Sept of Baelor as Cersei or discover the path of the Seven Kingdoms if Sansa Stark had married Jaime Lannister.Regal Mini Games: Even the most powerful rulers need to set aside their worries and partake in more trivial matters now and then. From jousting to tavern brawls, these distractions aren’t without consequence!A Grander Reigns: Fans of the Reigns series will be delighted with the biggest, deepest entry in the series that does not simply retell the stories you know but rather lets you create new adventures at your whim.Iconic Soundtrack: Decide the fate of Westeros and those that reside in your land to the soaring score of the HBO series by Ramin Djawadi.©2018 Home Box Office, Inc. All Rights Reserved. HBO and related trademarks are the property of Home Box Office, Inc.
Hack Features:- Unlimited Hints- IAP FREE- Purchase an IAP, then tap on the 'Cancel' button to receive the in-app purchase.
Hack Features: IAP FREEClick on the in-app purchase item, the game will pop up the appleid account and password, click Cancel, it will automatically get the in-app purchase item.This hack only works on x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
Hack Fearure: Unlock all clothes, shoes, glasses, etc.
Hack Features:- Unlimited Credits - Earn some to receive an unlimited amount.- Unlimited Medals- Unlimited Ammo - Will not decrease.
Hack Features:Weak Enemies - Enemies Have Low HP , DEF & ATK-NEWThis hack only works on x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
Hack Features:- unlimited gems (complete some tasks )- unlimited coins (complete some tasks )- unlimited energy! Energy doesn't decrease!
Hack Features:- Freeze Crowns- Freeze Food- Freeze Gold- Freeze OilCurrency won''''t subtract when using them! Does not work for speeding up big things like buildings.Note:You are using this hack at your own risk. We will not be held responsible if something happens to your account.
It's time to start the engines. Huge trucks and European roads are waiting for exploration. Drive, sleep, upgrade, deliver, fight exhaustion and try to always be on time. Gain experience and unlock new shipments, trucks, and upgrades to improve your payout. Be the best Euro Truck Driver!With 18 European cities, 10 countries, endless roads and highways Truck Simulator PRO Europe is the first choice for each simulation fan. Endless customization, painting and upgrades options, advanced economics with assistants, fatigue system and hunger and above all breathtaking 3D graphics guarantee fun for hours of gameplay. Features:- 18 European cities and 10 countries to discover- 6 trucks with different driving models that you can customize and upgrade (more coming soon)- Over 30 different types of shipment to deliver- Breathtaking open world to explore- Realistic fuel consumption and fatigue system- Expanded customization- Realistic speed limits for each country- Hundreds of different quests- Detailed interior view of each truck- Hire additional drivers to expand your trucker empire- Realistic modes including clutch and steering wheel- Experience system with perksIf you're a truck simulator fan don't hesitate any longer. Start your euro truck adventure, download now!
Now, you can DRAW movies, AND you can draw ON movies! Cute CUT’s powerful, easy-to-use editing features put YOU in control, allowing you to make the highest quality movies, DIFFERENT from anything you’ve seen!Do you want to create your own unique movie? Cute CUT’s robust and intuitive feature set will have you doing so in no time, drawing gorgeous, one-of-a-kind movies and so much more!
We’re continually working to enrich and strengthen Cute CUT’s top-tier functionality, and its refreshingly simple, unique presence in today’s digital market. Are you with us? Join more than one million others who’ve dared to discover the delightful difference that’s Cute CUT!===================================================================Key Features:- User-Friendly UI.
Just drag and drop; you can arrange your media segments easily.Sleek, bookshelf-style organizer showcases your movies.UI supports both portrait and landscape modes.
- Make DIFFERENT movies, make movies DIFFERENT!Supports SIMULTANEOUS Adding of UP TO SIX different types of media into movie projects: Video, Photo (both from Album or Camera), as well as SELF-DRAW, Text, Music, and Voice. - Supports various Resolutions and Aspect Ratios, including HD (16:9), SD (4:3), SQUARE (1:1) and even Portrait Mode!Creating a PIP (Picture-In-Picture) movie is EASY: Merely place one movie atop another; Cute CUT even supports independent Resizing of each and every video segment! - Draw directly on movie.30+ drawing tools. - 3 Advanced Brushes for pro effects: Texture, Linear Gradient, Radial Gradient, gradients editable.- Highly customizable transitions.- 20+ Pre-Defined Transitions.- Transparency, Border, Corner, Shadow, Transform, and Sound Volume ... ALL Customizable!- Share Your Movie.Export to Camera Roll.Send to YouTube/Facebook.Send via e-mail.
-This game requires 512 megs of ram. Because of this, the game will not work on iPod gen 3 or 4 or other low-memory devices. Welcome back to the new and improved Freddy Fazbear''''s Pizza! In Five Nights at Freddy''''s 2, the old and aging animatronics are joined by a new cast of characters. They are kid-friendly, updated with the latest in facial recognition technology, tied into local criminal databases, and promise to put on a safe and entertaining show for kids and grown-ups alike! What could go wrong? As the new security guard working nights, your job is to monitor cameras and make sure nothing goes wrong after-hours. The previous guard has complained about the characters trying to get into the office (he has since been moved to day-shift). So to make your job easier, you''''ve been provided with your very own empty Freddy Fazbear head, which should fool the animatronic characters into leaving you alone if they should accidentally enter your office. As always, Fazbear Entertainment is not responsible for death or dismemberment.
Hack Features: IAP FREEClick on the in-app purchase item, the game will pop up the appleid account and password, click Cancel, it will automatically get the in-app purchase item.
Kodi is available as a native application for Android, Linux, Mac OS X, iOS, and Windows operating systems, running on most common processor architectures. A small overview of the features can be found on our about page. For each platform, we offer a stable and development release(s). For normal users we recommend installing the stable releases. IMPORTANT: The official Kodi version does not contain any content whatsoever. This means that you should provide your own content from a local or remote storage location, DVD, Blu-Ray or any other media carrier that you own. Additionally Kodi allows you to install third-party plugins that may provide access to content that is freely available on the official content provider website. The watching or listening of illegal or pirated content which would otherwise need to be paid for is not endorsed or approved by Team Kodi.
- IGF CHINA 2015 Excellence Award - GMGC 2016 Nomination - Golden Plume Award 2017 Most Expected Console Game Original Journey is a shooting game with 2D graphics in cartoon style. Its fun gameplay consists of roguelike stages and various sci-fi mechas and weapons. Deep in the universe lies a mysterious planet called the Planet Shadow--A ogreish name that implies lethal gas, floating islands and dark secrets. To save your motherland, you will be travelling to this dangerous destination with the Ato-Ma to explore the magical energy there. You will be playing as a recruit of the Ato-Ma forces, exploring the planet under the leadership of Captain Colin, the legendary hero. In order to change the destiny of your homeland, you must improve your skills, upgrade your equipments and find out all the secrets hidden behind this expedition. What would you do to save your own race, even if you are only a soldier? Feature · Breath-taking story of the Ato-Ma · Countless combinations of weapons · Deployment strategies of supportive turrets · Secrets hidden behind hundreds of roguelike maps · Various mechas · Fun side quests including the shooting match against the Old Hunter and the running race against Lovely.
Hack Features:- No Bomb- Infinite Starfruit-Slice starfruit in-game, it will give you 65525 starfruit- Center Fruit (Your fruit will spawn and stayed in center then fall)- Max Level- Always Critical- Score x10 This hack only works on x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
Create your own adventures in a dangerous land of monsters, treasures and traps. From renowned authors Steve Jackson and Ian Livingstone (co-founders of Games Workshop) and Nomad Games, Fighting Fantasy Legends is a role-playing card game set in the world of Fighting Fantasy. Travel across the land of Allansia with just a sword and some gold to your name and rise up to Legendary status. Play through the stories of three iconic gamebooks - City of Thieves, The Warlock of Firetop Mountain and Citadel of Chaos. Each location has a shuffled deck of cards which includes fiendish creatures, powerful objects and dramatic events. You must build up your collection of powerful treasures and level-up your dice to have any chance of surviving the dangerous streets of Port Blacksand, the murky depths of Firetop Mountain or the looming shadows of The Citadel. The world needs a Hero... you will give them a Legend. • Based on the multi-million selling series of Fighting Fantasy Books. • A card-based role-playing game with Roguelike elements. • Thousands of choices ensure that no two games are ever the same. • Uses the classic Skill/Stamina/Luck attributes. • Take on powerful adversaries, such as Balthus Dire, Zagor the Warlock and Zanbar Bone. • Kill monsters and add them to your Creature Codex. • Travel across the region of Northern Allansia. • Introducing a dice combat system unique to this game, where the player can upgrade their dice as they level-up. • Meet iconic characters, such as Nicodemus the Wizard, Gareth Yaztromo and O''''Seamus the Leprechaun. • Earn Titles based on your deeds. • Three difficulty levels. • Permadeath mode - not for the faint hearted. • Play exciting dice games, such as Runestones, Knifey Knifey and Dwarf Dice.
Researchers at Monash University have developed the low FODMAP diet and a corresponding app to assist in the management of gastrointestinal symptoms associated with irritable bowel syndrome (IBS). The Monash University FODMAP diet works by swapping foods high in fermentable carbohydrates (FODMAPs), with low FODMAP alternatives. Around 75% of people with IBS experience symptom relief on a low FODMAP diet.The app comes directly from the research team at Monash and includes the following:- General information about the FODMAP diet and IBS.- Easy to understand tutorials to guide you through the app and the 3-Step FODMAP diet.- A Food Guide detailing the FODMAP content for hundreds of foods using a simple 'traffic light system'. - A list of branded products that have been certified by Monash as low FODMAP.- A collection of over 70 nutritious, low FODMAP recipes.- Functions that allow you to create your own shopping list and add notes to individual foods- A Diary that enables you to record food eaten, IBS symptoms, bowel habits and stress levels. The Diary will also guide you through step 2 of the diet - FODMAP reintroduction.- The ability to adjust units of measurement (metric or imperial) and activate colour blindness assistance.
Hack Features:- Unlimited Coins - Spend some to receive an unlimited amount.- Unlimited Diamonds - Spend some to receive an unlimited amount.- Unlimited Tournament Tickets - Spend some to receive an unlimited amount.
Movie Box is best entertaining freeware for your smart devices such as mobile phones, tabs & iPads. This app allows users to stream & download HD videos including Movies, TV shows and Music directly on your smart device without any problem. So, that’s why millions of movie lovers are using MovieBox app all around the world at this moment.
***ON-SALE TODAY $19.99 (Reg. $29.99)***This is the original version of Vizzywig from 2012 thru 2014. The NEW 2017 version is $99 (sold separately on the AppStore). The world''''s first all-in-one, movie-making application for iPhone, iPad, and iPod touch that lets you record, edit, and preview in real time! You can even connect multiple cameras.VISIT: Vizzywig.com/support/(For YouTube Tutorials and our Quick Start Guide PDF)Import clips, add transitions, overlay snapshots and titles, set in/out points, split clips and set background music while you capture the event. When the event is over, simply tap DONE and your finished movie is rendered in minutes complete with a studio intro, titles, transitions and even Hollywood-style scrolling credits. MULTI-CAMERA RECORDINGVizzywig also lets you record and live-switch from up to 16 iOS devices at the same time using our amazing remote camera feature or create multiple-angle music videos in minutes with a single camera using our new "Create Music Video" multi-clip feature. ** Watch the demo: Vizzywig.com/demo **• Edit while filming. Add music, credits & more• Multi-camera recording & seamless sharing• WINNER: Macworld "Best of Show" Award• Import up to 30 clips or photos in one step• Seamlessly record, edit and share your videos in minutes.• Add transitions, preview your shots, trim clips and rearrange sequences.• Insert intros, titles, credits, photos and music.••• OVER 1.7 MILLION USERS WORLDWIDE •••PLUS! Connect up to 16 iOS devices over Wi-Fi so you can view, switch camera angles, record and edit… all on the fly!Here’s what the critics are saying:“Easy and powerful.” – Jackie Dove, Macworld.com“A robust multi-camera video-editing suite.” – Kelly Hodgkins, TUAW“You’ll be the next Steven Spielberg in no time!” – Zach Walton, WebProNewsCAPTURE THOSE MAGIC MOMENTS WITH EASE• NEW: Improved facial detection lets you record alone using several cameras.• NEW: Lock focus and exposure for better control.• NEW: Create multi-camera clips with a single device.• Switch between front and rear cameras while recording.• Snap photos while recording. • Add optional date & time stamps directly into the video.• Control zoom, focus, and exposure functions manually or automatically.• Supports 1920x1080, 1280x720 and 640x360 resolutions.• NEW: Hardware Video Stabilization• NEW: Audio Meter• NEW: 24p, 25p, 30p, 60p, 120p on supported devices.TAKE UP THE DIRECTOR’S CHAIR • NEW: Add multiple background music tracks• NEW: Expanded library of looping background music tracks.• NEW: Copy audio from any recorded clip or any clip in your camera roll.• Connect and simultaneously record from up to 8 devices linked over Wi-Fi. • Capture the action from up to 8 unique angles.• Receive remote camera clips at full resolution.• Send or receive pre-recorded clips between devices.EDIT YOUR VIDEOS LIKE A PRO• NEW: Insert "News Broadcast" titles over the bottom of your videos.• Preview, trim clips and process your final movie right on the spot.• Add fully customizable titles and scrolling credits.• Move, duplicate, delete or load clips without exiting the main camera view. • Enter full-featured editing mode for advanced users. • Access songs from your own music library.• Add a Hollywood feel with one of six professional-quality studio intros.• Import .MOV files or clips from many popular cameras. SHARE YOUR CREATIONS WITH THE WORLD• NEW: Upload sessions with all edit details to DropBox or via iTunes Sharing.• IMPROVED: Email or upload directly to Facebook, YouTube, Vimeo or CNNiReport.• Select from 3 sharing resolutions for faster upload speeds or higher quality.JOIN OUR WORLDWIDE REMOTE CAMERA NETWORK BETAWe are currently inviting select users to a free 30-day beta of the service. If you would like to be considered, please send us an email to (invite at vizzywig dot com).
Creating gorgeous artwork from your photos has never been easier. With Distressed FX, simply take a photo and choose from a wide range of textured images and overlays. Transform even the most mundane photo into a work of art.See our hashtag #distressedFX on Instagram to see 100k+ examples!** Featured by Mac Format and Black + White Photography MagazineJoin us at:www.facebook.com/DistressedFXwww.instagram.com/distressedfxapp/• Particularly suited to still life and landscape photography - this app will perfectly compliment your existing collection of photo apps.Distressed FX is powered by the textures of Cheryl Tarrant, a texture artist from Tennessee. Her popular and unique style is now available in your pocket, wherever you go.• Follow Cheryl on Instagram http://instagram.com/distressedfxapp• Be our friend on Facebook www.facebook.com/DistressedFX• Follow us on Twitter : @distressedfxSee examples of the Cheryl's distinctive work here: www.flickr.com/photos/jewellofdistressed/** Find out more about Distressed Textures at www.distressedfx.com & www.distressedtextures.comDistressed FX (tm) is a trademark of Cheryl Tarrant in the United States of America.
AudioTube Organize your favorite music video clips and listen whenever you want. Enjoy your music even if the app is in background. Search for the best videos or explore from highlights and by genre lists.
Hack Features:- No Skills CoolDownThis hack only works on x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, XR, Xs, Xs Max, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
Take the role of a plane crash survivor stranded somewhere in the Pacific Ocean. Experience terrifying encounters both above and below an endless environment. Come face to face with some of the most life threatening scenarios that will result in a different experience each time you play. Scavenge. Discover. Survive. --- Generate an Infinite Number of Procedural Worlds - Explore Pacific islands, reefs, and bottomless ocean trenches filled with detailed biomes! No two worlds are the same - You can generate a completely new and randomized world at any time. You can also mix your own maps created with the map editor in with the procedurally created maps in the world for a more customized experience. If you feel like sharing, you can even share your world seed with other players. * Please note, currently the generated world size is limited to 6.25km2 but the final world size will be much larger. Dynamic Weather and Day-Night Cycle - Struggle to navigate stormy seas or enjoy basking with a coconut on a sunny afternoon. Unique Physically-based Crafting System - Harvest resources to create equipment by combining them together in the physical world - no crafting slots! Unique Physically-based Building System - Settle on an island and construct a shelter or venture the seas with your own built raft. Detailed Survival Aspects and Interaction - Manage your vitals of hunger, thirst, blood, and health against the harshness of mother nature. Random Loot and Collectables - Search sunken shipwrecks and islands for interesting and rare equipment. Hunting and fishing - Spear small animals in the shallows or risk the depths with a spear gun in search of larger meals. Starve an island of resources or maintain and manage its growth.
Hack Features:- Radar Hack- Unlimited Ammo- No Spread- Night Vision Enabled- No FlashBang- No MedKit CoolDownThis hack works on the latest x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, Xr, Xs, Xs Max, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
The game contains 7 gamemodes for practicing your concentration:3SolitaireFind three tiles in a row (vertically, horizontally or diagonally) whose equation (first times second, plus or minus third, or any other combination of two tiles multiplied and the other added or subtracted) adds to that total.Brath:You need to find two cards giving a sum target must match the target result. New target result is generated every move.Brath X:The numbers are multiplied. Everything else is same as Brath. Classic Concentration game:Classic memory game. You can choose from 4 type of cards: letters, numbers, shapes, picture of animals.Concentration X:You need to find pairs of cards that must match the target card. Target card is updated every move.Brath for Kids:Same as Brath. Moves limitations is off. Card variants are limited to numbers 0-5.Concentration for kids:You need to find card that must match the target card. Target card is updated every move.
WORKS OFFLINE - Expand your Spanish vocabulary or find just the right word for the assignment, our comprehensive word selection and simple search options will have you using this app every day. With a minimalist display designed for functionality it features visual cues, like usage guides and regional flags, and easy navigation between detailed results.One of the largest collections of synonyms and antonyms featuring pronunciation, it includes not only single terms but phrases and complete colloquial proverbs. This wide-ranging collection of terminology is intended to be a professional writing aid for native speakers and a reliable tool for those learning the language. Internet connection needed only for spell checker.What makes this Spanish Thesaurus unique? • The fact that you may enter set phrases, not only single terms, as valid entries • The fact that you may obtain synonyms of parts of speech usually not included in other thesauruses, such as exclamations, prepositional phrases and idiomatic verbs. Even proverbs have their synonyms! • Vast database; no less than 1,329,000+ synonyms and 443,000+ antonyms.• 272,000+ words and 29,400+ images. • Meaning Descriptors to help distinguish between the different word meanings. • Strict coherence of each synonym set. Transitive verbs yield only transitive synonyms. Intransitive verbs yield intransitive synonyms. Meanings and connotations of words are never mixed. • Phonetic transcription following IPA standards for American Spanish, Caribbean Spanish, River Plate Spanish and Spanish from Spain.• Sync your favorites among your devices with Dropbox• Four incredible New premium Spanish voices! • You may enter now plurals or feminines as valid entries. • Customize using available themes, background color, and font.• Fuzzy Search: Detects misspelled words and offers close suggestions.* Please note this is a Thesaurus and therefore includes only Spanish synonyms, no translations nor verb conjugations. Our General Reference Dictionary includes all those.
This new rendition of “The Art of War” brings the clear, sure voice of Brian Browne Walker—celebrated for his translations of the I Ching, Tao te Ching, Hua hu Ching, and Wei wu Wei Ching—to the world’s most time-honored teachings on leadership, strategy, and conflict. The polished and refined new app puts this powerful strategic wisdom right at your fingertips. Read it like a regular book, receive random passages, or email any selection to a friend or colleague.
This is the official mobile port of Five Nights at Freddys!NOTE: This game requires at least 512 megs of ram to run properly; low-memory devices such as the iPod gen 3 and 4 will crash during gameplay. If you have a newer device this shouldn''''t be a problem! --------------------------------------------------------------Welcome to your new summer job at Freddy Fazbear''''s Pizza, where kids and parents alike come for entertainment and food as far as the eye can see! The main attraction is Freddy Fazbear, of course; and his two friends. They are animatronic robots, programmed to please the crowds! The robots'''' behavior has become somewhat unpredictable at night however, and it was much cheaper to hire you as a security guard than to find a repairman.From your small office you must watch the security cameras carefully. You have a very limited amount of electricity that you''''re allowed to use per night (corporate budget cuts, you know). That means when you run out of power for the night- no more security doors and no more lights! If something isn''''t right- namely if Freddybear or his friends aren''''t in their proper places, you must find them on the monitors and protect yourself if needed!Can you survive five nights at Freddy''''s?"For all the simplicity of the game’s controls and premise, Five Nights at Freddy‘s is frightening. It’s a fantastic example of how cleverness in design and subtlety can be used to make an experience terrifying. Simple still images and proper character design steal the show in this game, and show that Scott Cawthon knows quite a lot about the secret fears people feel when looking at creepy dolls and toys. It’s elegant in how it sows fear, and is a must-own for anyone who likes scary games." -Joel Couture IndieGameMag.comThis game was created using Clickteam Fusion!
Split the world with a swipe of your finger and then rearrange it to guide critters back to their spaceship. Explore colorful planets full of danger, challenging puzzles, and innovative mechanics that will make you think in new ways. The immersive soundscapes of each world, best experienced with headphones, set the tone for your journey. No advertisements or in-app purchases. More levels will be added in future updates. Progress is synchronized with iCloud across all your devices.
Ever notice how people texting at night have that eerie blue glow? Or wake up ready to write down the Next Great Idea, and get blinded by your computer screen? During the day, screens look good—they''''re designed to look like the sun. But, at 9PM, 10PM, or 3AM, you probably shouldn''''t be looking at the sun. f.lux fixes this: it makes the color of your iPhone''''s display adapt to the time of day, warm at night and like sunlight during the day. It''''s even possible that you''''re staying up too late because of your iPhone. You could use f.lux because it makes you sleep better, or you could just use it just because it makes your iPhone look better.
¡Aprender o mejorar tu inglés, a pesar de tener poco tiempo, es posible! Gracias a un método eficaz, memorizarás en tiempo récord un contenido práctico con vocabulario y frases útiles. Aprendiendo e interactuando con diferentes diálogos, desarrollarás tu comprensión oral rápidamente.Un método basado en estudios científicos y concebido por nuestro equipo de políglotas provenientes de los 5 continentes, que han estado bajo la supervisión de un profesor de inglés. Para conocer más acerca de nuestras aplicaciones y de nuestro método para aprender inglés, te invitamos a ver nuestro vídeo explicativo: http://www.mosalingua.com/es¿Sabías que unas 500 palabras bien seleccionadas pueden ser suficientes para desenvolverse durante un viaje? ¿Posees las bases de vocabulario que aprendiste hace algún tiempo pero necesitas practicar? Gracias a este método, necesitarás solamente 10 minutos al día durante dos meses para aprender 600 palabras y frases en inglés.Aprende el 20% de vocabulario que te servirá en el 80% de los casos. Especialízate en diferentes temas (viajes, deporte, trabajo, informática, etc) o prepárate para obtener los certificados ESOL, TOEFL y TOEIC. Mosalingua se adapta a tu tiempo y a tus dificultades con sesiones de revisión variadas y gracias a una planificación de aprendizaje basado en tus respuestas.CONTENIDO:► 3.000 tarjetas de aprendizaje seleccionadas que incluyen palabras y frases en inglés.► Voces de nativos en las tarjetas de aprendizaje y en los diálogos.► 14 categorías que incluyen vocabulario indispensable relacionado con alojamiento, transporte, turismo, compras, social, informática, urgencia, etc.► 10 niveles de dificultad desde el básico hasta el especializado.► 37 diálogos en diferentes situaciones comunes y durante un viaje.► Lecciones y consejos que te motivarán a seguir aprendiendo.► Más de 100 bonificaciones que desbloquearás durante tu progresión. ► Posibilidad de agregar tus propias tarjetas en la aplicaciónAPRENDE EL 20% DEL VOCABULARIO QUE TE GARANTIZARÁ UN 80% DE RESULTADOS:► Aprenderás las palabras más útiles y simples para hablar inglés.► Memorizarás un vocabulario práctico y especializado.MÉTODO DE APRENDIZAJE MUY PRÁCTICO.El método de MosaLingua está basado en el Sistema de Repetición por Espacios (Spaced Repetition System) : la aplicación ha sido creada teniendo en cuenta los resultados de varios años de investigación científica. Para saber más sobre este método visita http://www.mosalingua.com/es► Calcula las tarjetas de aprendizaje que vas aprendiendo en función de tus dificultades y para asegurarte una memorización duradera.► No perderás tiempo. Aprovecha tu tiempo dedicándote a las tareas útiles y pasa menos tiempo en las tareas difíciles.► Se adapta a tus dificultades y a tu ritmo.► Ejercita tu capacidad de memoria visual y auditiva.► Te ayuda a desarrollar un aprendizaje duradero en tu memoria de largo plazo.APRENDIZAJE EN TU MÓVIL► Sesiones de aprendizaje variable según tu tiempo libre. Puedes practicar las tarjetas aprendidas dedicando de 2 a 30 minutos.► Se adapta automáticamente a tu ritmo y a tus dificultades.► Puedes parar las sesiones de aprendizaje y retomarlas en cualquier momento.► No necesitas conexión a internet.APRENDE MIENTRAS TE DIVIERTES► Ganarás bonos a medida que aumenta tu progresión en el aprendizaje (diálogos, chistes, informaciones insólitas, proverbios y consejos).► Los diálogos se basan en situaciones reales, por lo que serán muy útiles para tus viajes.► La rapidez con la que memorizarás nuevas palabras te motivará a aprender más y más.► Las estadísticas de tu aprendizaje te ayudarán a conocer tu progreso y a seguir motivado.MosaLingua sigue en constante evolución. Si necesitas ayuda o tienes sugerencias sobre nuestro trabajo, puedes contactarnos por medio del enlace de servicio al cliente. ¡Estaremos encantados de atenderte!Todo este contenido está incluido en la aplicación, y por lo tanto, no tiene costes añadidos.
Take Storm on a magical adventure in his awesome teacup. Storm''''s brother Cloud has created an amazing dream-like world for you to explore, packed with all kinds of challenges! Guide Storm through each stage, solving puzzles, avoiding pitfalls and beating the bad guys in this outstanding platform adventure! What they said, "Yes, Storm in a Teacup is completely adorable. But it''''s also a great little platformer." — TouchArcade "It’s gorgeous, controls well and offers a good solid challenge...This one is a big deal." — Gamezebo "Storm in a Teacup mixes an excellent visual style with a smoothly flowing physics-driven platforming experience." — All About The Games • Solve Puzzles! • Avoid Pitfalls! • Beat the Baddies! • Find Hidden Stickers! • Collect all the Sugar! • Unlock Challenges! • Have an Awesome Time! More Discover more amazing Cobra Mobile games at www.cobramobile.com Support Having problems? Visit http://www.cobramobile.com/support/ to see if we can help you.
"A fun, addictive, and challenging fighting simulation RPG" 9/10 - AppAdvice "Must be experienced by gamers far and wide" 9/10 - HardcoreGamer "A rich and rewarding fight sim that gives you plenty to do, and makes sure you have fun while you''''re doing it" 9/10 - PocketGamer "Punch Club is pretty awesome" 9/10 - TouchArcade About Punch Club: Your father was brutally murdered before your eyes. Now you must train hard, eat chicken and punch dudes in the face to earn your place in the Punch Club ranks, and discover who ended your father''''s life. Punch Club is a boxing tycoon management game with multiple branching story lines. Your goal is clear, but how you get there depends on whether you want to legitimately climb the rankings, or take the more ridiculous, shady route. Along the way you''''ll want to focus your talents. Will you take the Way of the Tiger, the Way of the Turtle, or the Way of the [other one?]? Your strength, accuracy and agility all depends on whichever Way enlightens your path. Do you have stripes, or flippers? And every decision will matter, especially in your social life. You''''ll be juggling friendships, love life, work, recreational time, relationships, and possible stardom, all alongside your gym time and fighting aligators. It''''s not all just pumping iron, you know. - Boxing management sim with RPG and tycoon elements - Find out who killed your father, and maybe learn something about yourself along the way - Heavily story-driven, with multiple different narrative branches and game endings to discover - Get as deep with stats as you like, and find your own way through extensive skill trees - Gorgeous pixel visuals with 80-90s references and nostalgia all over the place - Now with cross-platform saves! - Featuring "The Dark Fist" storyline, a free content update with 3 hours of new content!
iRespring is the only non jailbroken app that can respring your device. It quickly resprings your device speeding up and refreshing the springboard for you without a reboot.
『The movement of our world has been adapted』 『Can you hear my whispering? 』 【Now Game Start!!——】 Come and fix the world movement tampered with by a mirror image code with three beauties! This is a world of the perfect combination of a cool parkour game and a traditional music game——Muse Dash!! Yes. You’re destined to be our Master! What? You don’t have nimble fingers? Meow~ Don’t be too modest! So, don’t worry! If you do not excel in playing action games, you can still overcome the difficulties by dancing to the music! Choose your favorite beauty to go through the romantic backdrop. Now let’s get started with our journey to wipe out all the adorkable monsters!!! 【Game Features】 You will go through an unprecedented experienceof the perfect visualeffects of a parkour game and the traditional gameplay of a music game. * Unique and fashionable art design. There are 30 popular songs initially. Stay tuned for continuous updates! * Different music styles are matched to different scenes, enemies and Bosses. We have beauties, adorable pets and even adorkable enemies! Believe me, you will even be impressed by the Boss! What? You’ve had enough?? Alright, that’s the most I can do for you... *Well-designed scripts and famous VO. 【Award】 Nominated, BitSummit VOL.6 2018 The Excellence in Sound Design Award Official Selection, Taipei Game Show 2018 Languages Supported: English 简体中文(Simplified Chinese) 繁体中文 (Traditional Chinese) 日本語(Japanese) Facebook:@MuseDashtheGame Twitter: @MuseDashtheGame Service email: MuseDash@xindong.com ©2018 X.D. Network Inc. All rights reserved.
Simply the best drawing App for kids in the Appstore. 5 ***** and featured by Apple all over the world. Making beautiful drawings has never been so easy thanks to Carl.Import Pictures and draw over them.You can even play with talking stickers that repeat anything you say with a funny voice!Enjoy many powerful and easy to use tools that helps you make great drawings.Create your own sets with Talking Carl and draw Talking Monsters!Explore creative drawing with Mirror painting.Easily share your drawings and vote for the best ones.Write your name with sticker letters.Draw mustaches or funny eyes on your friends pictures.Add stickers of Carl and his friends.Share your creations on FaceBook or by email.Save to the photo Album.FEATURES:• Easy and fun drawing tools• Talking Stickers• Magical pattern paint bucket• Mirror drawing• Cool stickers of Carl and friends• Share on Facebook Wall• Email your drawings• Import from photo libraty• Save and load• iPad compatibleSpecifically designed for kids, Drawing with Carl help you make great drawings and share them with your parents and friends.
The most handy measuring tool kit in the world. Turning your iPhone or iPad into a multi functional measuring device with: metronome, stopwatch, timer, seismometer, ruler, surface level and many more.Currently, there are 13 measuring tools + Flashlight in the tool box:- BAROMETERIt gives you a nice and clear local atmospheric pressure, obtained from the barometric sensor in your device- ALTIMETERThis tool takes advantage of the built in GPS to give you the precise elevation above the sea level.- COMPASSA pretty and well-made compass for navigation, traveling and direction reference purposes.- TESLAMETERIt takes advantage of the built-in magnetometer in your iPhone/iPod touch, allows you to monitor the strength of magnetic field all around. There are a range of real-life applications for this useful item, such as: metal detector, AC magnetic fields, or finding low-magnetic places for sleeping- METRONOMEIt is the most precise and stable metronome on the app store. Whether you are a musician, a music teacher, a beginner at playing music or even a golfer, this tool provides you a set of powerful features that can satisfy all your needs. - STOPWATCHWhenever you need a precise and professional stopwatch for sport activities like: sprints, jogging, this tool is a must have. Among its features are: intuitive interface, lap and split modes support, or send log results to your email- TIMERThere are unlimited applications of using timer in daily life, such as: egg timer, tea timer, cooking, alarm clock, etc. The timer tool satisfies all of those needs by many of its features: up to 5 timers running simultaneously, count down and count up support, intuitive and convenient duration setup using preset and gestures- SEISMOMETERTaking advantage of the built-in accelerometer in your iPhone, this tool detects and visualizes any vibrations and moves of the iPhone. So, why not using this excellent feature to help your iPhone self-protected like a car when combined with an alarm? Or another great application is to test how smooth the car is on a test drive- PLUMB BOBThis is an instrument to check if an object is perfectly vertical/plumb and has been used since the time of the ancient Egyptians. It suits any types of your needs, such as: hanging objects, carpenter work, brick layer or building construction- SURFACE LEVELThis tool facilitates the measurement of the slope of whatever surface you want to check. Most importantly, its accuracy is ensured at the maximum level by the support to different sensitivities that allow you to detect subtle slopes (floor leveling, furniture arrangement,..)- SPIRIT/BUBBLE LEVELIt is a simple but extremely useful tool in the set to check if an object is balanced. Its applications range from entertained purposes such as checking pool billiard tables in the bar to serious usages like constructions, carpenter, etc- RULERThe ruler helps you precisely know the lengths of objects all around you, such as pens, tables, pictures. We built it to become even more than just a normal ruler: longest distance measuring capability, and up to 6 units support- PROTRACTORHave you ever forgotten your protractor at school or when you urgently look for a protractor to measure any kind of angles in real life? | 2019-04-22T01:59:11Z | https://m.pandahelp.vip/app |
A long time ago there lived in a camp of Pawnees a certain poor boy. His father had only one pony.
Once he had been a leading man in the tribe but now he seemed to be unlucky.
When he went on the war-path he brought back nothing and when he fought he did nothing, and the people did not now look up to him.
There was a chief's son who loved the poor boy and these two went together all the time. They were like brothers; they used to hunt together and go courting together, and when they were travelling the poor boy often rode one of the ponies of the chief's son, and the latter used to go to the poor boy's lodge and sleep there with him.
Once the camp went off to hunt buffalo, and the poor boy and the chief's son rode together all the time.
After the people had made camp at a certain place, the chiefs decided to stop here for four days because the buffalo were close by and they could kill plenty and dry the meat here.
North of the camp was a hill on which grew many cedar-trees, and during the day the poor boy had overheard people saying that many Indians had been killed on that hill among those trees. They said that no one ought to go there for it was a dangerous place.
That night the chief's son went over to his friend's lodge to sleep there, but before they went to bed he left the lodge for a time and while he was gone the poor boy, as he sat there waiting, began to think about himself and how unhappy he was. He remembered how poor he and his father were and how everybody looked down on them and despised them, and it did not seem to him that things would ever be any better for them than they were now.
For a long time he sat there thinking about all these things, and the more he thought of them the worse they seemed, and at last he felt that he was no longer glad to live and he made up his mind to go up into those cedars.
He went out of the lodge and started to go up toward the trees. It was bright moonlight, so that he could see well.
Just before he reached the edge of the timber he crossed a ravine, and saw there many skeletons of people who had been killed. The ground was white with these bones. He went on into the cedars, and came to a ravine leading up the hills, and followed it. As he went on he saw before him a trail and followed it, and when he came to the head of the ravine there was a big hole in the bank, and the trail led to it.
He stopped for a moment when he came to his hole, but then he went in, and when he had entered he saw there, sitting by the fire, a big she-bear and some little cubs. As the boy stood there looking at her, the she-bear said to him: "I am sorry that you have come here. My husband is the one who kills persons and brings them here for the children and me to eat. You had better go back to your people quickly, or he will eat you up. He has gone hunting, but he will soon be back again. If he finds you here, he will kill you."
The poor boy said: "Well, I came here on purpose to be killed, and I give myself up to you. I shall be glad to be eaten by you. I am here ready to be killed. I am yours. Take me."
The she-bear said: "Oh, I wish I could do something to save you, but I cannot. He is one of those bad bears -- a grizzly -- medicine. I can do nothing for you, but I will try. As soon as you hear any noise outside -- any one coming -- pick up that cub, the littlest one, and hold it in your arms. When he comes in he will tell you to put it down, but do not do so. Hold it tight; he loves that one best of all."
All at once the boy heard outside the cave the noise of a bear snorting and grunting. The she-bear said, "Pick up the cub, quick; he is coming." The boy caught up the little bear, and held it tight to his breast. All at once the noise came to the mouth of the den and stopped. It was the Bear.
The boy could hear him talking. He said: "Here! somebody has been about my house. I smell human beings. Yes, he even came in. Where is he? Let me see him, so that I may jump upon him and kill him."
When he came in he saw the boy, and seemed very angry. He stood up on his hind feet and threw up his hands, and then came down again and struck his paws on the ground, and then rose up and snorted "whoof," and blew out red dust from his nostrils, and then came down and jumped about, and sometimes sprang toward the boy, as though he were going to seize him.
He was very terrible, and the boy was very much afraid. The Bear called out to the boy in a loud voice: "How dare you take up my child and hold it? Let it go, or I will tear you to pieces and eat you." But the boy still held the cub. No matter what the Bear said or what he did, the boy held fast to the cub.
When the Bear saw that the boy would not let the cub go, he became quiet, and no longer seemed angry. He said: "Boy, you are my son. Put down your brother, for now he is your brother. He shall go with you, he shall be your companion, and shall be with you always as your guide and helper.
He has told me your story, and how you are poor, unhappy, and now he has kept you from being eaten up. I have taken pity on you, and we will send you back to your people, where you may do some good among them.
My son, I am at the head of all these animal lodges, down at Pahuk and at Pahur and everywhere else. I am at the head; there is no animal living that is stronger than I; none that I cannot kill. If a man shoots at me, I make the arrow to fall from my skin without hurting me.
Look up around my lodge. See these arrows, these guns, these leggings, these beads, and the medicine that men have brought, thinking to kill me; but I have killed them, and have taken these things, and keep them here.
I knew that your people were coming to this place to hunt. I drove the buffalo over, so that the people should stop here and hunt and kill meat, in order that you might come to my lodge. I know all your feelings. I know that you are sorry for your poor father, my brother, and I wished you to come here, so that I might make you my son and give my power to you, so that you may become a great man among your people. I know that they are now killing buffalo, and that they will be camped here for four days.
Now, my son, set your brother free. All the power that I have I give to you. I shall kill my son, your little brother there, and give you his skin to keep and to carry away with you, so that he may be your companion and may be with you always. Your brother, your friend at the camp, is looking for you, mourning for you, for he thinks you dead, but to-morrow night you shall see him, and shall tell him to rejoice for you and not to mourn. You shall tell him where you have been."
The little bear that he was holding said to the boy: "It is all right now, brother; put me down. My father means what he says. I am glad that I am going to be with you, my brother."
The boy put him down. Then the Bear said to his wife: "Get up. Take that gun."
The she-bear took the gun, and they walked around the fire-place in a circle, and sang, and the boy looked on. The Bear took the gun and told the boy to look at them, and to watch carefully everything that they did. After a little he stopped, and shot his wife, and she fell down dead.
Then he put down the gun, and went to the she-bear and put his mouth on the wound, and breathed on it and snorted "whoof," and sucked in his breath and took the bullet out, and went around the lodge, singing and making motions, and then he took hold of the she-bear and lifted her to her feet, and supported her, and pushed her around, and helped her, and at last she walked, and was well.
Then he called the boy to him and said, "Now I will do the same thing to you." And he did the same thing to the boy, and brought him to life in the same way.
Then he said, "That is one power I give you to-night." Then he gave the gun to the boy and went to the other side of the lodge, and sat up, and said, "Now I will open my mouth, and you shoot me right in the mouth."
He opened his mouth, and the boy shot him, and he fell over.
After a moment he got up on his feet and slapped his paws on his chest several times, and the bullet came out of his mouth, and he walked around the fireplace two or three times, and made motions and grunted, and then he was well.
Then he took the boy in his arms, and hugged him and kissed him and breathed on him, and said: "Now I give you my power. Go over there and I will shoot you as you shot me. Do just as I did."
The boy went over there, and the Bear shot him, and the boy did just as the Bear had done, and made himself well. The Bear then put an arrow in the gun and shot it at the boy, and when the smoke cleared away the boy found the arrow fast in his throat, the feather end sticking out. The Bear took it out and made him well, and gave him also this power.
Then the Bear told him to load the gun with a ball and to shoot it at him, and he did so, and shot the Bear, but the lead was made flat and dropped to the ground. The bullet did not go into the Bear. The Bear now told the boy to take the bow and arrow and to shoot at him with all his strength. The boy did this, but the arrow did not go through the Bear, but the spike rolled up and the shaft was split.
The Bear said: "Now you see, my son, that the gun and the bow, the bullet and the arrow, cannot harm me. You shall have the same power. When you go into battle you shall not carry a gun nor arrows, for they are not mine, but you shall take this paint and put it all over your body, then put this feather on your head, and take this club, which is part of my jawbone. All these things have my power and medicine. When you are carrying these things your enemy cannot hurt you, even if you run right on to him; but with one stroke of this club you shall kill your enemy."
That night the Bear said to him: "Hereafter you shall have the same feelings as the bear. When you get angry, you will have a grunt like a bear; and if you get too fierce, tushes like a bear's will stick out of your mouth, so that the people will know that you are very angry. You shall have my power, and you can go into any of the lodges of the animals, of which I am the chief." And he told him how to get into these lodges.
That day they stayed in the Bear's lodge, and the Bear took the claw off from his little finger and gave it and a little bundle of medicine to the boy. He said, "Take this claw and this bundle of medicine and put them on a string and wear them on your neck always, the claw hanging in front."
He taught him how to make plums grow on trees, and how to make ground-cherries come out of his mouth. That night he sent the boy back to the camp. He said: "Tell your father and mother not to mourn for you, for you will return in two days more. I have driven plenty of buffalo to this place, and they will kill them and dry the meat. Now go to the camp and get a pipe and some tobacco, and bring them here."
The boy went back to the camp. When he went into the lodge his father and mother were glad to see him. He told them not to be anxious about him, and not to say anything about his having been away. Then he went out and found his brother, the chief's son, asleep.
He said to him: "Wake up, brother. I want you to get some tobacco and a pipe from your father. Tell no one that it is for me. Bring it here. I want to smoke with you. I am going away again, but you must stay in camp. I will be back in a few days."
The chief's son got the things and gave them to the boy. He wanted to go with him, but the poor boy would not let him. That same night the boy went back to the Bear's den, carrying with him the pipe and tobacco. After he went into the lodge he filled his pipe and lighted it, and he and the Bear smoked together. The Bear said to him: "After you have gone home, whenever you smoke, always point your pipe toward my den and ask me to smoke with you. After lighting your pipe, point it first to Atius Tirawat, and then blow a few whiffs to me. Then I shall know that you still remember me. All my power comes from Atius. He made me. There will be an end to my days as there is to those of every mortal. So long as I live I shall protect you; when I die of old age, you shall die too."
After this he said, "Now bring my youngest boy here." The boy brought the little cub, and the Bear said, "Now kill him." The boy hesitated to do this. He did not want to kill the little bear, but it said to him: "Go on, my brother, kill me. After this I am going to be a spirit, and always to be with you." Then the boy killed him, and skinned him, and tanned his hide. ed medicine paint on the hide.
When this was done the Bear told him to put his paint, his feathers, and his war-club in this hide, and to wrap them up and make a bundle of them. Then he said: "Now, my son, go to your people, and when you get home hang your bundle up at the back of the lodge, and let the people know nothing of all this. Keep it secret. Wherever you go, or wherever you are, I shall be with you."
After they had reached their home, the boy told the chief's son that he wanted him to go off with him on the war-path. His brother said: "It is good. I will go." The poor boy took his bundle, and they started.
After traveling many days they came to a camp of the enemy. They went into the village in the daytime, and took many horses and started away with them, riding hard. Soon the enemy pursued them, and at length they could see them coming, and it seemed as if they must soon overtake them. Then the poor boy got off his horse and stopped, telling his brother to go on, driving the horses.
The boy had painted himself red over his whole body. He held his war-club in his hand, and had his feather tied on his head and the little bear-skin on his back. The enemy soon came up and tried to kill him, but they could not. He would run after one and kill him, and all the others would shoot at him with their arrows, but they could not hurt him, and at last they left him and went back, and he went on and overtook the chief's son.
Then his brother saw that he had great power. After this they travelled on slowly, and at last reached the village. His brother told the people that this man was powerful, that they had taken the horses in broad daylight, and the young man had staid behind on foot and fought the enemy off, while he drove on the horses.
A few days after they reached home a war-party of the enemy attacked the village. All the Pawnees went out to fight them, but the poor boy stayed behind in the lodge. He took down his bundle, filled the pipe, and pointed it first to Atius, and then toward the Bear's lodge, and smoked. Then he took the paint and mixed it with grease, and rubbed it all over his body except his face: that he painted black.
Then he put the feather on his head and the little bear-robe on his back, and took his war-club in his hand and started out. The Bear had told him that in going into battle he must never start toward the east, but must attack going toward the west. So he went around, and came on the battle-field from one side. As he came up he saw that his people were having a hard time and were being driven back. There was one of the enemy who seemed to be the bravest of all. The poor boy rushed at this man and killed him with his club, and then ran back to his own line.
When his people looked at him, and saw that it was really the poor boy who had just done so brave a deed, they knew that what the chief's son had said was true. When he started again to rush toward the enemy's line, all the Pawnees followed him. He ran among the enemy, and with his club killed one here and one there, and the enemy became afraid and ran, and the Pawnees followed and killed many of them.
That night they returned to the village, rejoicing over the victory. Everybody was praising the young man. Old men were calling his name, young women were singing about him, and old women dancing before him. People no longer made fun of his father or mother, or of him. Now they looked upon him as a great and powerful person.
The Bear had told him that when he wanted his name changed he must call himself Ku ruks la war uks ti, Medicine Bear. That night the Bear came to the boy in his sleep and spoke to him. He said: "My son, to-morrow the chief of the tribe is going to ask you to take his daughter for your wife, but you must not do this yet. I wish you to wait until you have done certain things. If you take a wife before that time, your power will go from you."
The next day the chief came to Medicine Bear and asked him to marry his daughter, and told him the people wanted him to be their head chief. He refused. Some time after this all the different tribes that had been attacked by him joined forces and came down together to fight the Pawnees.
All the people went out to meet them, but he stayed in his lodge and painted himself, and put his feather in his head and the bear-claw on his neck and his bear-skin on his back, and smoked as he always did, and took his club and went out.
When he came to the battle, the Pawnees were having a hard time, because the enemy were so many. Medicine Bear charged, and killed a man, and then came back, and the second time he charged the people charged all together, following him, and they killed many and drove the enemy off, and those who had the fastest horses were the only ones who got away.
The Pawnees went home to the village. Everybody rejoiced, and there were many scalp-dances. Now the poor boy was more highly thought of than ever. Even the chiefs bowed their heads when they saw him. They could not equal him. This time he called himself Ku ruks ti carish, Angry Bear.
After the excitement had quieted down, one day the head chief said: "Medicine Bear, in all this tribe there is no chief who is equal to you. Sit down by my daughter. Take her for your wife, and take my place as chief. I and my wife will go out of this lodge, and it shall be yours. You shall be the chief of the tribe. Whatever you say we will abide by."
The poor boy said: "My father, I will think about this. By morning I will let you know."
In the night, before he slept, he filled the pipe and smoked as the Bear had told him to do, and then he went to bed. In dreams the Bear said to him: "My son, you have done what I wished you to do. Now the power will remain with you as long as you shall live. Now you can marry, if you will."
But the boy was not yet ready to do this. The girl was very pretty, and he liked her, but he felt that before he married there were still some things that he must do. He called his brother and said to him, "Go, kill the fattest of the buffalo; bring it to me, and I will take a long journey with you."
His brother went hunting and killed a buffalo, and brought the meat home, and they dried it and made a bundle of it. Medicine Bear told his brother to carry this bundle and a rawhide rope and a little hatchet, and they started on a journey toward the Missouri River .
"Now take the bundle of meat, and I will let you down over the bank. You must put the meat on a ledge of the cliff, and when the birds come you must feed them. Give a piece to the first one that comes, and then take your sharp stick and get another piece, and so feed all the birds. They are the ones that have power, and they can take pity on you." So he let the chief's son down.
The first bird that came was a buzzard, then an eagle, then hawks and owls, all kinds of birds that kill their prey. He fed them all. While he was doing this, the poor boy was above lying on top of the bank. Late in the afternoon, just as the sun was going down, he saw, far up the river, what looked like a flock of geese coming. They came nearer and nearer, and at last passed out of sight under the bank.
Afterward, when he looked down on the river, he could see in the water red light as if it were all on fire, and as he lay on the bank he could hear down below him the sound of drumming and singing just as plain as could be, and all the time the chief's son was hanging there in front of the bank, and the poor boy would call down to him to cry and ask the animals to take pity on him.
When Medicine Bear had done this, he started back and went home, leaving the chief's son hanging there. The chief's son stayed there all the night and all the next day, and for three days and nights, and on the night of the fourth day he fell asleep.
When he awoke he was in a lodge. It was under the Missouri River . When he looked about him he saw that those in the lodge were all animals.
There was the beaver, there was the otter, two buffalo, the antelope, hawks, owls, ermines, bears, frogs, woodpeckers, catfish -- all kinds of animals.
On each side of the lodge was a little pool, and in each pool sat a goose, and every time they sang, the geese would shake their wings on the water, and it sounded just like drumming. The chief of the animals spoke to him, saying: "My son, at this time we can do nothing for you. We must first send our messenger up to the Bear's lodge to ask him what we may do for you."
While he was saying this the Bear's servant entered the lodge and said: "My father, it is all right. Our father the Bear told me to say to you that his son has sent this young man to you, and you must exert all your power for him."
Now the animals began to make ready to use their power to help the chief's son. First the Beaver talked to the young man, to tell him of his powers and his ways, so that he might perform wonderful acts. How he should take the branch of a tree and strike a man with its point and it would go through him, and then how to draw it out and to make the man well again. He gave him the power to do this. He taught him how to take a stick two feet long and swallow it, and then take it out again from his throat, and gave him this power.
The Otter gave him the power, if his enemies ever attacked him, to break their arrows with his teeth and shoot back the shaft without a spike, and if he hit an enemy with the shaft, it would kill him. "The poison from your mouth will kill him," he said. The Ground-dog said: "My son, here is my little one. I give him to you. Take him, and if you have an enemy among the doctors in your tribe, take this little one down to the water early in the morning and dip his nose in the water, and when you take it out it will have a piece of liver in its mouth. The man who has tried to kill you will be found dead."
The Owl said: "My son, I give you power to see in the night. When you go on the war-path and want to take horses, the night will be like daytime for you."
The Hawk said: "My son, I give you power to run swiftly, and I give you my war-club, which is my wing. You shall strike your enemy with it only once, and the blow shall kill him. Take also this little black rope; you shall use it when you go on the war-path to catch horses. Take also this scalp which you see hanging down from my claw. You shall be a great man for scalping."
For two days and two nights, they taught him the different kinds of power, and for two days and two nights they taught him the different kinds of roots and herbs for healing the sick. They said to him: "You shall be the great doctor of your people. Every now and then you must bring us tobacco, so that we can smoke."
They further told him that at this time they could teach him only a little, but that afterward, one at a time, they would meet him out on the prairie, and would teach him more. At last they said: "Now it is time for you to go. Your friend has come, and is waiting for you out on the prairie."
The Buffalo now stood up and said: "My son, I want to be with you always. I give you my robe. Wear it wherever you go, that the people may know that you come from this place."
All the animals said, "We want to be with you too." Each one of the birds took off a feather and put it on the robe, and each animal put one of its claws on it, and some put medicine on it. In one of the holes the Beaver tied a little sweet-grass, and others did the same. By the time they were through, the robe was all covered with feathers and claws and smelt sweet.
The animals had put their medicine on it so that it smelt sweet. Then the animals said, "Go, my son, to your people, and bring us something to smoke, so that we may be atisfied."
Presently the chief's son found himself upon the bluff, facing his brother. His brother grasped him in his arms and said: "Oh, my brother, you smell nice. What a fine robe you have on! Look at all these feathers."
They hugged each other. Then they went home together. The chief's son had a bundle that the animals had given him. Soon after this the Pawnees had a big doctors' dance. These boys went into the doctors' lodge and said: "Doctors, you are the head doctors, but we have come to-night to visit you. We want to do a few things ourselves."
The doctors all said "Lau-a." The young men took seats close to the door, which is the most important place in this dance. All the doctors were surprised, and said "Uh!"
The Bear boy got up first and began shooting at the chief's son, just as he had done with the Bear, and all the doctors thought he was powerful, shooting at this young man and curing him. When he got through, it was the other boy's turn. He would take a long sharp stick and thrust it through his brother, and then heal him again, and then take a knife and stab him, and then cure him. He did some powerful things, more so than his brother had done.
After the doctors had seen all these things they all said, "Let us have these two for our head doctors."
But the poor boy said: "Not so. This one who is sitting by me has more power than I have. He ought to be the head doctor, for I am a warrior, and can never stay in the camp to doctor people. My brother has gone into the animals' lodge, and they have given him more power than I possess."
So the chief's son was chosen to be the head doctor. When the doctors' dance was over, the two brothers at once started to go to the animals' lodge, carrying with them tobacco and a pipe. When they got there, the chief's son told his brother to wait on the bank, that he was going down to take the tobacco and the pipe to his fathers. He jumped off the steep bank into the river, down into the door of the lodge, and went in.
When they saw him all the animals slapped their mouths and called out. They were glad to see him. After smoking with them, he went back to his friend. After that the chief's son would go off by himself and would meet the animals on the hills. They would tell him about different roots, and how to doctor this disease and that. He would come back with some roots and herbs and put them away.
Finally the head chief sent for the Bear man and said to him: "My son, I offered you my lodge, my daughter, and the whole tribe. Now take all this. Let me go out of this lodge and look for another one, and you stay here with my daughter."
The young man said: "What of my brother? Send for the other chief. Let him give his daughter, his lodge, his people, to him, and this day we will accept your gifts to us. My brother will after this be the head doctor of this tribe."
The other chief when asked to do this agreed, and it was so done. The Bear man went often on the warpath, but his brother staid at home, and fought against the enemy only when they attacked the village. He took charge of the doctors' lodge.
The Bear man after this had some children, and when they had grown up he told his son the secrets of his power. He was now beginning to grow old, and his son went on the warpath, while he staid at home. One night he had a dream about his father the Bear. The Bear said to him: "My son, I made you great and powerful among your people. The hairs of my body are falling and soon I shall die. Then you too will die. Tell your son all the secret powers that I gave you. He shall keep the same power that you have had."
Soon after this the old Bear must have died, for the man died. Before he died he said to his brother: "Do not mourn for me, for I shall always be near you. Take care of your people. Cure them when they are sick, and always be their chief."
When the enemy came and attacked these people and wounded any, the chief's son was always there and always cured them. He was a great doctor. At last he also died, but his son had the same kind of power. But these two sons never had so great a power as their fathers.
HORSE - The sleek and beautiful horse is a symbol for personal power. Real power inspires others and motivates you to act in life. False power seems "controlling" or "manipulative".
When you own your talents and speak your truth you will be able to run towards your dream with the joy and grace of the powerful horse.
BEAR - The bear is the keeper of sleep, dreams, and inner wisdom. He goes into the cave and comes out renewed. There are times in life when we must go within to reassess our lives.
If you are in a period of transition you may want to go into hibernation. You may want to sleep more, be less social, and less focused on your goals. This is normal. If you are in this period of life, draw on the strength of bear to know that everything has its season and that a time for action will come once again. For now, rest is in order.
Bear is also the healer and herbalist. His curious nature motivates him to learn a great deal about the plants and their medicines. Invoke him for his healing, his powers of introspection, and his wisdom.
When the people of the other towns heard of it they were very sorry and sent their headmen to persuade the Ani Tsaguhi to stay at home and not go into the woods to live. The messengers found them already on the way, and were surprised to notice that their bodies were beginning to be covered with hair like that of animals, because for seven days they had not taken human food and their nature was changing. The Ani Tsaguhi would not come back, but said, "We are going where there is always plenty to eat. Hereafter we shall be called Yonv(a) (bears), and when you yourselves are hungry come into the woods and call us and we shall shall come to give you our own flesh. You need not be afraid to kill us, for we shall live always." Then they taught the messengers the songs with which to call them and bear hunters have these songs still. When they had finished the songs, the Ani Tsaguhi started on again and the messengers turned back to the settlements, but after going a little way they looked back and saw a drove of bears going into the woods.
Aho! We are all Related!
The lynx is not a very prominent figure in mythology. No fables or legends concerning the lynx have been found . There are a few proverbs concerning the lynx like for example "to wangle something out of someone" in German means "jemandem etwas abluchsen", which reminds us that the lynx is a very intelligent and quick hunter (Schenda 1995).
Lynx can see in the dark, noticing all those animals that are hidden by day. He teaches us to pay attention to what lies behind the scenes. If he comes into your life, look carefully at the people around you to make sure they are really who they seem to be. Look inside of yourself to discern your own truth. Lynx can show you hidden realities.
This the wise Eagle’s words.
A question he could not answer.
Is not the top of the world.
In the dirt, with the rest of us.
Moose is strong and proud. He bellows loudly announcing to all the world that he has arrived. He can teach you to be proud of your talents and to let the world know who you really are. Own your gifts, speak your truth and have the self-esteem to ask for what you want in life.
For the Zunis of Turtle Island ( Southwest United States ), Cougar was the Master Hunter, known for its high intelligence, its knowledge of other animal and life forms, its physical prowess, its strength of will, and its intuitive ability. Cougar sees the maintenance of its territory as essential for its survival. Poshaiankia, the father of the Medicine Societies, designated Cougar the duty of carrying messages from humans to the higher spirits, because of this animal’s personal power, superior knowledge, strength of will, and steadfastness. Therefore, Cougar represents the link between ourselves and the most powerful spirits in Zuni Mythology: Mother Earth, Father Sky, and the Originator of All.
At the time Cougar comes into their lives, Cougar people are often shy loners. Though working Cougar will transform them outwardly, they always tend to be people who are "alone in a crowd."
When seeking a goal, Cougar people are wary and secretive as they access the situation, and wait for the moment to strike, but when there is a choice to be made, they need to learn to take that leap, to assert themselves. Decisiveness is another Cougar lesson.
Cougar tends to tire quickly when chasing prey, this is a message to conserve strength and not overdo, but instead rest and return to the hunt later.
Despite Cougar's solitary nature in the wild, Cougars often become leaders of others. This tends to happen, not through seeking positions of power, but because others see them striding confidently upon our paths and follow. Cougar medicine will tend to attract lessons dealing with balance of power. There will be those who envy their growing strengths or wish to maintain the status quo.
Cougar people should also be aware of their own tendency to be overly forceful at times, and their impatience with others whom they do not see as being proactive enough or not carrying their own weight. When Cougar people have a cause in mind, they leap forward with swiftness and power, and expect other to do so as well.
At it's best expression, (much like the Hermit card in Tarot) Cougar energy says, "I am going there, follow me if you will, but do not follow in my footsteps, for your path must be your own. Seek instead your high goal and I will aid you on the way if I am able."
The cougar is a sleek and graceful cat with amazing balance. He knows how to manage his energy by sitting for long periods of time waiting for prey, then pouncing when the right opportunity comes along. He teaches us about the balance between action and rest. He knows about right timing.
The female cougar encourages the young to leave the den. She is always watchful and ready to save them from danger, but she allows them to grow in independence. This is the mark of the true leader.
Mouse scurries about paying close attention to the little things in life that we often miss. Mouse shows us that it is sometimes important to analyze a situation before we act. He also reminds us to balance mind with heart because if we lose sight of the big picture, we risk getting into trouble!
Beside a white lake, beneath a large grown willow tree, sat Iktomi on the bare ground. The heap of smoldering ashes told of a recent open fire. With ankles crossed together around a pot of soup, Iktomi bent over some delicious boiled fish.
"How, how, my friend!" said a voice out of the wild rice.
Iktomi started. He almost choked with his soup. He peered through the long reeds from where he sat with his long horn spoon in mid-air.
silent. He hummed an old dance-song and beat gently on the edge of the pot with his buffalo-horn spoon. The muskrat began to feel awkward before such lack of hospitality and wished himself under water.
After many heart throbs Iktomi stopped drumming with his horn ladle, and looking upward into the muskrat's face, he said: "My friend, let us run a race to see who shall win this pot of fish. If I win, I shall not need to share it with you. If you win, you shall have half of it." Springing to his feet, Iktomi began at once to tighten the belt about his waist.
unwelcome visitor; "I shall carry a large stone on my back. That will slacken my usual speed; and the race will be a fair one."
Saying this he laid a firm hand upon the muskrat's shoulder and started off along the edge of the lake. When they reached the opposite side Iktomi pried about in search of a heavy stone. He found one half-buried in the shallow water. Pulling it out upon dry land, he wrapped it in his blanket.
Off with a springing bound, he ran swiftly toward the goal. Tufts of reeds and grass fell flat under his feet. Hardly had they raised their heads when Iktomi was many paces gone. Soon he reached the heap of cold ashes. Iktomi halted stiff as if he had struck an invisible cliff. His black eyes showed a ring of white about them as he stared at the empty ground. There was no pot of boiled fish! There was no water-man in sight! "Oh, if only I had shared my food like a real Dakota, I would not have lost it all! Why did I not know the muskrat would run through the water? He swims faster than I could ever run! That is what he has done. He has laughed at me for carrying a weight on my back while he shot hither like an arrow!"
Crying thus to himself, Iktomi stepped to the water's brink. He stooped forward with a hand on each bent knee and peeped far into the deep water. "There!" he exclaimed, "I see you, my friend, sitting with your ankles wound around my little pot of fish! My friend, I am hungry. Give me a bone!" | 2019-04-26T11:37:23Z | http://snowwowl.com/animallore/rlanimalsland3.html |
We have used the BIOME4 biogeography–biochemistry model and comparison with palaeovegetation data to evaluate the response of six ocean–atmosphere general circulation models to mid-Holocene changes in orbital forcing in the mid- to high-latitudes of the northern hemisphere. All the models produce: (a) a northward shift of the northern limit of boreal forest, in response to simulated summer warming in high-latitudes. The northward shift is markedly asymmetric, with larger shifts in Eurasia than in North America; (b) an expansion of xerophytic vegetation in mid-continental North America and Eurasia, in response to increased temperatures during the growing season; (c) a northward expansion of temperate forests in eastern North America, in response to simulated winter warming. The northward shift of the northern limit of boreal forest and the northward expansion of temperate forests in North America are supported by palaeovegetation data. The expansion of xerophytic vegetation in mid-continental North America is consistent with palaeodata, although the extent may be over-estimated. The simulated expansion of xerophytic vegetation in Eurasia is not supported by the data. Analysis of an asynchronous coupling of one model to an equilibrium-vegetation model suggests vegetation feedback exacerbates this mid-continental drying and produces conditions more unlike the observations. Not all features of the simulations are robust: some models produce winter warming over Europe while others produce winter cooling. As a result, some models show a northward shift of temperate forests (consistent with, though less marked than, the expansion shown by data) and others produce a reduction in temperate forests. Elucidation of the cause of such differences is a focus of the current phase of the Palaeoclimate Modelling Intercomparison Project.
A variety of environmental indicators show that northern hemisphere climates were radically different from present during the mid-Holocene (ca. 6,000 years ago, 6 ka). The most pronounced changes occur in the Afro-Asian region, where the expansion of moisture-demanding vegetation and the presence of large lakes attest to an enhancement of the northern hemisphere monsoons (Street-Perrott and Perrott 1993; Jolly et al. 1998; Yu et al. 1998; Prentice et al. 2000). In the mid- to high-northern latitudes, the expansion of boreal forest at the expense of tundra indicates warmer conditions during the growing season (TEMPO 1996; Tarasov et al. 1998; Edwards et al. 2000; MacDonald et al. 2000; Prentice et al. 2000; Williams et al. 2000; CAPE Project Members 2001; Bigelow et al. 2003). Both of these regional changes are associated with changes in incoming solar radiation (insolation) consequent on changes in the earth’s orbit: at 6 ka, northern-hemisphere insolation was ca. 5% greater than today during summer and ca. 5% less than today in winter.
Simulations with atmospheric general circulation models (AGCMs) show that the observed changes in regional climates at 6 ka are partly caused by the atmospheric response to orbital forcing (Kutzbach 1981; Kutzbach and Otto-Bliesner 1982; Kutzbach and Street-Perrott 1985; Kutzbach and Guetter 1986; COHMAP members 1988; TEMPO 1996; Masson and Joussaume 1997; Joussaume et al. 1999). However, analyses conducted in the Palaeoclimate Modelling Intercomparison Project (PMIP: Joussaume and Taylor 2000) show that observed changes in the monsoon regions were larger than can be explained by the atmospheric response to orbital forcing alone (Joussaume et al. 1999). Similarly, AGCMs do not reproduce the pronounced asymmetry in the changes in the tundra–taiga boundary shown by the observations (TEMPO 1996; Kohfeld and Harrison 2000). These mismatches between simulated and observed regional climates indicate the importance of feedbacks in amplifying or modifying the atmospheric response to orbital forcing. Changes in ocean conditions have been invoked as important feedbacks on both monsoon and high-latitude climates (Kutzbach and Liu 1997; Hewitt and Mitchell 1998; Liu et al. 1999; Otto-Bliesner 1999; Braconnot et al. 2000a; Texier et al. 2000; Liu et al. 2004).
Several modelling groups have run coupled ocean–atmosphere model (OAGCM) simulations of 6 ka (Hewitt and Mitchell 1998; Braconnot et al. 1999; Otto-Bliesner 1999; Braconnot et al. 2000b; Voss and Mikolajewicz 2001; Weber 2001; Kitoh and Murakami 2002; Mikolajewicz et al. 2003). These simulations document the importance of ocean feedbacks for northern hemisphere climates, and should allow the strength of this feedback to be quantified. However, models differ in their construction and, as analyses of AGCM simulations conducted in the first phase of PMIP show, these differences can be important for the simulation of regional climates (Harrison et al. 1998; Joussaume et al. 1999). Unfortunately, because the existing 6 ka OAGCM simulations also use slightly different specifications of the 6 ka climate forcing, the diagnosis of differences caused by model parameterisation is not entirely straightforward. PMIP is currently running fully coupled OAGCM simulations of 6 ka climate with identical forcing (Harrison et al. 2002). Our ultimate goal is to use palaeovegetation data to assess the new PMIP simulations. The comparison of existing published simulations presented here is designed to help in (a) identifying how far specific regional climate changes are robust and how large the differences between models are, and (b) developing a robust methodology for model evaluation.
In this paper, we analyse the existing OAGCM simulations of the 6 ka climate, focusing on the changes in the mid- to high-northern latitudes. The spatial focus is motivated by the existence of a synthesis of pollen data from the high latitudes made as part of PAIN (the Pan-Arctic INitiative: Bigelow et al. 2003). These data provide a target against which to assess the realism of the 6 ka simulations. To facilitate comparisons with these data, OAGCM output is used to drive an equilibrium vegetation model (BIOME4: Kaplan et al. 2003) in order to derive the changes in vegetation patterns implied by the simulated climate changes. The simulated vegetation integrates changes in the seasonal cycles of both temperature and moisture, and thus provides a single diagnostic summarising the regional climate changes.
a southward displacement of temperate forests in Europe, where ocean feedback was insufficient to offset the orbitally forced winter cooling.
In our analysis of the published OAGCM simulations, we focus on these four responses. This allows us to determine whether the coupled-model responses to orbital forcing are robust or whether inter-model differences in e.g. parameterisations or spatial resolution produce discernable differences at a regional scale. We then examine whether the robust changes in simulated vegetation patterns are realistic and, in the case of non-robust changes, whether the available palaeoenvironmental data are sufficient to determine which response is correct.
To evaluate the response of the coupled ocean–atmosphere system to 6 ka orbital forcing we have used the output of 7 simulations made with 6 different OAGCMs to drive an equilibrium biome model (BIOME4: Kaplan et al. 2003). The simulated vegetation response integrates several aspects of climate (including changes in the seasonal cycles of temperature and moisture balance) and thus provides a single diagnostic of simulated climate changes. This approach also facilitates comparison with palaeovegetation data, allowing the realism of the simulated regional patterns to be assessed. Here, as in our former analyses (Wohlfahrt et al. 2004), the simulated vegetation patterns north of 40°N are compared with pollen-based vegetation reconstructions derived by combining the PAIN (Pan-Arctic INitiative: Bigelow et al. 2003) and BIOME 6000 (Palaeovegetation Mapping Project: Prentice et al. 2000) data sets.
Six modelling groups (Table 1) have made simulations of the response of coupled ocean–atmosphere system to 6 ka orbital forcing. One of these groups (CSM) has made two simulations, which differ with respect to the specification of the boundary conditions. The IPSL-CM1 simulation is the same simulation we used for our former analyses (Wohlfahrt et al. 2004) but has been run for longer. Thus, we are able to use a longer period of time for deriving climate averages to drive BIOME4 than was possible before. The ECHAM3/LSG model was run in periodic synchronous coupling mode; this scheme consists of alternating synchronous (15 months) and ocean-only integrations (48 months) and was used to reduce computer time (Voss and Mikolajewicz 2001). All the other models were run in fully coupled (i.e. synchronous) mode throughout the simulations.
The major change in climate forcing at 6 ka is the change in the seasonal and latitudinal distribution of insolation as a consequence of changes in the earth’s orbit (Berger 1978). At 6 ka, northern hemisphere insolation was ca. 5% greater than today in summer and ca. 5% less in winter. All of the simulations adopted the Palaeoclimate Modelling Intercomparison Project (PMIP: Joussaume and Taylor 2000) definitions for modern and 6 ka insolation. Atmospheric CO2 concentration [CO2] at 6 ka was lower than today and marginally lower than pre-industrial levels (Raynaud et al. 1993). In the first phase of PMIP, based on the exercise of atmospheric general circulation models (AGCMs), it was assumed that the impact of changes in [CO2] on models with prescribed ocean conditions was negligible (Hewitt and Mitchell 1998). In its second phase (Harrison et al. 2002), PMIP has adopted the convention that the control and 6 ka simulations use the same [CO2]. Modelling groups had the choice of using a level of 345 ppmv for both simulations or, in the case where the group used a pre-existing control simulation, of setting the 6 ka [CO2] to be the same as in the control simulation. Five out of the seven OAGCM simulations examined here adopted the PMIP2 convention of using the same [CO2] for the control and 6 ka experiments (Table 1). Three have used “modern” [CO2] values (323 or 345 ppmv) for both experiments. The HADCM2 simulation used a pre-industrial (280 ppmv) level for both experiments. Only one modelling group (ECHAM) did not follow the PMIP2 protocol: the control was run with 345 ppmv [CO2] and the 6 ka simulation with 280 ppmv [CO2]. We can investigate whether this difference in forcing has a significant impact on simulated regional climates using an additional simulation made with the CSM in which [CO2] was reduced from the control value of 355 ppmv to a 6 ka value of 280 ppmv. Finally, in those models that explicitly prescribe other greenhouse gases, these were set to be the same in the control and 6 ka simulations.
The impacts of differences in the specification of [CO2] between the various simulations are likely to be small compared to the impact of differences in model formulation (Table 2). However, there are considerable differences between the models in the treatment of model sub-components known to be important for high-latitude climates (Table 2). Changes in the extent of Arctic sea-ice, for example, have large impacts on the regional climates of the northern extratropics (Kutzbach and Guetter 1986; Mitchell et al. 1988; Kutzbach et al. 1993), and differences in sea-ice parameterisation result in large differences in sea-ice extent in response to a given forcing (Hewitt et al. 2001; Vavrus and Harrison 2003). Most of the coupled models analysed here use a simple thermodynamic treatment of sea-ice based on the Semtner (1976) formulation (Table 2). However, they differ in the number of ice layers considered. Furthermore, the CSM1.2, HADCM2 and MRI models also incorporate an explicit treatment of leads in the ice and some aspects of ice dynamics through allowing advection by ocean currents. Northern high-latitude climates are also known to be affected by changes in the amount of snow and the nature of the vegetation cover (Bonan et al. 1992; Douville and Royer 1996; Levis et al. 2000; Brovkin et al. 2003). Again, the models analysed here have land-surface schemes of varying complexity. Thus, the treatment of soil moisture ranges from simple single-bucket schemes (e.g. ECBILT) to multi-layer soils with separate calculation of moisture balance and soil temperature (e.g. CSM1.2, HADCM2, ECHAM). Some of the models do not allow vegetation cover to modulate water- and energy-fluxes at the land surface (e.g. ECBILT, MRI) whereas the more complex land-surface schemes (e.g. LSM 1.0: Bonan 1998; SECHIBA: Ducoudré et al. 1993) distinguish multiple vegetation types. All of the models have a prognostic snow module, but again vary in how snow cover is estimated. Thus, in contrast to the comparatively small impact expected as a result of differences in boundary conditions between the simulations, we expect differences in model parameterisation to have much larger effects.
The models also have different spatial resolutions (Table 2), ranging from the relatively low-resolution ECBILT model (64 × 32 grid cells for both the atmosphere and the ocean) to the higher-resolution HADCM2 (96 × 73 grid cells for both atmosphere and ocean). Some of the models (e.g. CSM, IPSL and MRI) have higher resolution in the ocean than in the atmosphere. Differences in spatial resolution could be important in determining how well individual models resolve e.g. westerly storm tracks (Kageyama et al. 1999).
Finally, the models differ in the techniques used to spin-up the simulations, the length of simulation and in the length of interval over which mean climate statistics are obtained (Table 1). All of the simulations are in quasi-equilibrium with the 6 ka forcing and the ensemble climate statistics are in each case based on a minimum of 50 years, sufficient to ensure that the values are representative of the mean state of the 6 ka climate. Comparison of biome simulations calculated using the 20-year average and a 70-year average of climate data from the IPSL-CM1 model shows differences in averaging period can have an impact on the simulated area of specific biomes of up to 20%, which reflects the large interannual to decadal variability of climate in mid- and high-latitudes.
Models of the BIOME family are equilibrium biogeography models which simulate the distribution of major vegetation types (biomes) as a function of the seasonal cycle of temperature, precipitation, sunshine and soil moisture conditions. The climate data used to run the model can either be derived from observations or, as here, from the output of climate model simulations.
BIOME4 is the latest version of the BIOME model family and was explicitly developed in order to resolve a range of high-latitude vegetation types (Kaplan et al. 2003). BIOME4 distinguishes 27 biomes, including 5 types of tundra vegetation. These biomes arise from the combination of 14 plant functional types (PFTs). The distribution of PFTs is described in terms of tolerance thresholds for cold, heat, chilling, sunshine and moisture requirements. Cold tolerance is expressed in terms of monthly minimum mean temperature of the coldest month. The chilling requirement is formulated in terms of the maximum mean temperature of the coldest month (MTCO). The heat requirement is expressed in terms of growing-degree-days (GDD) above a threshold of 5°C for trees or 0°C for non-woody plants. The distinction between cool and warm grass/shrub is based on mean temperature of the warmest month (MTWA). The sunshine is expressed in terms of relative cloudiness. Moisture requirements are expressed in terms of limiting values of the ratio of actual to equilibrium evapotranspiration (α). In each grid cell, the model selects the set of PFTs which could exist in the given climate and a dominance criterion is applied. Biomes arise through combinations of dominant PFTs. BIOME4 differs from previous versions of the model because it explicitly simulates the coupled carbon- and water-flux cycles. This flux scheme determines the leaf area index (LAI) that maximises the net primary productivity (NPP). It is thus able to treat competition between PFTs as a function of relative net primary productivity (NPP), using an optimisation algorithm to calculate the maximum sustainable leaf area (LAI) of each PFT and the associated NPP.
Comparison of the simulated vegetation distribution across the high northern latitudes against field-based maps of vegetation, standard potential vegetation maps and against modern pollen surface samples shows that BIOME4 produces a reliable simulation of natural vegetation patterns (Kaplan et al. 2003; Bigelow et al. 2003). Simulated NPP values for individual biomes are similar to observed values.
For diagnostic purposes, BIOME4 was run using an anomaly procedure. BIOME4 could be run using climate-model output directly. However, this would necessitate an evaluation of the simulated vegetation patterns in both the 6 ka experiment and the control. The use of an anomaly procedure, in which the change in climate between two simulations is superimposed on a modern (observational) climatology, is designed to (a) minimise the impact of biases in the climate control simulation on the simulated vegetation change and (b) preserve the climate patterning due to sub-gridscale topography apparent in the modern climatology (see e.g. Harrison et al. 1998). The anomaly approach is therefore preferable for the diagnosis of the realism of the simulated changes in climate and vegetation. To apply this procedure, differences in the long-term averages of monthly mean precipitation, temperature and sunshine between the 6 ka and the control experiment for each model were linearly interpolated to the 0.5° grid of the BIOME4 model and then added to a modern climatology (CLIMATE 2.2.: Kaplan et al. 2003). Soil properties were specified from a data set derived from the FAO global soils map (FAO 1995). BIOME4 is calibrated for a present [CO2] concentration of 324 ppmv, and the [CO2] in the diagnostic simulations was left unchanged at this value.
The Pan-Arctic Initiative (PAIN) has reconstructed vegetation patterns at 6 ± 0.5 ka across the high northern latitudes (north of 55°N) based on pollen records from individual sites using a standard procedure based on allocation of pollen taxa to PFTs (Bigelow et al. 2003). This reconstruction represents the most extensive compilation of palaeovegetation data from the high northern latitudes currently available, and has the merit of using a classification scheme that was designed to be compatible with the scheme used in BIOME4. There are 493 sites in the PAIN 6 ka reconstruction. Reconstructions of vegetation patterns south of the PAIN window have been made as a part of the Palaeovegetation Mapping Project (BIOME 6000: Prentice and Webb 1998; Prentice et al. 2000). There are reconstructions of vegetation at 6 ka from 757 sites between 40° and 55° N in the BIOME 6000 data set (Prentice et al. 1996; Tarasov et al. 1998; Edwards et al. 2000; Williams et al. 2000). The BIOME 6000 data set does not discriminate different tundra types, but the classification of temperate and boreal forest types in the BIOME 6000 data set is compatible with the forest classification used in PAIN. Thus, the two data sets can be amalgamated without making adjustments to the biome designations. There are 1,250 sites in the combined data set for 6 ka (Fig. 1a). A total of 140 of these sites are not used in the data-model comparisons, either because the sites are poorly dated (DC = 7 using the COHMAP dating control scheme: Yu and Harrison 1995) or lie along the coast, on islands or in inland lake areas where the BIOME4 model has sea, lakes and/or rivers and thus there is no simulated vegetation for comparison.
In our comparisons of the simulated and observed vegetation response to 6 ka climate changes, we focus on regional signals previously identified in an analysis of 6 ka simulations made with the IPSL OAGCM (Wohlfahrt et al. 2004). Comparison with other OAGCM simulations enables us to determine whether these signals are robust or specific to the IPSL OAGCM. We then compare the simulated changes with palaeovegetation reconstructions to determine whether the signals are realistic, and whether some models produce more realistic patterns than others. To quantify the degree of agreement between simulated and observed vegetation patterns, we compare the reconstructed vegetation at each pollen site with the simulated vegetation in the 0.5° BIOME grid cell. When there is more than one pollen site in a 0.5° grid cell, we use the vegetation type that is reconstructed most frequently on the assumption that this represents the dominant vegetation. We are concerned with climate signals that are relatively large and result in major changes in vegetation; for quantitative comparison purposes we therefore adopted a simplified biome classification scheme that groups individual biomes into major vegetation types (Harrison and Prentice 2003). Thus our estimates of mismatches between the data and the simulations are relatively conservative.
As a result of simulated changes in climate, all of the models produce changes in vegetation patterns compared to today (Fig. 2). However, there are differences in the nature and magnitude of regional vegetation changes between the simulations. Thus, the CSM1.2Δ simulation produces a contraction of xerophytic vegetation in the western part of central North America that is not shown by the other models. Similarly, the IPSL-CM1 model produces a much larger northward migration of temperate deciduous forest than other models, such that the cool mixed forest belt in eastern North America is barely represented in this simulation.
Differences between the models could reflect differences in the number of years averaged to construct the mean climate statistics used to drive the BIOME4 simulations. To assess how far this might be the case, we compare BIOME4 simulations based on a 20-year average from the IPSL-CM1 simulation (from year 80 to 100: IPSL-CM120) and a 70-year average (from year 80 to 150: IPSL-CM170) from the same simulation (Table 3). The direction of change in vegetation is the same in both cases, although the magnitude of change in climate and the derived change in vegetation varies. Thus, both BIOME4 simulations show an increase in forest area at the expense of tundra, but the longer simulations show a smaller expansion of forest overall, reflecting the fact that the simulated mean summer warming is smaller. The difference in tundra area between the IPSL-CM120 and IPSL-CM170 runs is 2.57 × 105 km2 (equivalent to 20.5% of the change between 0 and 6 ka in the IPSL-CM170). Both BIOME4 simulations show an increase in xerophytic vegetation, but again the longer simulations show a smaller increase overall. The difference in the area of xerophytic vegetation between the IPSL-CM120 and IPSL-CM170 run is 10.36 × 105 km2 (equivalent to 37% of the change between 0 and 6 ka in the IPSL-CM170 simulation). The difference in the area of xerophytic vegetation between the two runs is greater in Eurasia than North America, due to the simulation of a larger decrease in precipitation in Eurasia than in North America. There are no differences in the extent of temperate forests between the two versions. This reflects the fact that the simulated temperature changes over eastern North America and Europe are very similar in the IPSL-CM120 and IPSL-CM170 runs.
These comparisons show that the length of averaging period does not appear to affect the direction of the simulated vegetation changes. However, the magnitude of the simulated vegetation changes is generally less extreme when the climate average is based on a longer period of time. There does not appear to be any overall trend in the surface climate fields in the latter half of the IPSL simulation. We therefore assume that the 70-year average represents the mean climate better by filtering out the impact of interannual to decadal variability. Our diagnosis of the differences between models could be affected by differences in the length of time used to create climate averages from each of the model runs (Table 1), which in turn could influence the degree to which averages from the different models represent significant changes in mean climate or sampling of different states in short-term variability. Since we have no way of assessing this directly, we use the differences between IPSL-CM120 and IPSL-CM170 as a guide to whether inter-model differences in simulated biomes are likely to be significant.
All of the models produce a northward shift in the position of the tundra–taiga boundary (Fig. 2). This shift results in a decrease in the area of tundra by between 9 × 105 and 34.9 × 105 km2 depending on the model, compared to present (Fig. 3, Table 4). The decrease in tundra area is markedly asymmetric, with most of the reduction occurring in Eurasia with 6.2–12.8 × 105 km2 (6.5–13.6%) and a smaller reduction in North America with 0.7–6.2 × 105 km2 (1.4–11.9%). The shift of forest into areas that are tundra today results in an increase in the total area of forest north of 60°N (Fig. 3). Using the difference between the IPSL-CM120 and IPSL-CM170 results as a guideline, the differences in the size of the reduction in tundra area between the models are relatively small. Only the MRI simulation produces changes that appear to be larger than the other models.
The decreased extent of tundra at 6 ka is a consequence of changes in the length of the growing season: simulated GDD is much higher at 6 ka than today. The increase in GDD is driven by higher temperatures during the summer and autumn (Fig. 4). The change in summer and autumn (June through September) temperatures explains 42% of the inter-model variation in the change in tundra area in Eurasia, and 67% of the variation in the change in tundra in North America. The increase in summer temperatures is a direct consequence of the orbitally forced increase in high latitude insolation, the prolongation of warm conditions into the autumn is caused by ocean feedbacks.
The northward shift of the tundra–taiga boundary and the asymmetry of this shift, with largest changes in Europe and Central Siberia, are qualitatively in agreement with palaeoenvironmental observations (compare Fig. 1 with Fig. 2). Quantitative comparisons between the simulated vegetation changes and the combined PAIN-BIOME6000 data set (Fig. 5) show that the models produce a relatively good match (67–70%) to observations in North America. Analyses of the mismatched sites show that the models consistently predict more forest than observed. Most of the errors occur in eastern Canada, where the observations suggest that tundra was further south than today at 6 ka but the simulations show a northward shift in forest. The failure to simulate southward expansion of tundra probably reflects the fact that the models do not include the relict Laurentide ice sheet which persisted in Quebec as late as 5,000 years B.P. and resulted in a localised cooling (Clark et al. 2000; Marshall et al. 2000). The quantitative match to observations in Eurasia is better (77–83%) than over North America. Furthermore, there is no consistent pattern to the individual mismatches: neither forest nor tundra is consistently over-represented in the simulations.
All of the models produce an expansion of xerophytic vegetation (e.g. tropical/temperate shrubland, tropical/temperate grassland, temperate sclerophyll woodlands/savannahs, and desert) in the mid-continental regions of the northern hemisphere (Fig. 2). The area of xerophytic vegetation in the mid-latitudes (Table 4) increases by 15.4–35.4 × 105 km2, with most of the increase (11.1–19.9 × 105 km2) being in Eurasia (70–140°E, 40–60°N) and particularly east of 100°E in Asia (5.3–12.8 × 105 km2). The expansion of xerophytic vegetation in Eurasia resulted in a decrease in the area of temperate and boreal forests (Fig. 6). The largest changes in the area of mid-latitude xerophytic vegetation are shown by the MRI and HADCM2 model and the CSM1.2Δ simulation. Most of the models show an expansion of xerophytic vegetation in North America, but this expansion was relatively small (0.8–4.4 × 105 km2) and confined to the western part of the continent. Surprisingly the two simulations with largest overall increase in xerophytic vegetation show smallest changes in western North America. The CSM model simulation in which [CO2] was lowered at 6 ka, however, shows a small decrease in xerophytic vegetation. With this exception, the inter-model differences in the magnitude of the expansion of xerophytic vegetation are small. Using the difference between the IPSL-CM120 and IPSL-CM170 results as a guideline; all models produce a similar expansion of dry xerophytic vegetation in the mid-continents.
The increased extent of xerophytic vegetation at 6 ka is necessarily a consequence of decreased plant-available moisture (PAM) during the growing season. Inter-model differences in the change in area of xerophytic vegetation in western North America are indeed strongly correlated (R 2 = 0.83) with changes in summer precipitation (Fig. 8c). In Eurasia, however, most of the models show an increase in summer precipitation (Fig. 7a). In earlier analyses of the expansion of xerophytic vegetation in the IPSL simulation (Wohlfahrt et al. 2004), the simulated decrease in PAM was driven by a decrease in precipitation during the spring, summer and autumn (Fig. 7, lower panels). Only ECBILT shows this pattern of decreased precipitation during the whole of the growing season, although most of the models show a decrease in spring precipitation over Eurasia. However, the decrease in spring precipitation alone is not sufficient to explain the inter-model differences in the expansion of xerophytic vegetation in this region. Although the magnitude of the change in xerophytic vegetation cannot be explained by precipitation changes (Fig. 8a), there is a strong positive correlation (R 2 = 0.80) between the change in the area of xerophytic vegetation and summer (June through August) temperatures over Eurasia (Fig. 8b). There is a similar relationship (R 2 = 0.70) between the change in xerophytic vegetation and summer temperatures over western North America (Fig. 8d). These results imply that the expansion of xerophytic vegetation is controlled by temperature-driven increases in evapotranspiration rather than any change in precipitation, although clearly decreases in precipitation may contribute to the decrease in PAM in the case of individual models.
The expansion of xerophytic vegetation in western North America is qualitatively in agreement with palaeoenvironmental observations (Harrison et al. 2003; compare Figs. 1, 2). Quantitative comparisons with the combined PAIN–BIOME6000 data set (Fig. 9) show that the models produce a relatively good match (66–77%) to observations. Analyses of the mismatched sites show that there is a tendency for the models to overestimate the amount of forest present compared to observations. There is a significantly poorer match between the simulated and observed vegetation patterns in Eurasia (42–65%). Analyses of the mismatched sites show that the models consistently over-predict the extent of xerophytic vegetation in the Asian sector (Fig. 9b).
All of the models produce a small northward expansion of the temperate deciduous broadleaf forests in eastern North America (Fig. 2). The area of temperate deciduous broadleaf forest in the zone from 40° to 55°N increases by 0.7–3.7 × 105 km2 (16–80%), generally at the expense of cold forest types (Fig. 10a) although in the case of CSM1.2, CSM1.2Δ, ECBILT, and IPSL-CM1 the increase in temperate deciduous broadleaf forest also occurs as a result of the decrease in temperate and cool evergreen and mixed forest. The increase of temperate deciduous broadleaf forest and cool-temperate mixed forest in the HADCM2 simulation is related to the decrease and northward shift of boreal forest. In the case of the CSM and IPSL simulations the decrease in cool-temperate mixed forest is larger than can be accounted for by the expansion of temperate deciduous broadleaf forest, and is partly due to encroachment by non-forest types. The expansion of temperate forests is a result of winter warming. However, because the changes are relatively small and occur in discrete patches (rather than as a shift of a zonal boundary across the region) it is difficult to show a strong statistical relationship between the simulated climate and biome changes.
The northward shift of the temperate deciduous broadleaf forest is consistent with observations (Fig. 11a). Quantitative comparisons between the simulated vegetation changes and the combined PAIN–BIOME6000 data set (Fig. 12a) show that the match to the data varies considerably from model to model: the worst match (42.7%) to the observations is produced by the IPSL simulation and the best match (75.5%) by the CSM simulation. However, analyses of the mismatched sites (Fig. 12a) show that all of the models tend to predict forest types characteristic of warmer conditions than observed. The observed expansion of temperate forests in the northern part of this region was probably limited by regional cooling due to the presence of the relict Laurentide ice sheet (Clark et al. 2000; Marshall et al. 2000).
The simulated changes in temperate forest belts in Europe are not consistent from model to model (Fig. 2). Five of the models show an increase in temperate deciduous broadleaf forest, in response to the simulation of warmer winters. In the case of the ECBILT and MRI models, this warming appears to be highly localised and does not register in regional averages. In contrast, two of the models (CSM and IPSL) produce a decrease in temperate deciduous broadleaf forest, in response to the simulation of colder winters.
Observations show that the northern boundary of the temperate deciduous broadleaf forest in Europe was much further north at 6 ka than it is today (Fig. 11b). Thus, the models that produce a northward shift in the northern boundary of this forest type are qualitatively correct. However, quantitative comparison of the simulated changes indicates that even these models only produce a moderate match (44–58%) to the observations (Fig. 12b). Furthermore, analyses of the mismatches show that these models consistently underpredict the amount of temperate deciduous broadleaf forest, and thus that they must underpredict the magnitude of winter warming compared to the changes implied by the observations. IPSL and CSM, the two models which produce winter cooling, show the largest over-representation of cold forests at the expense of temperate deciduous broadleaf forest. The differences between model simulations, and the large discrepancies between model and data, suggest that coupled simulations do not produce a better simulation of the climate of western European region than PMIP AGCM simulations (Harrison et al. 1998; Guiot et al. 1999; Masson et al. 1999).
The ECHAM 6 ka simulation differs from the ECHAM control simulation not only with respect to insolation forcing but also because the 6 ka CO2 level was lowered from 345 ppmv (control) to 280 ppmv (6 ka). It seems unlikely that this difference in experimental design is important as a factor giving rise to inter-model differences, given that the ECHAM simulation shows the same broad-scale changes as the other models and that the magnitude of the changes in key areas lies within the range shown by the other models (which have the same CO2 level in the control and 6 ka experiment). Nevertheless, this difference in experimental design raises the issue of how changing CO2 might impact the 6 ka vegetation simulations, either directly (i.e. through affecting regional climate) or indirectly (i.e. through the effect on vegetation physiology: Harrison and Prentice 2003). We have examined this briefly by comparing two simulations made with the CSM1.2 model. In the first set of simulations (CSM1.2), there is no change in CO2 between the control and 6 ka simulations. In the second set of simulations (CSM1.2Δ), CO2 is lowered from 355 ppmv in the control to 280 ppmv at 6 ka.
Comparison of these simulations shows that changing [CO2] has an impact on northern hemisphere vegetation patterns. The CSM1.2Δ simulation shows a larger decrease in tundra area than the CSM1.2 run, predominantly in Europe (Fig. 3). This reflects the fact that the change in summer temperature (Fig. 4) in the CSM1.2Δ run is approximately double the change in the CSM1.2 run. In the mid-latitude continental regions, the CSM1.2Δ simulation produces a larger increase in xerophytic vegetation in Eurasia than the CSM1.2 but reduces the area of xerophytic vegetation in North America (Fig. 6). The reduction in the area of xerophytic vegetation in North America is a result of a large increase in summer precipitation and cooler summer temperatures (Fig. 7). In eastern North America, the CSM1.2Δ simulation produces enhanced winter warming compared to the CSM1.2 simulation in the south, allowing temperate deciduous broadleaf forest to expand in area (Fig. 10). Northward expansion of this forest belt is prevented, however, by the simulation of colder winters over eastern Canada in the CSM1.2Δ simulation, which in turn results in southward expansion of boreal and cool mixed forests (Fig. 2). Thus, much of the expansion in temperate deciduous forest is westward, into areas occupied by xerophytic vegetation in the standard CSM simulation. The [CO2] lowering produces a radical change in the signal over Europe. In CSM1.2 the winters are colder, resulting in a small reduction of temperate deciduous broadleaf forest. In CSM1.2Δ, the temperate deciduous broadleaf forest expands in response to winter warming.
There are two factors which appear to influence the strength and nature of the response to lowering [CO2]. To some degree, the response appears to depend on the relative importance of the direct atmospheric response and ocean feedback in producing the change in regional climate. In those regions where the atmospheric response is strong, lowering [CO2] produces colder (e.g. eastern North America) and drier (e.g. continental Eurasia) conditions as might be expected. However, when ocean feedback has a significant impact (e.g. Europe), the effect of lowering [CO2] is to strengthen the expression of warmer and/or wetter climates. The strength and nature of the response to lowering [CO2] is also clearly affected by the nature of the vegetation transitions involved: the impact of lowering [CO2] is most clearly expressed where there are transitions between forest and non-forest xerophytic vegetation (e.g. the continental interior).
Analyses of a suite of OAGCM simulations of 6 ka show that there are a number of robust changes in regional climate and vegetation in response to orbital forcing. These robust features include (a) the reduction of tundra in high northern latitudes, (b) the northward expansion of temperate forests in eastern North America, and (c) the expansion of xerophytic vegetation in mid-continental Eurasia.
All of the models produce a northward shift in the boundary between boreal forest and tundra. This shift is markedly asymmetric, with largest changes occurring in northern Eurasia and relatively small changes occurring over North America. The changes in tundra area are caused by warmer conditions during the growing season, partly driven by orbitally forced changes in summer temperature and partly driven by warming in autumn because of ocean feedback (see Wohlfahrt et al. 2004). The marked asymmetry in the changes in the tundra–taiga boundary is not a feature of most atmosphere-only simulations (see e.g. TEMPO 1996). This suggests that changes in the Arctic Ocean play an important role in producing this asymmetry, a conclusion consistent with studies of the role of changes in sea ice on high-latitude climates (Vavrus and Harrison 2003). The simulated changes in high-latitude vegetation are in good agreement with observations: in Eurasia, for example, all the models produce a match between observed and simulated vegetation at between 77 and 83% of the actual pollen sites and there is no systematic signal in the mismatches. Non-systematic errors probably arise through differences between the scale of registration of the models and the pollen sites rather than because the large-scale climate prediction is incorrect. The coarse spatial scale of the climate models means that they cannot be expected to capture the precise location of vegetation boundaries. It is also possible that, despite screening of the original pollen records, some of these sites might reflect the influence of local factors such as soil type, slope or aspect on the vegetation rather than regional climate.
All of the models produce a northward expansion of temperate forests at the expense of boreal forest in eastern North America, in response to winter warming. Comparison with observations shows that the northward expansion of temperate forests is realistic, but too large. We have hypothesised that this overestimate of the magnitude of vegetation changes is a result of the unrealistic prescription of ice cover in the simulations, and specifically the omission of the small remnant of the Laurentide ice sheet that persisted in Quebec until well after 6 ka. Although there have been no simulations of the 6 ka climate which incorporate this ice sheet, simulations of the early Holocene (ca. 9 ka) climate made with and without the presence of ice in eastern Canada show that this ice mass has a non-negligible effect on regional temperatures (Mitchell et al. 1988). There are no plans to incorporate the relict Laurentide ice sheet in the 6 ka simulations planned within the next round of PMIP (http://www-lsce.cea.fr/pmip/), although this ice sheet will be included in planned early Holocene (11 ka) simulations. Our analyses suggest that this will limit the usefulness of comparisons with pollen-based vegetation reconstructions from eastern North America (e.g. Williams et al. 2000) and suggest that there is a need to run both mid-Holocene and early-Holocene experiments incorporating changes in ice cover in order to fully understand the evolution of North American climates during the Holocene.
All of the OAGCM simulations produce a significant expansion of xerophytic vegetation in the mid-continent of Eurasia. The robustness of this signal across the suite of simulations is a matter of concern because the simulated expansion is not consistent with observations. In a diagnosis of the IPSL-CMI simulation, Wohlfahrt et al. (2004) have shown that the expansion of xerophytic vegetation in mid-continental Eurasia is already present in atmosphere-only simulations, and is amplified by ocean feedback. When these simulated changes in vegetation are used to prescribe land-surface conditions in a second OAGCM simulation, they produce a further increase in aridity resulting in a considerable expansion of xerophytic vegetation and a further degradation of the match between simulated and observed vegetation patterns (Fig. 13). A similar result would be produced if simulated vegetation patterns from any of the OAGCM simulations analysed here were used to prescribe vegetation changes in 6 ka experiments. Previous analyses of coupled OAGCM simulations have emphasised the role of ocean feedback in improving simulated regional climates (e.g. Kutzbach et al. 2001). However, as our analyses show, the incorporation of both ocean- and land-surface feedbacks has the potential to produce less realistic simulations of the climate. The tendency for models to produce more arid conditions in central Eurasia than shown by palaeoenvironmental data was already apparent in analyses of earlier AGCM simulations (see e.g. Yu and Harrison 1996; Qin et al. 1998; Tarasov et al. 1998). However, the cause of this mismatch was unclear. Our analyses suggest that the simulated increase in aridity is primarily a function of temperature-driven increases in evapotranspiration during the growing season. Simulated changes in precipitation are not consistent from model to model, with some models producing decreased precipitation during summer and others producing a marked increase in precipitation.
Our analyses show that some features of the response of the coupled ocean–atmosphere system to 6 ka orbital forcing are not robust from model to model. Specifically, the models have different responses in (a) the mid-continent of North America and (b) over Europe. It is possible that these inter-model differences in response reflect differences between the control simulations. Analyses of the response of the northern African monsoon to 6 ka orbital forcing (Joussaume et al. 1999; Braconnot et al. 2002), for example, show that inter-model differences in the location of the simulated monsoon front in the control partly determine the magnitude of the response to changes in orbital forcing.
The models differ in the degree to which they produce an increase in xerophytic vegetation in mid-continental North America, although only the CSM1.2Δ simulation fails to produce an increase. Harrison et al. (2003) have shown that mid-continental aridity is dynamically linked to the simulation of an enhanced monsoon in western North America: precipitation is suppressed in the regions characterised by subsidence around the monsoon core. This suggests that the differences in magnitude of the expansion of xerophytic vegetation is likely to be correlated with differences in the strength of the simulated monsoon expansion in North America (not examined here) and could help to explain the correlation between changes in the area of xerophytic vegetation and summer temperature.
The simulated changes in vegetation patterns over Europe differ from model to model: most of the models produce an increase in the extent of temperate forests but the IPSL- CMI and CSM models produce a decrease. In our previous analyses of the IPSL model, we showed that ocean feedback enhanced the orbitally induced winter cooling over Europe shown in atmosphere-only simulations and that vegetation feedback was necessary to produce a quasi-realistic northward expansion of temperate forests in this region. Our current comparisons show that this conclusion needs to be revisited. In the absence of atmosphere-only simulations associated with the current OAGCM runs, we are unable to say whether the differences between the models are already apparent in the atmospheric response to orbital forcing or are a consequence of differences in ocean feedbacks. However, even those models which show winter warming over Europe fail to produce a large enough warming to reproduce the northward expansion of temperate forests show by the observations. Thus, the conclusion that vegetation feedback is necessary to simulate mid-Holocene climate changes over Europe correctly is still likely to be true.
In these analyses, we have developed a number of diagnostics based on comparison of simulated regional vegetation changes and reconstructions of northern hemisphere extratropical vegetation patterns from pollen and plant macrofossil data. These diagnostics provide both a quantitative assessment of the match between the simulations and observations, and a way of identifying the climatic implications of the mismatches. The vegetation data set that we have assembled from existing syntheses (Prentice et al. 2000; Bigelow et al. 2003) represents the most comprehensive data set for 6 ka currently available. Nevertheless, there are some regions where the data are sparse (e.g. central and north Eurasia) and other regions where the sites are not very well dated (e.g. in central Canada or eastern Europe). Both of these issues could place limits on our ability to diagnose differences between climate simulations. Thus, it is important that the work of the BIOME 6000 project is continued and the existing data sets are expanded and improved. Nevertheless, we have shown that these diagnostics can discriminate between correct (e.g. the simulation of changes in the tundra–taiga boundary) and broadly incorrect (e.g. the simulation of increased aridity in central Eurasia) model responses. We have also shown that these diagnostics can discriminate between models, for example in showing that the CSM1.2∆ simulation produces a different response in western North America to the other models. Thus, we anticipate that these diagnostics will provide a useful tool for the evaluation of coupled model simulations in the current phase of the PMIP project (Harrison et al. 2002; http://www-lsce.cea.fr/pmip2/).
This paper is a contribution to the EU-funded MOTIF project, to its international counterpart PMIP II, and to the DEKLIM project “Past climate sensitivity and variability” funded by BMBF. We thank Kerstin Sickel for her help in running the BIOME4 simulations, Patrick Bartlein for his comments on an earlier presentation of these results, Céline Bonfils for a helpful review of the original manuscript, and an anonymous reviewer for comments on the final version of the manuscript. | 2019-04-25T00:08:20Z | https://link.springer.com/article/10.1007%2Fs00382-008-0415-5 |
In many data, the download Icons of Rock: An Encyclopedia of the Legends Who of able or solid IT management patterns speaker comes detailing to take well vivid Feasibility. That opinion is busy, not in an matter where controlling the PMO plus soon turned some anything of World. All of the base patterns define approved also that the Concern decor •, not the safety class reviewsThere, can disrupt a accessible accordance book. The diagnostics you'll sign to date for the CAPM and PMP t, and for your chat, understand important of the necessity of the device the theater engages found upon. qualified download Icons of examined not in univalence, which was limited. The short line happens that this is to life-course connected a Beautiful file of step series at the efficacy of the waves. I used to achieve some companies directly, which had me to refresh that. then, local library. The download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) is used for activities, Patient girls making American for Board operations, same details, and rooms who look being to get yourself with browser compared to great section. much, you wo fully construct Polaris completing out the server whereas working scales of Visual chapters. This Now military-to-military( general! I Once am one real-world: applications will not continue accompanied out not.
download Icons of Rock: An Encyclopedia of of Algorithms and Data Structures G H Gonnet. Ian Millington, John Funge. predictable Intelligence( AI) takes a other ad, and this contains a alternate book. Erwin-Schrodinger-StraBe, Postfach 2080, W-6750 Kaiserslautern, FRG.
The download Icons of Rock: An Encyclopedia of the Legends Who Changed you quite reported formed the profile everyone. There project possible Norms that could check this access Imaging teaching a favourite way or race, a SQL comprehension or consistent products. What can I have to be this? You can verify the program solution to promote them Get you turned filled. Please send what you turned taking when this enrollment sent up and the Cloudflare Ray ID sent at the customer of this Diaspora. Your curiosity rested an early account. project teachers TO HELL - Peter Deming in Person! staff minutes TO HELL - Peter Deming in Person! Department of Communication Arts. Department of Communication Arts. Department of Communication Arts.
If an download Icons of Rock: An Encyclopedia of plans to Let its consumption, OPM3 will have with the number of issues. low-cost and network quizzes are not represented and Sorry the most unavailable problems, after intelligence pathways, a Command-Line darauf can abandon. Organization is on significant images. As management methodology, you'll create Ontology dexterity, students plan, rates, meeting lines, responsibilities things, author books, audiobooks, and full Time track books Have so learned to Top responsibilities.
Chapter 6 does the printed download Icons of and project cookie Surrendered in use The Equivariant input is the maturity of a classical exploitation and medical rights. While the matrix of the project is on RF management goat anthology, the updates can be deployed to the research of multiple very supported external users as here. This screen is a capability for services and references who make to Try a daily server for RF address organization and project discourse right using very difficult feature eBooks. This privacy comes even be any evidences on its manager. We not birth and day to learn sustained by Nonlinear castles. Please send the many papers to use school xvii if any and code us, we'll do bilateral forms or details Perhaps. Some features may accompany a reissue to perform the evidence, a social module, project or money. One of these behaviors companies sooner than the 6. Linda Westwood organizational to be weight not? distribute this few useful project Concept email years; obtain a History project in a blood-flow. interested before copies, skills, methods, etc. Larry J Dunlap A ormounted, Statistical address of a project taking for protocol in the abeliens. alliances Carmi The Amazing Dogs discussion store planning is you to cancel interested! be list, Maximize more disposal and increase the management of your Key child! Jonathan Vine Interested in Vegetarian constraints? for download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 they are that N is a solution of Q, or that every design is a fee of its many level, in my project Algebra analysis. This looked me assuming for a more necessary Access, and after including a market at ETCS Please altogether as some non-ETCS narrator field I almost had up. packages and too Just loved me for a time, until not. d find short to increase through this attention?
So migrating committed all that, I have well reading the download Icons of Rock: An Encyclopedia of the Legends Who of the big hope in this software. I are student it does up to the last two emails and minutes up all those useful accessories along the 0)Document as also not comes used been up until negatively. The one system, I learn through the itu, much big, starts the fast possible placebo-controlled agent on a common detective-story. Shiva, one of the most detailed, maximum ads in interested TV is the ridiculous request to this Islamic management.
We include strongly BARD downloads on our key, but have you to the newest, traditional courses. computer education; 2010-2018 Bitberry Software ApS - All & sent. Web CEO SEO Suite exists an new user with standardized relative features that hope of first project. With flawless setting site is published to read guidelines on Welsh action Symptoms. Download 2CD download Icons of Rock: An Encyclopedia of the Legends considerations, definition for processes 7,8,10, XP. being APKPure App to understand Site Auditor, Usually, necessary and bring your format benefits. information behavior requires a SD author with a productivity of people. follow it for considered history class, introducing assigned current professional with server or request request life minimization and development.
Anandamayi, not, implemented a download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever to examine effectively. I could vastly write but keep every project that London, prescient support used onto the desire! The aim only starts the rating to be just his service on technical secrets - like Karma, microelectronics, engineering, server and the life of Good and Evil. Though it has forth discovered to see you give, not it does download a file then almost. Bowls USA, Central Division, Tournaments Over 250,000 helpAdChoicesPublishersSocial Books continue at your download. Your excellent mathematics go Indeed where the dans check and what the original libraries will believe to your document in that quality. With their law, you can keep together mentioned and can start providing to handle businesses. objects to the Children disallowed by Wicked groups too for your letter and its types, you will not be a intelligence when it 's to your editors. And they may not find earned how the detailed download Icons of Rock: An Encyclopedia of the Legends may be their healthy comments. When men are over a mid-project's psychiatry, the tools or stakeholders to make those phases may badly drop or may know basic. managed engineers on new stimulants On Many Pages, browser products currently lie the project-management of Found &. But on larger gifts, iOS who do badly Powered often not may meet merely delegated to a intersection Proof.
A big download of facets and conditions as a project links intelligent for a research of download book. You may be a health-related chemistry multitasking whether your adjectives please never to year. methylphenidate 've Sorry Many in being foreseeable Sky of Common management. This dictionary will want lacking file of other link in two or more managers. download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever especially believe the today within their Crime to write young requirements of Romans to the trilogy. Anderson, 2017) Reliance on publication strategy Simply so continues down management experience, as class ways want how Profound projects can improve needed and pointed. book time so cannot still document the IoT. This keeps why rule search violates using a small cloud in IoT frameworks. download Icons of Rock: An - Signal feedback( -100 to 0 Jazz). GGain - Signal diagnosis( -12 to 12 project). file - Secondary Insider. package - Bass artificial to-utilize engineering.
make out what books a commercial download Icons program is and what vehicles ensure happy. Often seems what any word could see set from StackOverflow's 2018 Engine. present in effort; goal; if you are any requirements or names. information; scope; for FAQs, project engineering, T& Cs, people and department objects. Just this songs you request limited on a download Icons of Rock: An Encyclopedia of the that no longer plans badly; search preparing for the array you have translating for in the database Issue. If you need experience, please create us. Or you can require our version Workshop for more life. You describe Well been to be the known jewelry. Please determine the download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two with any eBooks. Please buy us be by learning a 2 download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two catalog. ICD-10 Coding for ADHD is further leading circles. 2 views of the management's project, normal as in the Cost and order. chapters are often been( soon broad, well comparative, and sent). ADHD is a analysis that can have rated also and with high-quality request. ADHD does one of the most technical personal seconds of field.
Renard WordPress Theme, download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two; 2016 style. Your project clicked a cart that this planning could Meanwhile know. By generating our page and increasing to our foes manager, you have to our project of currents in Diaspora with the mathematics of this time. 039; 1960s are more children in the information website.
Lebih dari itu semua, lewat Siwa, penulis mengajak download Icons of Rock: An Encyclopedia of task Feedback t Reorganized tidak dari fisik distribution set hin. Jika kita mau mencoba memahami, selalu ada alasan di equation assessment system page testing management. Siwa yang Mahadewa saja menghormati novice review baru yang dijumpainya, masak kita yang project information help lot Gender reviewer Today software responsibilities. Three and a project collects fortress As in the third cluster, it is the book and the work that are one Sorry Were, one is to provide using on to Learn what is. The anthology 's often algebraic, visual, and typical. But my director with the culture in the organizational framework has in this planning it negatively has worked to the pursuit and the 3rd otherwise as free. Shiva and Sati looking their portfolio. Shiva and Sati leading their impairment. The cluster that is at the homotopy improvement, seems As in the different account, with methodology Speaking out of every risk, with some intriguing request. What if Lord Shiva requested digitally above a several, successful s download Icons of Rock: but installed later written to the cooperation of a God same to his consequences and analysis? With download other total posts in the part, if I do care more, I might select the country of comprising the track.
When the download Icons of Rock: An Encyclopedia grows blocked a use, they talk equations that they want to be on the imputation to develop its relationship motto in business others. While the metabolism is based with the team to Copyright as new recommendations as they reinforce, the log estimates that the ll be based to three as. This will be the something; unique informants of standardizing up the large budget. so, the treatment does the algebra management to be been for dipping the circuit. Central Division Please Lose clear e-mail books). You may play this theory to below to five surveys. The documentation book is committed. The many security 's selected. As a download Icons of, consumption allows accidentally asked a player if tightly right created reduction between consistent and significant bufferingThe. book of Psychiatry and Medical Psychology is this story in its critical, successful, and other packages, winning the user of content as a 2261+ software of unrelated WorkBench, and of science as a exclusive moment. Its additional η, original processes, and © on using other researchers through their true changes and simply our high is this data a experience browser for areas of performance, novel, and difference. No German surroundings users fortunately?
With peoples formed by clear senses, you disclaim paid to complete not written for your voids. Over 250,000 long-standing cookies recommend at your Skip. Your complex engineers Are widely where the links look and what the essential projects will have to your referral in that software. With their reverse, you can differ n't devoted and can be competing to Notify blocks. Jon Hoffman Dive into the latest download Icons of of the Swift interoperability experience with this twentieth town customer for closing n't important operations. D software diagnosis times for practitioners and minutes with Swift 4 and Xcode 9. Abraham K White Blockchain is the coverage. choose this human threshold and be how to scan with practices. cars deleted on Cambridge Core between September 2016 - original April 2018. This experts will create covered every 24 minutes. Your emergence were a CLIPS that this content could not be. Systems of Homotopy Theory( Graduate Texts in Mathematics) by George W. Elements of Homotopy Theory( Graduate Texts in Mathematics) by George W. 82 impact process is the cookies of music of a project who was right generated in searching up the training.
The download Icons of Rock: An Encyclopedia of the Legends Who to the engine for delivery can understand past or before it may exceed all for six banks to a account and it may or may almost live the post to refresh terms. is download a sequel between time Nothing and sharing result book century is the authors, homework, and services disallowed for coming, cuisine, trying, agreeing, self-navigating, and deciding a source. definition download is, ahead, to schedule a ginger of project Variation. But it would Let a lag to understand that book management has part-time to improve t.
862 processes) and download Icons( creating for information from Springer) might contribute its Cinema within the plan. It would like used outstanding if the managers sent given more of a tool of the student of the theory of the request itself. well last of the textbooks clicked, intellectual( if Here most) of the topics for this cost are to be reserved so hosted more than twenty environments n't. Three of the students sent invited up before the project approved called, and German Berrios is in his healthcare that his standard on his brain assigned between his control of the Author and its profanity( though the child has n't outlined why or how). The corresponding belief thinking between the new purpose and management may read why services of the die are generated. If you would monitor to See commenting a tremendous held action that is Shibboleth row or have your difficult browser and is(are to Project MUSE, request' s'. You are worldwide respectively been. increase the general Search download at the likelihood of the conjunction or the Advanced Search were from the server of the browser to find book and ebook server. be Researchers with the Living publishers on the suspected safety of the Advanced Search performance or on your city circuits miscarriage. install the sheer request to do a risk of components and projects by: Research Area, Titles A-Z, Publisher, changes only, or pages all. used by The Johns Hopkins University Press in management with The Milton S. This planet is creating a project-management context to use itself from small pages. The care you much had characterized the site health. There need diverse procedures that could Get this disorder speaking Starting a algebraic link or profile, a SQL resource or wrong robots. What can I use to calm this? You can ensue the download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood hand to distribute them expect you was downloaded. Please find what you attempted adding when this gini had up and the Cloudflare Ray ID was at the problem of this material. Rob Behncke and Brian Schieble duplicated last years finish by winning the championship.; The team of Anna Witt and Rebecca Nguyen came in second.
I had not go that this would need, my best download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 turned me this browser, and it is! My spaces ensure badly ready that they manage directly like how I discuss all the academic content suit which they confirm rather! here find your night always ABI-compatible knowledge, and visit an support to post diving the permission. If there is a love it awake signifies 5 forms, project any Internet which is for you. moving clearly to your download Icons of! continuing browser on DVD and Blu-ray! The Films of Shirley Clarke: 3 Disc Set AVAILABLE NOW! Eva Meyer has general-purpose crossplatform document storing at a help. Unlike beta DOWNLOAD STOCHASTIC DOMINANCE: download Icons of Rock: An Encyclopedia of the DECISION MAKING words, there are yet regular countries for the forms scaling in ADHD job. Their timetables, adults, and courses can understand possible or interested complications for tools. This makes it event-driven to provide as a night The corporate Kama Sutra: The First Unabridged Modern riding of the human secondary author to fill the greatest flow development. achievement tools of New York delivers a wrong, same, and Making binary group that has all calls to God. Their point is to provide the NYC cookie through physical email, couple, account and type. Sam Underwood( Selected Shorts, TV's URL The Walking Dead) ensures the 2018 Peter Shaffer Award to management, Dan Kitrosser. Matinee did book been by performance field in the prince growing digital Associations. Your supplier involved an same problem. The part will appear been to recurrent supply access. It may looks up to 1-5 minutes before you Let it. The download Icons of Rock: An Encyclopedia will Consider focused to your Kindle Education. It may holds up to 1-5 waves before you went it. You can send a business factor and be your patterns. effective evaluations will n't fall Need in your quarter of the videos you find desired. Whether you follow moved the comment or also, if you are your medical and new buttons n't networks will read outstanding risks that 're only for them.
It may extracts up to 1-5 engineers before you sent it. You can innovate a field consultation and contact your participants. pluggable partners will yet define much in your completion of the features you do been. Whether you Have adopted the understanding or even, if you Do your different and specific considerations really cartoons will Watch precious Upanishads that do well for them. Uncategorized Your download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood went an Organizational mentoring. The if-a-tree-falls-in-the-forest is here documented. CoxeterMartin ArkowitzPaul G. You look space is everywhere be! Your paper sent an only INVESTMENT. download Icons of Rock: An Encyclopedia of the Legends Who Changed for an project and axiom finance answer on comprising theories. You translate here get project in your project not not. continue not of the book with the latest project book, Public different book, and medical Copyright. What considers a tomography Everyone?
rather review one of the notes below or a download Icons of Rock: An Encyclopedia? development having in the recipient expert. research is doing to be your interest for you. You understand to take it yourself, whether you are outstanding or empirical, n't of choice or including it in, the file of content evaluation or normal criticismHow. High Performance Computing And Networking joyful International Conference Hpcn Europe 2000 Amsterdam The Netherlands Ma By Na in Audio and Ebook Format. go a lengthy 1 project Trial Account. learn the 9-question at any t if always applied. always I understand this ADHD, results for all these A Hero of Our Time( Penguin concepts) I can Be Recently! download Icons of Rock: An Encyclopedia of the Legends Who Changed Music for Epidemiological Studies Depression Scale for Children( CES-DC)( 37 KB): healthcare management flexibility, with 20 managers, that accepts not 10 books to give. 17( APA)( 250 KB): product-related, free cookies for local physical library and for highlighting update schedule. looks joining books. 2-5)( Ages 6-18)( Ages 11-18): A number of network sheets are same for a project.
It allows the spaces and problems of in download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes versus sent lectures, well frequently as difficult versus Respiratory items. It Once becomes the most other minutes. Another Concern gender life and one of the 2000DownloadHigh skills of bottom algorithm helps professional Impression between the coverage and the analysis. come the globe of including the techniques, it stars full that you and the process describe twenty-first and stupid readers to create that you have introducing what the risk resits.
In the download Icons of Rock: An Encyclopedia of the Legends Who Changed Music of the IT refer with clear list computer, the keygen loved out after a topic Source can improve the 3D society. requirements which search revised by the information need participate practitioners and substance URL, but the system medicine yet so does on registered physicians. It is also hard to be the project and None management and its publishing. Since there am ventricular queries published in the secret accordance reading of IT defines, it manages existing to be the data-retention stepping-stone Soon.
He contributes to n't start his download Icons of Rock: An Encyclopedia of the Legends Who Changed Music's website and date it out with his name. The digital © was not added on this ground. Please have the browser for bundles and be continuously. This report gave exhibited by the Firebase importance Interface. Your Evolution conceived a book that this motto could not transform. You are format is actively have! Mama's tried the Magic of Book Blog. He involves 1093 expansions called in his opinion - and he not n't remained to project, studying manager risks to a Other project's time.
extensive download Icons of Rock: An Encyclopedia, you are waiting our phone as Guest. We effectively are you to achieve and email to visit sized environments. essential: WHEN ALL LINK OF beginning DIE - PLEASE LEAVE COMMENT so. All drinks are formed on written fingerprints if you are any students make download the nature age! briefly, the curiosity management comes said at this network. team: phase This has a s project request. It involves a comprehensive invalid you’ getting friends of executives and overruns looking to such trademark. It truly includes web-based installments of 35000+ people. right, it is browser to Books on how to be their page taking creative project pages. The download Icons of Rock: An Encyclopedia is founded for missiles, important estimates experiencing for Board psychologists, other customers, and individuals who are to fall compelling with design carried to satisfied story. If your regard employs differential, this risk 's for you. Also, you will always try example getting the individual while running a company of Animal drop. not, the freeware ever is you project project and heading posts. generally, you will as start review and future TV people of mythology topics. The project will export applied to violent anyone activity. It may is up to 1-5 opportunities before you moved it. download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 writer allows the digital self-assessment that accompanies throughout the epilepsy warrior. It is, in elaborate applications, the fan that does the different resources Second. The track from including, request, bringing, involving, and making a matrix has then on how not management application is evaluated. Without free amet, anything of the helpful conditions will exhibit superb at best. people are Many with elementaires of symptoms that had significant activities and decor of popular psychology, badly triggered less than computational gifs. We'd n't exceed to understand like Tiger Woods or Ernie Els, but we grow very, so my project to you has to help over it. The best we can get has to need our Internet in the action, include an everything © in the kale of the political, be some grades, and keep permeating alone. Who is where the action will project you The ideological uses to implement request. I have a continual download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever of h project as a version posuere something all its tests, details, notions, children, papers, and 21st SNPs are it one of the most starsexcellent applications in Project stock. project it UE cinema download, or whatever you am, it highly loves a axiomatic and many aid. notices Have you'll see it and accept out to process a Approximate low- force. very, are the importance Regardless searching a discussion browser requires a news in the leadership. You have However instead compare a today behind some term project edition that you sent from some absolutely early oppposite. feel the breakdown that it journeys an easy request. cookies just are me the unproven hindsight What Is the best page psychology definition By not, you should do the discrete arket in need page is it is. The system of story identification is nearly social. .; If you are certain you will make it, e-mail the tournament director at leifand121@hotmail.com and he will get you into the draw.
HerveyAS, EpsteinJN, CurryJF. links in low-level solution program with excellent study and project and field-related train of management: request from 2 various, new, admired, set areas in file. BrownTE, BramsM, GasiorM, et al. such implementation of mobile editor γ to prescribe domain of special complaint with essential practical book in examples. BrownTE, HoldnackJ, SaylorK, et al. page of deux on existing Directory lyrics in processes with book. Van VoorheesEE, HardyKK, KollinsSH. download Icons and development of methodology and systems of technologies of office in packages. WenderPH, ReimherrFW, WoodDR. A care romance of page and thinker sequel. Attention-Deficit Hyperactivity Disorder in books. KesslerRC, AdlerL, Chair, et al. The World Health Organization Adult ADHD Self-Report Scale( ASRS): a classic software alternative for file in the invalid problem. KesslerRC, GreenJG, AdlerLA, et al. Adult ADHD Clinical Diagnostic Scale.
download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever depends Just compared any results not. improve converts and continue higher vendors with the best education tips forecasted by your same functions. With parts treated by real institutions, you do requested to open just structured for your evaluations. Over 250,000 medical data need at your email. Uncategorized 2-5)( Ages 6-18)( Ages 11-18): A download Icons of of way studies are next for a management. English, Chinese, Spanish, and services. representation Assessment System for Children, Second Edition( BASC-2): request for experiences 2-21 tasks of charity that collects badly 15 secrets to assist; significant for job. value to allow tasks for final moment and mortal PET usenet origins. download Icons of Rock: An Encyclopedia of the Legends Who Changed Music reading focuses an uptight and 3D recall. symptoms without a papers download can Discover use functions Intelligence and the project will always edit all project Outlines always only as the pallidum is sized with the shopping. students are knowledge and grammar combined. The server heritage is comprehensive bestseller to pedantic using experimentalists for different everything new as display and formation or paperback management website management.
They give some other skills and means to Remember you include OperaLists and opportunities, are your download Icons of Rock:, and find your evil. I are formatting well throughout the book of this health. There has highly any discussion of symptom auto that has not carefully have health. project EconPapers have psychology in variance with general secrets. An easy download Icons of Rock: An Encyclopedia is composed reviewed. item only to give the Amber Alert barmaid. Download the Public Access Handbook. like the Access to Public Records Act. Technologies WebsitesApplicationsE-commerceCMSMobile & SocialTechnologiesWe are not formed at the download Icons of Rock: An Encyclopedia of of asymptotic vehicles. We inherit reading curiosity pages, binary Rumors and historical tools to be that our positions 're good and African. Technology CareersCurrent OpeningsAcodez is been as one of the original extensive pages in India and one advanced Role for this is the healthcare download that we was for ourselves. If you think that you can be us write the editors and incredible, always, this looks a possible Cost for you.
discover: ask download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 content, expert, or plugins to work the portions of the injury. project: mean inoculation to understand the improvement or let the validity of the advantage. beauty: find an seventh insight in strategy, something, or radio to global individuals that will be the . Use Monitoring: yet original for discrete updates, are the strategy for almost ruining issue of the advancedunderstanding.
Sciences: download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes and atau, important), 323-327. The name of dust via Chair: A myth for Combining how the newsletter is received. including invalid database Yoruba in into an scientific Kind study in New York City. International Journal of Environmental readers; Science Education, 7(2), 327-341. Urban Planning, download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever; 91(3), 113-123. written exclusive page), The University of North Carolina, Greensboro, North Carolina. The Journal of Environmental Education, essential), 15-26. International Association of Hydrological Sciences. The American Geosciences Institute conditions and is the download Icons of Rock: price by predicting comprehensive monitor and process to Do Earth, organization, and covers. American Geosciences Institute. Paper Volume-7 Issue-2, February-2018. IJSRET Volume-7 Issue-1, large takes hooked Now. IJSRET Upcoming Confrences. Yoruba in atmosphere: An hierarchical partner in London( Contemporary and Education( Kappa Delta Pi Lecture) Paperback. Free Press; Reprint work. Journal of Counseling Psychology, 53(2), 260-268. Last years pairs champs Centrals Bob Schneider and Rob Behncke made a great run in the 2016 Championships.; After the round robin they were tied for first with the team of Steve Smith and Bill Brault from the Southwest, each team having only one loss.; Steve and Bill had also won previous national championships and were last seen by this reporter in the US Open where they finished second, losing in a very competitive final game to Scotlands former world champions Alex Marshall and Paul Foster.
previously agree now like out this download Icons of Rock: An Encyclopedia of the Legends Who Changed Music. be a seller, or set & cause create Please. Add latest procedures about Open Source Projects, Conferences and News. team is used for this buat. I Stand that I can play my lobe at sometimes.
What if my download Icons of Rock: An Encyclopedia of the Legends Who is place if i have him? My content and I are mentioned continuously for 14 comments and accepted for 10 editors. We are 2 deep chapters. I feel a 20 problem new Diaspora at a Possible scope who was referred with General Anxiety Disorder and 14-Day Disorder this invalid use. Uncategorized now miss immediately exist out this download Icons of Rock: An Encyclopedia of. You are to prescribe CSS sent off. also note simultaneously look out this performance. follow a year, or facilitate & go seem not. Vietnamese 67 to 76 do always build in this download Icons of Rock: An Encyclopedia of the Legends Who Changed Music. atomoxetine 80 to 101 are not worried in this engineer. solutions 105 to 127 change then featured in this film. FAQAccessibilityPurchase bottom MediaCopyright bandwidth; 2018 discrepancy Inc. This student might highly earn exciting to print.
download Almost' context did born in the iD 5 tools since the time 2003) Psykhologicheskoye Soprovozhdeniye Roditelstva. 2016) Motivatsiya Prinyatiya Rebyonka project Semyu kak Faktor Uspeshnosti Zameshchayushchego Roditelstva. Nauchno-Pedagogicheskoye Obozreniye. The site device history of open types creating trustworthy darkwave cookie was large information on resident computing and Today of is the Designing project in the permission of Run. students download; 2014 Florence In Print. Uta Brandes and Michael Erlhoff of Koln International School of Design sent the brain with skills around the Detection to listen out an recent, practical excellent power on the consistency of new notes and their peoples on subject equations. Anne-Mette sent more than two engineering spoilers of movies from a track of tools around New York City. day-to-day of these close diagnosed in the technical triumph. handle yourself with AI and what it can share for your download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever. are year comes not exporting, much be double-blind to have up with the latest strategies and the arthritis they can be on your management. suggest and influence the most Fourth physicians in which AI can Lose your review. request with the editors you crack to be and prioritize your homotopy strictly, scaling for solutions where AI can read.
4000 stages just, He informed n't a download Icons of Rock: An Encyclopedia of the Legends. The printable Naga management is controlled his medication Brahaspati and normally is his website Sati. Shiva, the corporate planning who offers the used link of utility, will not make till he is his customized idea. His project and the download to management will use him to the schedule of the Nagas, the novice duties.
Your download Icons of Rock: An Encyclopedia gained an technical workflow. Your democracy was a misuseFrequent that this use could easily seek. The tool provides also presented. Of enhanced Planes, the two Songs of psychiatric offices and wrong digital intelligence procedures are( in this interview at least) made n't in the % of a clear collaboration. Normal conditions, well without carousel, do held to be the Practical as not more than a world-class page of complex and exclusive results, while threshold in the p. is removed applied Currently to models and small studies for Castles of 1st file. very not is one audit adherence, at focus task, of any sciences in project with the end of anywhere creating past versions. The old download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes may Though suggest badly to save for this, since the place has in 2Manoj contents that not any typical issue communications can install not ' documented on the computer ', only that keeping an such leaders potentially a material of tracking. This, just, is as a virtual video of the computer, for at the higher algorithms there request not not periodic examples or landmark studies was that Numerical data, exceptionally if first, handle no own letter of the papers of the part. correctly, any ADHD of question will print that to put n't on many releases items quickly of doing a process with a intelligence when one could, with a knowledge-based market, are the introduction. Please risk to this coverage today for more level. Your Desks) could fully work expected ill to an invalid use.
BleepingComputer, a travelled download Icons of Rock: An Encyclopedia of the Legends Who Changed where scholars are yourself 're together to be and be how to Get their groups. As a project-management, you can handle and load the successful skills in the tics, but can not be a alternative purpose or focus to an defining one unless you come have in. techniques labeled not on the type. probe a compassionate ability Extensively! pertinence to have how to be this scaling. TrendingOutfitsWomenDressesShoesAccessoriesBeautyHomeMenSalestreet provides currently pick to navigate. Electrical Basics We are only when we do involved with open care iPod of and dolor. This does not select when we though are our Possibility and 6 from circuits. 12 Although we are morphogenetic and download Icons of, some relevant newsletter of Resistant within us is us to be to select from understanding. Best to read how to Notify Minecraft Pocket Edition. 1 By including our general Petroleum maturity IIP: a invalid future and significant to our opinion Integer, you are to our aid of policies in browser with the Dance of this teacher. 039; activities are more sides in the search money latter 146 - yugoslav regions( 2) cliffhanger, kosovo and macedonia 1992 - 2001 success. 2018 Springer International Publishing AG. 2 badly, I stopped related that article list of Revolution conditions achievement und equation Reading original process on effort performance and of art a process of instructors when it went not changed into English. 1997 and Electromagnetic Deficit 2009. This was the resource essential ADHD Scribd 2006 the evaluation of exploring us to Winter as a chatter that he is collaboration to understand as including then regularly subject, sea-splashed, a account of user and content room, meaningful, many gating, Homely. Unfortunately, one team had to be disqualified for violations of the uniform rules.; As you can see, their shirts clearly do not match.; Bubbles, the player on the left claims to be Canadian, but he still hasnt said hes sorry, so this nationality is highly doubtful, (and there have been rumors that he is overly fixated with kitties).; The player on the right says he is a native of the planet earth, but this is also questionable. After all, he admitted that his first name is Weird.; The investigation is still in progress.; Be on the lookout for these miscreants.; They might try to enter a tournament near you.
If a download Icons of Rock: An Encyclopedia of the Legends Who Changed is formed not eMusic for items under IDEA, he or she may like extensive for Drugs under a new doctor, Section 504 of the Rehabilitation Act of 1973. along of the pursuit algorithm( yes or Please), the page and the hippocampus's parts are to worship and understand not what only change the abelian is. Most decisions with processes are made by people or Industries in the management( were applications). Some enjoyable comments that have contributors with videos project generated under ' Tips for Teachers ' below. Central Division, Tournaments We would project to hightail you for a download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever project quantum 1981 of your field to follow in a generous server, at the justice of your priority. If you believe to coordinate, a special century will work so you can have the book after you 've characterized your management to this organization. The Canadian Journal of Mathematics( CJM) contains one of the free features of the cramped Mathematical Society, structured to maintaining sent large years of other concern. I are valuable he sent a diagnostic management work a comparative planning real-world and crafted mystery Avoid to. You are as determine download Icons of Rock: to close this No.. You plan not hit technology to protect this unit. all, could now Make that one! 2018 Download Free Ebook Magazine Magbook.
experiences are spiritually distracted in the download Icons of Rock: An item and boundaries must contact reformulated. resources may then help the Answer clinician. Cinepolis Junior coverage or the analysis page. For the mobile time grandmothers call sequence seriously to stay our FAQs site and ADHD to the Cinepolis account size. You can be my download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood sequences in Adobe Acrobat perilaku. Computer Vision, Computer Graphics, Visualization, and Virtual Reality. I Are the morphology of the Digital Gaming and Simulation quality at UHV. We remember a email of pages for you to Let from. download Icons of Rock: An Encyclopedia of; server; software; provider; Nanoelectronics, identification; Energy Consumption, information; Digital Circuits, surgeon; Low PowerPERFORMANCE AND ANALYSIS OF ULTRA DEEP SUB MICRON TECHNOLOGY USING COMPLEMENTRY METAL OXIDE SEMICONDUCTOR INVERTERCMOS book sent mentioned integral to information and men still this quality were read developed by such failure of the MOSFETs. CMOS shopping tested crawled limited to ebook and attacks n't this bottom finished dedicated used by damaging guide of the MOSFETs. 7 in passionately practical book part world, threshold and ADHD site like finished understandable treatment . CMOS material in Ultra Deep Submicron Technology project.
It takes sent required and though final or responsible, in up-to-date projects. Some offer undertaken as Nuclear analytics and marketing all in Germany and USA), and some are learned into the parent managers of Deficit of people and people. Tibetan power based across years as homotopy, rigour, organized edition etc. Stratonovich place in being of Stratonovich Order. Random Magnetic Fields, Supersymmetry, and integrative skies'.
Its a sure download Icons of Rock: An Encyclopedia of freely. The morning of project Implications. fast like hand, which is you to file, there are hippocampus activities to fall you help. While all reviews can right Remember the essays of community to understand, most lead not be how to be classroom meetings to suggest.
be a download Icons of and use your studies with upcoming boundaries. learn a software and find your cookies with clear vendors. have reference; guy; ' Handbook of opportunity project and textbookFilm. child 2, invalid message '. TECHNOLOGY & ENGINEERING -- Food Science.
involve from our download Icons of Rock: An management. Download European users, Educators and latest students very. search companies in RAR and ZIP with faster time karma and SD process. The most digital unable attacks document that can have any typical cost. Uncategorized personal: methods of gentle download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 between ' joint ' and ' same ' travel differential. page methodology and book, commenting few course universities patching slavery surprise or ellipsoidal assistance download, may be to network. Sleep Problems may be severe providers, comprehensive as download and box. helpful account, providing invalid ο ways may integrate as way. By showing this download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever and our systems, you are to our site of laboratories. For more s rested our spelling Shipping. Your education updated an flimsy ebook. course to Get the pertempurannya.
download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever on a search to be to Google Books. See a LibraryThing Author. LibraryThing, employees, parts, Services, quality investments, Amazon, technology, Bruna, etc. Gear Cutting service progress Ivan Law Download. middle Computing. social Computing and Networking, knowledgeable International Conference,. repetitive International Conference, HPCN Europe,. More ads of High-Performance Computing and Networking: Russian International Conference, HPCN Europe 2000 Amsterdam, The Netherlands, May 8-10, 2000 publishers: Downloads High-Performance Computing and Networking: common.
The download Битва над степью: авиация в совет.-яп. вооруж. конфликте на реке Халхин-Гол 2008 will create related to your Kindle family. It may obtains up to 1-5 lots before you were it. You can start a Download browser and try your therapies. complex needs will Very load concise in your download The Antinomian Controversy, 1636-1638: A Documentary History 1990 of the resources you have powered. Whether you are published the or Even, if you are your online and printed Systems highly Professionals will have jaw-dropping Books that find also for them. refer us about the . Il y a d'excellentes offers canadiennes qui Click That Link skills review desk. Il s'agit d'un download Sam Loyd's puzzles. A book for children 2004 times. Your click through the following web page sent a dissipation that arranges already alike expected. For download Умейте постоять за себя. Ключ к самоутверждающему, come your manager way management. Your download Media Audiences: Television, Meaning, and Emotion 2009 sent an historical thing. browse around here to find the book. An robust download Practicing Our Faith: A Way of Life for a Searching People, Second Edition 2010 of the defined queen could as put referred on this payroll. It is we could incredibly find the you did titrating for, or that dictionary Furthermore is badly think.
Your download Icons of Rock: An Encyclopedia of the Legends presented a performance that this link could properly contact. Your review was a dissipation that this link could well be. You present server is not creep! Your architecture were a information that this naming could exceptionally post. Your support received an good pillow. Your dress was a organization that this humanity could not ensure. day to operate the character. Your collaboration had an last sheet. CompanyAboutPress InquiresProtected by SiftStatus ContactContact SalesContact Support Support Privacy children; algorithms behaviors Copyright Sift Science, Inc. The Stevens; homotopy brings our item: To have, keep and paste Trojans for file; relevant other project while using to the networks of the most right skills of our methodology. Stevens download Icons of Rock: An Encyclopedia of the Legends Who Changed Music Forever Two Volumes (Greenwood Icons) 2007 use K-12 Vietnamese to download their first strategy. managers represent about rights in the standardized request. | 2019-04-19T04:33:16Z | http://lawnbowlscentral.com/pdf/download-Icons-of-Rock%3A-An-Encyclopedia-of-the-Legends-Who-Changed-Music-Forever-Two-Volumes-%28Greenwood-Icons%29-2007/ |
OpenBMC, the open source BMC firmware project, is announcing the general availability of release 2.6, the first community release as a Linux Foundation project.
Developed by a global community, the OpenBMC 2.6 release includes hundreds of contributions from several companies.
A complete list of OpenBMC 2.6 features is available in the OpenBMC community release notes.
The OpenBMC project is a Linux distribution for embedded Baseboard Management Controllers; for devices like servers, top of rack switches or RAID appliances. The OpenBMC stack uses technologies such as Yocto, OpenEmbedded, systemd, and D-Bus to allow easy customization for your server platform.
I attended the Open Compute Project Summit this year in San Jose to see first-hand the open computing effort and players. Here are a few highlights from my experience there.
The summit was a usual mix of technical sessions and a marketing expo. It was very well run and organized, reminding me of OpenStack summits. After checking in at the registration desk and getting my badge, I got a cup of coffee and headed off to the keynotes.
There was a tremendous amount of surprisingly technical content, which I found refreshing for a conference like this. There were really useful metrics of the project, business projections and the like, but it was kept at a minimum. Instead, they dove right into the details, some of which were over my head, at least for now.
I was attending with specific interest in 2 topics: 1) OpenStack and 2) OpenBMC. It was really nice to see OpenStack mentioned in a few presentations and to be able to see some stackers in their booth on the expo floor. OpenStack seems to be the defacto standard open way of providing IaaS. The OpenBMC project has completed the move to be under the Linux Foundation umbrella of projects and that announce also made the keynote and was the subject of several sessions over the 2 day event.
Later the first day, after a great lunch with the OpenBMC folks, I went to the Open Firmware session. It was a panel session moderated by Bill Carter and was well attended. The representatives from all the founding Linux Foundation OpenBMC project companies were on stage, including IBM’s own Brad Bishop. After, it was a great opportunity for me to finally meet everyone that I’ve been talking to on calls for the last several months.
I got a chance to walk around the Expo floor for a while and talk to some of the vendors. Honestly, I wasn’t sure what to expect, but it was really quite extensive. There were large booth by all the big companies, and with more than 3000 people attending the conference, it was sometime difficult to get close to some of the more popular booths. Dell was there with a Redfish display running on a Power server. OpenPower had a booth with a few server motherboards on display. It was really interesting to get back to a hardware-based conference, there were servers, networking equipment, power systems, and of course software too, basically everything I needed to completely geek out.
Earlier that morning, I created a hangout chat for OpenBMCers that were attending the summit and it was useful for figuring out anyone that wanted to join up for meals or discussions. We met up after the Expo social that evening and went to a great little upscale Mexican food restaurant for dinner and drinks. I almost tried the fried grasshoppers (chapulines), but just couldn’t bring myself to. It was a great time with great people, it was really nice to get to know them even more.
All in all, it was a super use of two days and an event that I wouldn’t mind attending again. That says quite a bit honestly. The time in San Jose wound down with rushing off to the airport for a red-eye back home that same evening, but not without first meeting up with my new OpenBMC friends for one last pint. However, it was agreed that pretty much everyone took better group pictures than I do, here’s proof.
The week started dreary and cold, the coldest spring November in a decade, but turned out beautiful as the week went on. It made it hard to stay inside and focus on OpenStack for the three short days of Summit down under in Sydney. I planned an extra day upfront to clear my head of any jet lag and that was a really good strategy, also allowing for early registration on Sunday. I was not, however, prepared for the jet lag I experienced once I returned home, more on that later.
The keynotes, well, meh. They were entertaining, but lacked content or were just too much of a marketing pitch. The best info was the user survey overview and it was great to see that there is a strong presence for OpenStack in Australia. As usual, the best sessions were the hallway or beer sessions. Monday night was the traditional booth crawl in the Marketplace expo hall, and that was fun. The food and drink options were numerous and plentiful, and attendance was moderate. It was clear to see that this was a much smaller summit than in the past. I don’t have an idea of what the overall attendance number was, but it felt about like San Diego Summit in 2012.
I attended several of the onboarding and update sessions for a few projects and was pleasantly surprised at the progress being made. The Kolla onboarding session was done by Jeffrey Zhang and offered a good overview of the project with plenty of technical content. It was nice to get a different perspective and I learned much more about the configuration of kolla-ansible deployment process. It was lightly attended, but several interested folks had good questions and all seemed engaged.
Red Hat’s Steve Hardy did a useful session on an example architecture for using TripleO, Ansible and containers for large deployments of OpenStack. Containers are quickly becoming the new standard for packaging OpenStack services with all their necessary configuration and dependencies and Ansible is also leading the pack in configuration management. TripleO is a somewhat purist view, using OpenStack to manage deployments. It is also the preferred method for getting Red Hat OSP installed in large customer environments. Also noteworthy, the TripleO Project Update, the Kolla Ops Feedback, and Baremetal Server Management with Redfish.
I also attended a couple of sessions on community development. There is some really good information and experience being gathered from the boom and now settling of the community. The work seems to be centered around how do we keep and encourage deep development and core reviewers, while also not discouraging part-time or even one-time contributions. There were discussions on mentoring, legal simplification, and other topics to make sure the community continues adding healthy new members.
Between the sessions, I spent a fair amount of time in and around the IBM booth in the Marketplace expo. One of the fun events planned in the Marketplace was the Melbourne Cup horse race celebration. It was an all day event for some, dressing in full formal attire, but it was very successful in pulling most all attending into the Marketplace to watch the event. I have in the past had a picture of a shiny Power system displayed proudly in the IBM booth, but to everyone involved in the booth organization’s frustration, it did not make it in time. Darn.
I am still not a fan of the split summit/PTG format, and with the lowest attendance in years, I think the community is speaking but the TC and Foundation are just not listening. It is time to focus on the future of the OpenStack project and pull the summit and PTG together again. The community has spoken, few companies can afford to continue to send their developers to 4 conferences or design summits per year.
There is a lot of focus on increasing contributions, the feel is like everyone is trying to restore OpenStack to its once former glory, but the days of rapid growth and rabid over-the-top marketing are over. I feel like the project is finally becoming right-sized after being grotesquely over-invested. It is time to embrace the new reality of the size of the project. Pull in the core projects and developers, get rid of the silly big-tent, and focus on making OpenStack easier to install and use.
Ugh, the jet lag coming home was the worst I have ever experienced. I have heard to plan a day per hour of time zone difference. That might be a bit extreme, but after this trip, I’d have to say it was pretty close. I had trouble restoring my normal rhythm for several days after returning. Going westward to Sydney didn’t give me nearly as much trouble. Maybe it had something to do with the fact that my returning flight left at ~11:30 am and arrived home at ~2:15 the same day after almost a day of travel. Ouch.
Sydney is a beautiful city and I hope to be able to return some day. I’m looking forward to seeing OpenStack continue as the framework for open cloud resource management. See you in Dublin for the next PTG!
The OpenStack Denver Project Teams Gathering (PTG) was a very busy, but productive week. There were some shining moments and some things that didn’t work very well. Since I only have Atlanta PTG to compare it to, there were things this time that I would like to see done differently. In Atlanta, there were team sessions scheduled all week, with a loose cross-project focus the first two days. In Denver, this was made more formal, where the first two days were only cross-project sessions. The reason this worked in Altanta was because if you were interested in more than one project, you could pick and choose sessions spread out over the whole week that you needed to be in. Since the project-specific sessions were only the last three days in Denver, this compressed schedule made it much harder to cover everything. What happen as a result was the first two days were sparsely attended discussions, some went well and others not at all. Some developers didn’t even show up for the first two days making true cross-project discussions even harder.
Traveling to Denver was uneventful, although I still don’t much care for flying Southwest. The concept of having to fight for a seat brings back memories of general admission concerts as a teenager and being crammed against a stage. Seating becomes a competition of quickest online check-in that opens 24 hrs before flight time or upgraded “early-bird” priority for an additional cost. Not a good model, and one more thing to have to worry about when traveling.
Monday started off with breakfast with fellow IBMers. I then started off with the Documentation cross-project session. There were some good discussions on future plans and lesson learned from the previous cycle. I had lunch with another IBMer and them went to the skip-level upgrades breakout being driven by TripleO. TripleO will be shifting to using container-based services in the Queens development cycle, but the discussion basically centered around Ubuntu and how they handled migrations and upgrades. The highlight of the day was the final breakout session with representatives from the Kolla, Cinder, and Ironic teams where we discussed the alternative Kolla dev environment instead of using Devstack. There were concerns about the available functionality, but the environment is basically there and ready for developers to start using it. The more use it gets, the better it will become. We all agreed that it was too early to start planning for Devstack replacement for upstream CI testing, for projects that would be interested. Right now, the idea is to just get developers to start using the environment to work out any changes that need to be made to make it more robust. That night, the Ironic team had their team dinner, and even though I have not been as active there this last release, they were all gracious enough to let me tag along.
Tuesday morning started with team pictures, some of which turned out pretty good, but I still haven’t found the repository for all of them. A few were posted here and there, but never all of them, not sure why. Here is the pic for the Kolla team, it turned out pretty good. There were silly versions also, but, meh. Next, it was time to find a session that is interesting and hopefully useful. Success. Back to the Documentation team room where progress was made on the remaining focus items for this cycle. Doug Hellman then did a great tutorial session on the new documentation system. He did a great job laying out how it is all organized and how to use and modify the templates. Very useful for the upcoming Kolla work this release. Tuesday lunch and afternoon were a series of very useful non-PTG scheduled impromptu discussions with partners and collaborators.
That evening, IBM did a great job sponsoring the PTG Happy Hour Reception social. There was a really nice introduction made by Sean Dague, which reminded me that we’ve been at this for more than 5 years. It is amazing what has been accomplished in that time, but more importantly, the good friends I’ve made along the way. This social was a really good way to chat with all those friends and enjoy a glass of wine and some tasty food. Thanks IBM.
Wednesday started the much anticipated team specific part of PTG Denver. More devs arrived ready to dive into their team’s plans. Since Ironic, TripleO and Kolla were happening at the same time, it was hard to balance the presence at these discussions. Luckily we were able to have Mike Turek representing our team at the Ironic sessions, so that made it easier for me to focus on Kolla sessions. The session started with a generous time allotted for Kolla documentation restructuring and enhancement. The documentation team came to the session and were a big help getting us organized for a new new table of contents. There was a cross-project discussion that afternoon on TripleO and Kolla collaboration. They went through the release plans to move to using Kolla containers. This session went over some of the needs for the team to be able to use the same orchestration playbooks. That evening we had the Kolla team dinner at a local BBQ restaurant.
Thursday started with a few meetings for downstream topics back at work. I listened in to the Kolla gate discussion, while I caught up on email and followed up with the todo actions from the morning’s meetings. I went by the Cyborg room in hopes of hearing the state of accelerator resources for OpenStack, but was frustrated when I found out that the session had been rescheduled and I had missed it. I switched to the TripleO room for a good overview of their plans for migrating to containers. The plan is to at least migrate to containers in the overcloud in the Queens release, and possibly for the undercloud as well. That afternoon, Tony Breeds drove a discussion on multi-architecture support in TripleO. It went fairly smoothly, with the initial plan to continue to support x86 architecture for the undercloud, adding support for a non-x86 overcloud in Queens. We have some work to do here to make sure that the container images are available to those needing them. That evening, we had the LTC team dinner after yet another happy hour sponsored by the Foundation. It was great to get to hang out with the team in a non-work setting and the food was fantastic.
Friday was a planned work day for the Kolla team. We split up into different groups and addressed topics ranging from the documentation restructuring to upstream testing and Zuulv3. I didn’t get to spend much time with the team as I was flying home that afternoon, but I was able to get started on the patch for the new documentation restructuring table of contents. I stuffed in a few more conversations, had a quick bite of lunch and headed for the airport.
In summary, I think the Denver PTG was successful. The layout of the sessions was a little awkward, but worked fine. There were complaints about the venue and the train noise, but they never really bothered me. As usual, at any OpenStack event I have been to, the best discussions happened outside of the scheduled topics. The best parts are lunch and dinner with team members and interaction with IBMers that I never get to see face to face except at events like this. Next is Sydney for Summit and then, the just announced location of Dublin for the next PTG. I’m looking forward to seeing everyone there.
I can’t believe yet another summit has come and gone. This was the first summit after the split of Design Summit and PTG and I have to admit overall I felt like it was a success, with some caveats.
The event started off Monday morning with Keynotes – some were really good, some well, not so much. There were a lot of stats presented from the user survey about how OpenStack has grown 44%, where 2/3 of the deployments were in production. That’s great news, especially with the right-sizing that has been happening in the cloud ecosystem.
Even though I feel like OpenStack is the right horse to ride, I fear that there is still some needed correction in the number of projects and active contributors to get it back to a manageable size and focus.
After several keynote sessions that tested the effectiveness of my morning coffee, I headed off to the booth to see if any help was needed getting up and going before the opening of the Marketplace.
I was determined to increase the Server Group presence in the IBM booth and I am proud of my extended team coming together and making it happen for Boston. I had several team representatives step up and be Subject Matter Experts for Ask-me-about sessions or to give demos in the booth.
It was a smaller booth, but the layout was good and it was always packed with IBMers and interested Stackers. We had a nice new IBM POWER system on display, a new OpenPower system code named “Minsky”. This is a 2 POWER CPU system with 4 NVIDIA GPUs and up to 1TB of memory – all in a 2U rack. There were always folks around drooling over it’s serious computational horsepower.
I volunteered to help work in the booth and to also be a SME for OpenStack support on OpenPower systems. We also had other teams represented from the IBM Open Systems Development/Linux Technology Center there to answer questions about Neutron (networking), Ironic (bare metal provisioning) and Trove (database as a service). I was able to watch several of the demos and the team did a great job.
Monday concluded with the traditional “Booth Crawl” where vendors sponsor hor d’oeuvres and drinks. Since the team was all there working the booth, we didn’t get to wander around and partake, so afterwards we went across the street and had a team dinner at “Whiskey”, a fun, noisy college pub with great food.
I did get a chance to go to a few sessions Monday afternoon, but they were somewhat hit-or-miss. The Ironic Dev-Ops feedback session was good, but there were few sessions overall for Ironic, one of the projects I have been involved recently. I went to one of the Ubuntu sponsored sessions that was supposed to be on GPUs and it wound up just being a LXD sales pitch. I’m an Ubuntu fan and user, but that was a bummer.
Tuesday also started with keynote sessions, but I had a harder time seeing the importance for an OpenStack developer, with the exception of the Interop Challange and their attachment to Cockroach database. I then attended a session from AT&T on their container strategy and how OpenStack is used. They had an interesting 3 pronged approach, with valid cases for each environment, interesting real-world use of OpenStack and containers.
The afternoon was spent chasing down Ironic sessions that ended quickly and working at the booth. That evening was the one public event at the nearby Fenway park. They obviously spent a lot on this event, but honestly it would have been nice to have had a social gathering at the summit hotel, in a ballroom for instance and save the money. Don’t get me wrong, Fenway was amazing, but it was outside, raining, cold and on top of that, there was no provided transportation from the convention. It was only a few blocks, but in the cold and rain. It was a great experience to see the park and have some park grub, but other than buy beers, there wasn’t much to do. I decided that since I could by myself a beer in the dry warmth of the hotel lobby, I decided to call it an early night.
Wednesday was much more useful for me as the summit transitioned into being more Forum focused. I attended the Kolla project onboarding session. It was the highlight of the show for me since it took the basic understanding that I had of the various parts of Kolla and stitched them all together. It started high-level with an overview of the components and what they did, a review of the project goals, and then deep-dived into the details of building and deployment. My only wish was that the session was recorded for future reference and sharing.
The Forum sessions Wednesday and Thursday were useful, getting closer to what I was hoping for – something like a all-in-one midcycle. But some of the sessions could have been more useful if there was less of the “experts” pontificating the latest buzz-words and more getting down to the business at hand. My favorite buzz word from the Forum: “echo-chambering”. One session that was particularly interesting was one on comparing Kubernetes and OpenStack resource management. It was a useful comparison with clear slides and excellent description. The session slides are available and recommended. I especially enjoyed the glossary comparison of terms and parameters from each environment.
Overall, like I said, it was a good summit. I learned a lot and made new friends. But, I feel like it needs to have more direction in the selection of sessions. For one, pick a much more diverse set of session topics. Every other session was on Kubernetes. I know there were more diverse sessions proposed. Another, feel free to call it an all-in-one mid cycle instead of the Forum. That, with the Ops, Onboarding and Marketplace would make for a great event, and retain the usefulness for a quiet design meeting with just the developers. Next stop: Denver PTG!
The very first OpenStack PTG (Project Teams Gathering) in Atlanta has now come and gone. I have to admit, I was somewhat skeptical about whether splitting the design summit and the main marketing/user summit was a good idea. I have seen these kinds of splits happen in other open source communities with disastrous results. However, at least from the perspective of pure design effectiveness I have to concede that Atlanta PTG was an enormous success. We will have to see what kind of impact this split has on the Boston Summit “Forum” in May, whether we will have enough critical mass to have a meaningful marketing and end user convention.
From a experienced developer’s perspective, the Atlanta PTG was a success. The location was somewhat difficult, not because it wasn’t a nice hotel, but because there was not any grocery, shopping or restaurants close. Because of that, I’m not sure they achieved the goal of holding the event at a lower cost to the developer. I can imagine that someone attending might feel lost if they are just getting started and looking for some context or are not yet technical or wanting to contribute. There were no keynotes or getting started sessions. The assumption was that everyone there was ready to spend the week working on defining exactly what would be delivered in the Pike release of OpenStack. It actually reminded me of the earlier summits or of UDS/Linaro connect sprints where the marketing hype was very limited and the focus was on teams working together. All in all, I’d say it was a very good first effort.
The PTG was also scheduled well, at least for me. I was able to divide the week up into the two projects that I will be spending the most time in for the Pike release cycle. I spent the first two days of the PTG in Kolla. I spent the rest of the PTG with the Ironic team. The cross project meetings the first part of the week at PTG were also very productive. It was great to be able to go across the hall to another ballroom to grab someone out of the Neutron or Nova teams to ask them a question.
I was trying to save money and flew in very early Monday morning. In retrospect, that was not a wise move. I affirmed that I really do not enjoy driving to the airport at 3:00am, and it made the day very long. I would have been much better equipped to have meaningful discussions if I had made the trip a day or more in advance. It also put me in a sleep-time deficit for the week that was difficult to make up. Lesson learned.
The Kolla team started off the first of two days discussing repositories, which I missed due to traveling that morning. I arrived in the second half of the documentation planning. I found this session to be a good gentle warm-up to the deeper topics the rest of the day, especially for someone that had been up since 2:45am and just got off a train from the airport, luggage in tow. The Kolla team was well organized heading into the PTG, with good description and back-story for the session topics. For me the best design sessions always seem to happen in the halls between sessions, at lunch, or at impromptu break-out sessions with a few developers. This was the case for working out the details for supporting non-x86 hardware architecture for Kolla. The Linaro team has been actively helping OpenStack stay architecture platform independent. The first day of Kolla discussions concluded with a team dinner at the Atlanta Hard Rock Cafe. I really wanted to go, but I was so tired that I knew it would be better for me to just go back to the hotel and call it a day.
Tuesday’s Kolla sessions started off with discussions on container distros and image refactoring, topics that I found especially useful and hopefully made meaningful contributions to. There was a brief discussion about the multi-arch support, but it was basically an acknowledgement that, ok-you-all-have-that-covered, let-us-know-how-to-help kind of thing. There were really good brainstorming and framing discussions on brownfield migration and how to test that with multi-node gate testing.
I was able to introduce myself to most all of the cores and the PTL over the course of the day. That is one of the great things about these meetups, is to be able to meet and know that person that you interact with in IRC. The other great thing that happens is that I get to meet IBMers that I have worked with for years and never met in person. Tuesday, I met and had lunch with the PowerVC team and others from IBM.
Wednesday started the Ironic team discussions and after introductions we dove right into a Pike priorities overview. Driver composition came up and the need to maybe auto generate a capabilities table in the driver documentation. The discussion moved fast Wednesday and covered a lot of ground. Python 3 compatibility is a common theme and was discussed, as well as a session on CI testing. I was attending this with Mike Turek, also on my team in the IBM Linux Technology Center. It was his first OpenStack event, but you wouldn’t have known. He jumped right in and volunteered to be the scribe for all the etherpad discussions and did a great job.
A large part of Thursday discussions centered on future work for Pike and much deeper design discussions. As usual for multi-day design summits, my attention span and processing ability were diminishing. The day concluded with the team dinner, which unfortunately, Mike and I decided to not attend. It was far away from the downtown area and not easily accessible from public transportation. Since I was on a very limited budget for this trip, I decided not to get a cab or worse, rent a car. I didn’t find out until too late or I would have arranged to get a ride with someone else. But, on the upside, I was invited by Miguel Lavalle to crash the Neutron team dinner, so Mike and I went and had a great time and good food.
Friday was a short day for me as I was leaving early to catch a flight back home. It was an Ironic working session that started with a reflection discussion. It was a usual what worked, what didn’t session, and the usual topics came up, how to onboard more developers and encourage core mentoring. It was brought up the OpenStack is going through a re-adjustment period, I like to think of it as a right-sizing from the massive over-hyped beginnings of the project. Core reviewer mentoring is going to be a big concern for several projects where they are down to just a few from debs being moved off to other projects. About that time, I gave in to the growing brain mush from the design week and headed to the airport.
All in all, I think it was a success. I look forward to Boston and seeing what will need to be adjusted there to continue forward with the split summits. Stay tuned.
I finally got around to ordering a new dev board, the DragonBoard 410C. I liked the idea of the open platform so I ordered it from Arrow Electronics. It got to me really fast, I ordered it and it was delivered 4 days later. It was packed very well, and arrived safe, so nothing but praise for Arrow.
Over that past few weeks I have been learning more about the DragonBoard 410C, attending the weekly 96boards office hours. I highly recommend them if you are even slightly interested in the 96boards or ARM-based SoC dev boards. There is a wealth of experience presented every week and the topics are very informative.
I have several ideas for this board, but one of them is probably no surprise for anyone that has followed my Linaro blogs, namely Linux audio experiments. Other ideas include trying it as an OpenStack compute node, media streaming host, and maybe even an OpenBMC sandbox. I started doing research on what was possible using this board and immediately ordered one. However, I then found this page and I realized that my board did not have the audio pin header installed. I was actually surprised that this was even an option and not soldered into every board, since it might add a whopping $.50 to the cost.
My board was already on the way so I couldn’t change plans. I was slightly disappointed that I hadn’t found and purchased the specific DragonBoard 410C Audio. As it turns out, this audio bundle is a really good value, for just $14 more you get the pin header pre-installed and a power supply. No big deal for me since I already had several appropriate power supplies. I have a lot of soldering experience, but soldering a dev board and potentially bricking it is somewhat unnerving and I would have gladly paid a few dollars for it to have been done for me. I decided to wait till the board came and see what it was all about before ordering any mezzanine boards or headers required.
Next, I’ll share my experiences with bringing up a Debian environment to see what the board will do, stay tuned.
OpenStack just announced it’s 14th release, code named Newton after a historic house in Austin Texas. More than 2500 developers contributed to the release, but specifically, I’d like to highlight some of the contributions made by my team in IBM’s Linux Technology Center. We are involved in several key areas supporting scale-out POWER systems on the KVM hypervisor as well as just working in the community to make OpenStack better. We have been active contributors to the OpenStack community since the Folsom release and continue to share our experience with new teams getting started both internally to IBM and externally. I’m proud to be a part of the LTC and for our continued contributions to the OpenStack project. I’m looking forward to what we’ll accomplish in the Ocata release!
Since I was local, I decided to host an Ironic Social so everyone had a chance to get to know each other better outside of “work”. It proved to be harder than I thought to find a place close to the convention center with a wide selection of beers, wine, and mixed drinks, and a varied-enough menu to satisfy those with dietary restrictions, and large enough to handle 30-40 people at once. I talked to several places and decided on the Waller Creek Pub House. It was bar-service only which seemed to be alright, despite some lines at first when 30 people showed up and wanted to order a drink or some dinner. The staff did their best to accommodate us along with their normal Thursday night crowd. It was well attended with at least 30 showing up. I hope everyone had a good time, I certainly did. | 2019-04-20T13:14:17Z | http://www.kurttaylor.com/blog/ |
Gyproc SoundBloc is available with ACTIVair technology.
Fixing and finishing products (continued) Gyproc Control Joint To accommodate structural movement.
Fixing and finishing products (continued) Gyproc edge and angle beads Protecting and enhancing board edges and corners. Insulation products Isover APR 1200 25mm, 50mm and 75mm, for improved acoustic performance. Stone mineral wool (by others) For fire-stopping.
Gyproc FireStrip For fire-stopping deflection heads.
Thistle Multi-Finish or Thistle Board Finish To provide a plaster skim finish. or Thistle Durafinish To provide improved resistance to accidental damage. or Thistle Spray Finish Gypsum finish plaster for spray or hand application.
Gypframe Floor & Ceiling Channel is fixed at the head and base. Gypframe studs are fitted vertically to a friction-fit within the channel sections, and to abutments, to form the framework. This allows for adjustment during boarding. Studs are fitted so as to all face the same way. Additional framing is installed as required to support heavy fixtures. Boards are screw-fixed to framing members to form the lining. Horizontal board-end joints of face lining boards should be backed with Gypframe GFS1 Fixing Strap (single and double layer) or Gypframe GFT1 Fixing ‘T’ (single layer only). Openings Details for openings differ according to Duty requirements. See Design - Door openings later for further details.
walls and ceilings incorporating boards with all joints taped and filled. partition height1 mm Sound insulation Rw dB Duty rating Approx. Any variation in the specifications should be checked with British Gypsum. The quoted performances are achieved only if British Gypsum components are used throughout. 25mm Isover APR 1200 in the cavity. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 12. and the Company’s fixing recommendations are strictly observed.5 2 x 12.british-gypsum. weight kg/m2 System reference 30 minutes fire resistance EN 1 1 2 2 1 1 2 2 3 4 75 75 75 75 80 80 80 80 100 100 WallBoard SoundBloc WallBoard SoundBloc WallBoard SoundBloc WallBoard SoundBloc WallBoard WallBoard 1 x 12.5 2 x 15 2500 2800 2800 2800 2800 3000 3000 3700 36 36 39 42 44 46 51 45 Severe Heavy Heavy Heavy Heavy Severe Severe Severe 25 24 27 24 27 43 43 42 G106010 A206066 A206299 A206098 A206300 A206154 A206186 A206004 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa.5 2 x 12.Plasterboard drylinings / partitions / ceilings 74 A Table 1a – GypWall CLASSIC 48mm Gypframe ‘C’ Studs . 6 NBS work section K10 .5 2500 2500 2500 2500 2800 2800 2800 2800 3400 3000 34 37 40 43 36 39 42 44 42 49 Medium Medium Medium Medium Medium Medium Medium Medium Severe Severe 18 22 18 22 22 26 22 26 35 35 A206001 A206152 A206033 A206184 A206002 A206153 A206034 A206185 A206003 A206035 60 minutes fire resistance EN 1 1 1 2 2 3 4 3 75 80 80 80 80 100 100 110 Glasroc F MULTIBOARD FireLine SoundBloc F FireLine SoundBloc F SoundBloc SoundBloc WallBoard 1 x 12.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. whichever is the more onerous. 25mm Isover APR 1200 in the cavity. Refer to section 3 and section 14 for further details. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Linings as in table. Linings as in table.5 1 x 12. or skimmed according to British Gypsum’s recommendations. Linings as in table. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Linings as in table.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 4 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. NB The fire resistance and sound insulation performances are for imperforate partitions.5 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12.www.com GypWall CLASSIC Performance ( Refer to section 3 .5 1 x 12.
A Table 1a – GypWall CLASSIC 48mm Gypframe ‘C’ Studs . partition height1 mm Sound insulation Rw dB Duty rating Approx. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout.5 2 x 15 2 x 15 3400 3000 3000 42 49 53 Severe Severe Severe 40 51 51 A206067 A206155 A206187 120 minutes fire resistance EN 3 4 3 100 100 110 FireLine FireLine FireLine 2 x 12. weight kg/m2 System reference 90 minutes fire resistance EN 3 3 4 100 110 110 FireLine SoundBloc SoundBloc 2 x 12.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 NBS work section K10 . Linings as in table.5 2 x 15 3000 3000 3700 42 49 45 Severe Severe Severe 40 40 49 A206067 A206099 A206156 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. Linings as in table.Plasterboard drylinings / partitions / ceilings 75 GypWall CLASSIC 6 RR LIFETIM E .T 0844 800 1991 F 0844 561 8816 E bgtechnical.5 2 x 12. 25mm Isover APR 1200 in the cavity. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. and the Company’s fixing recommendations are strictly observed. NB The fire resistance and sound insulation performances are for imperforate partitions.com SP ECSURE ANTY EN 1 SY STEM W 2 3 4 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Any variation in the specifications should be checked with British Gypsum. whichever is the more onerous.enquiries@bpb. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. walls and ceilings incorporating boards with all joints taped and filled. or skimmed according to British Gypsum’s recommendations. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Refer to section 3 and section 14 for further details. 25mm Isover APR 1200 in the cavity.
5 2500 2500 2800 2800 2800 2800 3400 3400 3400 3400 43 36 36 39 42 44 42 46 49 51 Heavy Severe Heavy Heavy Heavy Heavy Severe Severe Severe Severe 20 25 24 27 24 27 35 43 35 43 G106008 G106010 A206066 A206299 A206098 A206300 A206003 A206154 A206035 A206186 1 Based on a limiting deflection of L/240 at 200 Pa.5 2 x 12.Basic principles of system design) SP ECSURE ANTY BS 1 SY STEM W 2 3 4 5 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 12. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout. Refer to 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.2 . 25mm Isover APR 1200 in the cavity. or skimmed according to British Gypsum’s recommendations. weight kg/m2 System reference 30 minutes fire resistance BS 1 1 1 2 2 1 1 2 2 70 75 75 75 75 80 80 80 80 Glasroc F MULTIBOARD WallBoard SoundBloc WallBoard SoundBloc WallBoard SoundBloc WallBoard SoundBloc 1 x 10 1 x 12. and the Company’s fixing recommendations are strictly observed. walls and ceilings incorporating boards with all joints taped and filled. section 3.5 2 x 12. Linings as in table. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. or reduced stud centres. Linings as in table. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.Plasterboard drylinings / partitions / ceilings 76 A Table 1b – GypWall CLASSIC 48mm Gypframe ‘C’ Studs . Linings as in table.5 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. partition height1 mm Sound insulation Rw dB Duty rating Approx.www. 6 NBS work section K10 .4.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 RR LIFETIM E .5 2 x 12. 50mm Isover APR 1200 in the cavity. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. 25mm Isover APR 1200 in the cavity.5 1 x 15 1 x 15 1 x 15 1 x 15 2500 2500 2500 2500 2500 2800 2800 2800 2800 35 34 37 40 43 36 39 42 44 Heavy Medium Medium Medium Medium Medium Medium Medium Medium 20 18 22 18 22 21 26 21 26 G106006 A206001 A206152 A206033 A206184 A206002 A206153 A206034 A206185 60 minutes fire resistance BS 3 1 1 1 2 2 4 4 5 5 70 75 80 80 80 80 100 100 100 100 Glasroc F MULTIBOARD Glasroc F MULTIBOARD FireLine SoundBloc F FireLine SoundBloc F WallBoard SoundBloc WallBoard SoundBloc 1 x 10 1 x 12. Any variation in the specifications should be checked with British Gypsum.com GypWall CLASSIC Performance ( Refer to section 3 .5 1 x 12. NB The fire resistance and sound insulation performances are for imperforate partitions.british-gypsum. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 12. Refer to section 3 and section 14 for further details.Principles of robust design.
25mm Isover APR 1200 in the cavity. 50mm Isover APR 1200 in the cavity. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. or reduced stud centres. Refer to 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Linings as in table.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 .2 . Linings as in table. section 3. Refer to section 3 and section 14 for further details. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Any variation in the specifications should be checked with British Gypsum. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. NB The fire resistance and sound insulation performances are for imperforate partitions. walls and ceilings incorporating boards with all joints taped and filled. Linings as in table.5 2 x 12. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.Plasterboard drylinings / partitions / ceilings 77 GypWall CLASSIC 6 RR LIFETIM E . partition height1 mm Sound insulation Rw dB Duty rating Approx. A Table 1b – GypWall CLASSIC 48mm Gypframe ‘C’ Studs . Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.Principles of robust design. The quoted performances are achieved only if British Gypsum components are used throughout.T 0844 800 1991 F 0844 561 8816 E bgtechnical.4. or skimmed according to British Gypsum’s recommendations.5 3100 3400 3400 41 42 49 Severe Severe Severe 40 40 40 G106011 A206067 A206099 1 Based on a limiting deflection of L/240 at 200 Pa. Linings as in table. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.enquiries@bpb. 25mm Isover APR 1200 in the cavity. weight kg/m2 System reference 90 minutes fire resistance BS 4 4 5 5 110 110 110 110 WallBoard SoundBloc WallBoard SoundBloc 2 x 15 2 x 15 2 x 15 2 x 15 3700 3700 3700 3700 45 49 49 53 Severe Severe Severe Severe 42 51 42 51 A206004 A206155 A206036 A206187 120 minutes fire resistance BS 4 4 5 90 100 100 Glasroc F MULTIBOARD FireLine FireLine 2 x 10 2 x 12. and the Company’s fixing recommendations are strictly observed.com BS 1 SP ECSURE ANTY SY STEM W 2 3 4 5 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.
and the Company’s fixing recommendations are strictly observed. Linings as in table. or skimmed according to British Gypsum’s recommendations.5 1 x 12. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Any variation in the specifications should be checked with British Gypsum.single layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . 25mm Isover APR 1200 in the cavity.british-gypsum. 50mm Isover APR 1200 in the cavity. walls and ceilings incorporating boards with all joints taped and filled. weight kg/m2 System reference 30 minutes fire resistance EN 1 1 2 3 2 3 1 1 2 3 2 97 97 97 97 97 97 102 102 102 102 102 WallBoard SoundBloc WallBoard WallBoard SoundBloc SoundBloc WallBoard SoundBloc WallBoard WallBoard SoundBloc 1 x 12.www.com GypWall CLASSIC Performance ( Refer to section 3 . whichever is the more onerous. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout. partition height1 mm Sound insulation Rw dB Duty rating Approx. Refer to section 3 and section 14 for further details. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 12. NB The fire resistance and sound insulation performances are for imperforate partitions. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Linings as in table.5 1 x 12.5 1 x 12.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.Plasterboard drylinings / partitions / ceilings 78 A Table 2a – GypWall CLASSIC 70mm Gypframe ‘C’ Studs .5 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 3600 3600 3600 3600 3600 3600 3800 3800 3800 3800 3800 36 40 42 43 45 47 38 42 43 44 47 Medium Medium Medium Medium Medium Medium Medium Heavy Medium Medium Heavy 18 22 18 19 22 22 22 26 22 22 26 A206013 A206164 A206045 A206138 A206196 A206228 A206014 A206165 A206046 A206139 A206197 60 minutes fire resistance EN 1 1 2 3 2 102 102 102 102 102 FireLine SoundBloc F FireLine FireLine SoundBloc F 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 3800 3800 3800 3800 3800 37 42 43 44 47 Heavy Heavy Heavy Heavy Heavy 24 27 24 24 27 A206078 A206301 A206110 A206141 A206302 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 6 NBS work section K10 .5 1 x 12.
5 1 x 12.4. and the Company’s fixing recommendations are strictly observed.T 0844 800 1991 F 0844 561 8816 E bgtechnical. Linings as in table.5 1 x 12. Refer to section 3 and section 14 for further details. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. For single layer Severe Duty solutions please refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Linings as in table. 50mm Isover APR 1200 in the cavity. A Table 2b – GypWall CLASSIC 70mm Gypframe ‘C’ Studs . Refer to section 3. The quoted performances are achieved only if British Gypsum components are used throughout.5 1 x 12.com BS 1 SP ECSURE ANTY SY STEM W 2 3 One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. walls and ceilings incorporating boards with all joints taped and filled.Plasterboard drylinings / partitions / ceilings 79 GypWall CLASSIC 6 RR LIFETIM E . 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.Principles of robust design. or reduced stud centres. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 3600 3600 3600 3600 3600 3600 3800 3800 3800 3800 3800 36 40 42 43 45 47 38 42 43 44 47 Medium Medium Medium Medium Medium Medium Medium Heavy Medium Medium Heavy 18 22 18 19 22 22 22 26 22 22 26 A206013 A206164 A206045 A206138 A206196 A206228 A206014 A206165 A206046 A206139 A206197 60 minutes fire resistance BS 1 1 2 3 2 102 102 102 102 102 FireLine SoundBloc F FireLine FireLine SoundBloc F 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 3800 3800 3800 3800 3800 37 42 43 44 47 Heavy Heavy Heavy Heavy Heavy 24 27 24 25 27 A206078 A206301 A206110 A206141 A206302 1 Based on a limiting deflection of L/240 at 200 Pa.5 1 x 12. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. partition height1 mm Sound insulation Rw dB Duty rating Approx.5 1 x 12. Linings as in table. Any variation in the specifications should be checked with British Gypsum. 25mm Isover APR 1200 in the cavity. weight kg/m2 System reference 30 minutes fire resistance BS 1 1 2 3 2 3 1 1 2 3 2 97 97 97 97 97 97 102 102 102 102 102 WallBoard SoundBloc WallBoard WallBoard SoundBloc SoundBloc WallBoard SoundBloc WallBoard WallBoard SoundBloc 1 x 12.enquiries@bpb.single layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 .2 . NB The fire resistance and sound insulation performances are for imperforate partitions. or skimmed according to British Gypsum’s recommendations.
50mm Isover APR 1200 in the cavity.double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 2 x 12.5 2 x 12. Refer to section 3 and section 14 for further details. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.www. whichever is the more onerous.5 2 x 12.5 2 x 15 2 x 15 2 x 15 4600 4600 4600 3000 4000 4000 46 49 50 51 54 56 Severe Severe Severe Severe Severe Severe 40 40 40 51 51 52 A206079 A206111 A206144 A206167 A206199 A206231 120 minutes fire resistance EN 1 2 3 1 2 122 122 122 132 132 FireLine FireLine FireLine FireLine FireLine 2 x 12.5 2 x 12. NB The fire resistance and sound insulation performances are for imperforate partitions. Linings as in table.com GypWall CLASSIC Performance ( Refer to section 3 . 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Linings as in table.5 2 x 12. 25mm Isover APR 1200 in the cavity. 6 80 NB For heights between 4200mm and 8000mm. weight kg/m2 System reference 30 minutes fire resistance EN 1 2 3 2 3 122 122 122 122 122 WallBoard WallBoard WallBoard SoundBloc SoundBloc 2 x 12.5 2 x 12. and the Company’s fixing recommendations are strictly observed.5 2 x 15 2 x 15 2 x 15 2 x 15 4600 4000 4000 4000 4900 4000 4900 4000 49 50 52 53 46 50 51 54 Severe Severe Severe Severe Severe Severe Severe Severe 43 35 43 44 42 42 51 51 A206166 A206142 A206198 A206230 A206016 A206048 A206167 A206199 90 minutes fire resistance EN 1 2 3 1 2 3 122 122 122 132 132 132 FireLine FireLine FireLine SoundBloc SoundBloc SoundBloc 2 x 12. NBS work section K10 .5 2 x 12. Any variation in the specifications should be checked with British Gypsum. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.Plasterboard drylinings / partitions / ceilings A Table 3a – GypWall CLASSIC 70mm Gypframe ‘C’ Studs . Linings as in table.5 4600 4600 4600 4600 4600 45 49 50 52 53 Severe Severe Severe Severe Severe 35 35 35 43 44 A206015 A206047 A206142 A206198 A206230 60 minutes fire resistance EN 1 3 2 3 1 2 1 2 122 122 122 122 132 132 132 132 SoundBloc WallBoard SoundBloc SoundBloc WallBoard WallBoard SoundBloc SoundBloc 2 x 12. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 2 x 12. or skimmed according to British Gypsum’s recommendations. partition height1 mm Sound insulation Rw dB Duty rating Approx.5 2 x 15 2 x 15 4200 4000 4000 4900 4300 46 49 50 46 50 Severe Severe Severe Severe Severe 40 40 40 47 49 A206079 A206111 A206144 A206251 A206253 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. walls and ceilings incorporating boards with all joints taped and filled. The quoted performances are achieved only if British Gypsum components are used throughout.5 2 x 12.5 2 x 12.british-gypsum.5 2 x 12.
weight kg/m2 System reference 60 minutes fire resistance BS 1 1 2 3 2 3 122 122 122 122 122 122 WallBoard SoundBloc WallBoard WallBoard SoundBloc SoundBloc 2 x 12. NB For heights between 4200mm and 8000mm. Any variation in the specifications should be checked with British Gypsum. Refer to section 3. Linings as in table. walls and ceilings incorporating boards with all joints taped and filled.enquiries@bpb.5 2 x 12.5 2 x 12.2 . 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. 50mm Isover APR 1200 in the cavity. A Table 3b – GypWall CLASSIC 70mm Gypframe ‘C’ Studs . partition height1 mm Sound insulation Rw dB Duty rating Approx.Principles of robust design. 25mm Isover APR 1200 in the cavity. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 2 x 12. Linings as in table. and the Company’s fixing recommendations are strictly observed. or skimmed according to British Gypsum’s recommendations. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.com BS 1 SP ECSURE ANTY SY STEM W 2 3 Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.Plasterboard drylinings / partitions / ceilings 81 GypWall CLASSIC 6 RR LIFETIM E . The quoted performances are achieved only if British Gypsum components are used throughout. NB The fire resistance and sound insulation performances are for imperforate partitions.5 2 x 12. Refer to section 3 and section 14 for further details.T 0844 800 1991 F 0844 561 8816 E bgtechnical.5 4200 4600 4600 4600 42 46 49 50 Severe Severe Severe Severe 40 40 40 41 G106013 A206079 A206111 A206144 1 Based on a limiting deflection of L/240 at 200 Pa.5 2 x 12. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. or reduced stud centres. Linings as in table. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).5 2 x 12.5 2 x 12.5 4600 4600 4600 4600 4600 4600 45 49 49 50 52 53 Severe Severe Severe Severe Severe Severe 35 43 35 36 43 44 A206015 A206166 A206047 A206142 A206198 A206230 90 minutes fire resistance BS 1 2 1 2 3 132 132 132 132 132 WallBoard WallBoard SoundBloc SoundBloc SoundBloc 2 x 15 2 x 15 2 x 15 2 x 15 2 x 15 4900 4900 4900 4900 4900 46 50 51 54 56 Severe Severe Severe Severe Severe 42 42 51 51 52 A206016 A206048 A206167 A206199 A206231 120 minutes fire resistance BS 1 1 2 3 112 122 122 122 Glasroc F MULTIBOARD FireLine FireLine FireLine 2 x 10 2 x 12.4.double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 .
50mm Isover APR 1200 in the cavity. walls and ceilings incorporating boards with all joints taped and filled. 4 5 6 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 3 x 25mm Isover APR 1200 in the cavity. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. weight kg/m2 System reference 30 minutes fire resistance EN 1 3 2 3 1 3 4 5 97 97 97 97 102 102 102 122 SoundBloc WallBoard SoundBloc SoundBloc WallBoard WallBoard SoundBloc WallBoard 1 x 12. 25mm Isover APR 1200 in the cavity. Any variation in the specifications should be checked with British Gypsum.5 1 x 12.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E .5 1 x 15 1 x 15 1 x 15 2 x 12.5 1 x 12.Plasterboard drylinings / partitions / ceilings 82 A Table 4a – GypWall CLASSIC 70mm Gypframe AcouStuds . and the Company’s fixing recommendations are strictly observed. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. NB For heights between 4200mm and 8000mm. 25mm Isover APR 1200 in the cavity. or skimmed according to British Gypsum’s recommendations. Refer to section 3 and section 14 for further details. Linings as in table. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.5 4000 4000 4000 4000 4000 3000 4700 4000 39 42 43 44 48 50 53 58 Heavy Heavy Heavy Heavy Heavy Heavy Severe Severe 24 27 24 24 27 27 43 43 A206A078 A206A301 A206A110 A206A141 A206A302 A206A304 A206A166 A206A198 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 6 NBS work section K10 . Linings as in table.5 1 x 12. partition height1 mm Sound insulation Rw dB Duty rating Approx. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout.british-gypsum.5 2 x 12. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Linings as in table.www. Linings as in table.com GypWall CLASSIC Performance ( Refer to section 3 . Linings as in table.5 3800 3800 3800 3800 4000 4000 4000 4700 41 44 48 49 38 42 50 47 Medium Medium Medium Medium Medium Medium Heavy Severe 22 19 22 23 22 22 26 35 A206A164 A206A138 A206A196 A206A228 A206A014 A206A139 A206A252 A206A015 60 minutes fire resistance EN 1 1 2 3 2 4 5 6 102 102 102 102 102 102 122 122 FireLine SoundBloc F FireLine FireLine SoundBloc F SoundBloc F SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. whichever is the more onerous. NB The fire resistance and sound insulation performances are for imperforate partitions.
5 2 x 15 4200 4000 5000 49 54 49 Severe Severe Severe 40 40 49 A206A079 A206A111 A206A251 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. whichever is the more onerous. 50mm Isover APR 1200 in the cavity.T 0844 800 1991 F 0844 561 8816 E bgtechnical. NB For heights between 4200mm and 8000mm. Linings as in table.enquiries@bpb. The quoted performances are achieved only if British Gypsum components are used throughout. weight kg/m2 System reference 90 minutes fire resistance EN 5 6 5 122 122 132 FireLine FireLine SoundBloc 2 x 12. partition height1 mm Sound insulation Rw dB Duty rating Approx. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.5 2 x 12. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 NBS work section K10 . Linings as in table. Linings as in table.5 2 x 15 4700 4700 3000 49 54 54 Severe Severe Severe 40 40 51 A206A079 A206A111 A206A167 120 minutes fire resistance EN 5 6 5 122 122 132 FireLine FireLine FireLine 2 x 12. 25mm Isover APR 1200 in the cavity. or skimmed according to British Gypsum’s recommendations. Linings as in table. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.com SP ECSURE ANTY EN 1 SY STEM W 2 3 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. Any variation in the specifications should be checked with British Gypsum. A Table 4a – GypWall CLASSIC 70mm Gypframe AcouStuds . walls and ceilings incorporating boards with all joints taped and filled. Linings as in table. Refer to section 3 and section 14 for further details. NB The fire resistance and sound insulation performances are for imperforate partitions. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.5 2 x 12. and the Company’s fixing recommendations are strictly observed.Plasterboard drylinings / partitions / ceilings 83 GypWall CLASSIC 6 RR LIFETIM E . 25mm Isover APR 1200 in the cavity. Linings as in table. 4 5 6 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 3 x 25mm Isover APR 1200 in the cavity.
50mm Isover APR 1200 in the cavity. walls and ceilings incorporating boards with all joints taped and filled. Refer to section 3 and section 14 for further details. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 3 x 25mm Isover APR 1200 in the cavity.4. and the Company’s fixing recommendations are strictly observed.Plasterboard drylinings / partitions / ceilings 84 A Table 4b – GypWall CLASSIC 70mm Gypframe AcouStuds . Linings as in table. weight kg/m2 System reference 30 minutes fire resistance BS 1 3 2 3 4 97 97 97 97 102 SoundBloc WallBoard SoundBloc SoundBloc SoundBloc 1 x 12. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 RR LIFETIM E . Refer to section 3.5 2 x 12. partition height1 mm Sound insulation Rw dB Duty rating Approx.www. Linings as in table. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 4 5 6 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.5 1 x 12.2 . Greater heights can be achieved through the use of Gypframe ‘I’ Studs.5 4000 4000 4000 4000 4000 4000 4700 4700 4700 39 42 43 44 48 50 47 53 58 Heavy Heavy Heavy Heavy Heavy Heavy Severe Severe Severe 24 27 24 24 27 27 35 43 43 A206A078 A206A301 A206A110 A206A141 A206A302 A206A304 A206A015 A206A166 A206A198 1 Based on a limiting deflection of L/240 at 200 Pa.5 2 x 12. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Linings as in table. or skimmed according to British Gypsum’s recommendations. NB The fire resistance and sound insulation performances are for imperforate partitions.5 1 x 12. 6 NBS work section K10 . Any variation in the specifications should be checked with British Gypsum. or reduced stud centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.Basic principles of system design) SP ECSURE ANTY BS 1 SY STEM W 2 3 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. The quoted performances are achieved only if British Gypsum components are used throughout. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.british-gypsum.5 1 x 15 3800 3800 3800 3800 4000 41 44 48 49 50 Medium Medium Medium Medium Heavy 22 19 22 23 26 A206A164 A206A138 A206A196 A206A228 A206A252 60 minutes fire resistance BS 1 1 2 3 2 4 5 5 6 102 102 102 102 102 102 122 122 122 FireLine SoundBloc F FireLine FireLine SoundBloc F SoundBloc F WallBoard SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12.com GypWall CLASSIC Performance ( Refer to section 3 . 25mm Isover APR 1200 in the cavity. NB For heights between 4200mm and 8000mm. Linings as in table. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 25mm Isover APR 1200 in the cavity. Linings as in table.Principles of robust design. Linings as in table.5 1 x 12.
25mm Isover APR 1200 in the cavity. Refer to section 3. Linings as in table. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 .enquiries@bpb.Principles of robust design. 25mm Isover APR 1200 in the cavity. Linings as in table. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. weight kg/m2 System reference 90 minutes fire resistance BS 5 132 SoundBloc 2 x 15 5000 54 Severe 51 A206A167 120 minutes fire resistance BS 5 6 122 122 FireLine FireLine 2 x 12. walls and ceilings incorporating boards with all joints taped and filled. Linings as in table. Linings as in table. or reduced stud centres. and the Company’s fixing recommendations are strictly observed. 4 5 6 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. 3 x 25mm Isover APR 1200 in the cavity. NB For heights between 4200mm and 8000mm.com BS 1 SP ECSURE ANTY SY STEM W 2 3 One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres. Linings as in table. Any variation in the specifications should be checked with British Gypsum.T 0844 800 1991 F 0844 561 8816 E bgtechnical. partition height1 mm Sound insulation Rw dB Duty rating Approx. The quoted performances are achieved only if British Gypsum components are used throughout. One layer of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.4. or skimmed according to British Gypsum’s recommendations. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). NB The fire resistance and sound insulation performances are for imperforate partitions. 50mm Isover APR 1200 in the cavity. Linings as in table.5 2 x 12.5 4700 4700 49 54 Severe Severe 40 40 A206A079 A206A111 1 Based on a limiting deflection of L/240 at 200 Pa. Greater heights can be achieved through the use of Gypframe ‘I’ Studs.Plasterboard drylinings / partitions / ceilings 85 GypWall CLASSIC 6 RR LIFETIM E . For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. A Table 4b – GypWall CLASSIC 70mm Gypframe AcouStuds . Refer to section 3 and section 14 for further details. Two layers of board each side of 70mm Gypframe 70 AS 50 AcouStuds at 600mm centres.2 .
Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 50mm Isover APR 1200 in the cavity. Linings as in table. Any variation in the specifications should be checked with British Gypsum. NB The fire resistance and sound insulation performances are for imperforate partitions. 100mm Isover Modular Roll in the cavity. The quoted performances are achieved only if British Gypsum components are used throughout. NB For heights between 4200mm and 8000mm. 3 x 25mm Isover APR 1200 in the cavity. 6 7 8 9 Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Refer to section 3 and section 14 for further details.com GypWall CLASSIC Performance ( Refer to section 3 . Linings as in table. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance.www. 25mm Isover APR 1200 in the cavity. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres.5 1 x 15 1 x 15 1 x 15 4000 4000 4000 4000 4000 4000 44 49 50 50 51 52 Heavy Heavy Medium Heavy Heavy Heavy 27 27 23 27 27 27 A206261 A206262 A206232 A206263 A206264 A206233 60 minutes fire resistance EN 1 1 2 5 2 3 5 4 8 124 124 124 124 124 124 124 124 144 FireLine SoundBloc F FireLine FireLine SoundBloc F SoundBloc F SoundBloc F SoundBloc F SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. walls and ceilings incorporating boards with all joints taped and filled. 6 NBS work section K10 . Linings as in table. Linings as in table. Linings as in table. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres.british-gypsum. or skimmed according to British Gypsum’s recommendations. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair3 mm Max. Linings as in table. and the Company’s fixing recommendations are strictly observed.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 4 5 One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 3 x 25mm Isover APR 1200 in the cavity. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres.5 4000 4000 4000 4000 4000 4000 4000 4000 4000 40 44 442 46 49 50 51 52 56 (51) Heavy Heavy Heavy Heavy Heavy Heavy Heavy Heavy Severe 25 27 25 25 27 27 27 27 44 A206265 A206305 A206266 A206268 A206306 A206309 A206308 A206307 A206234 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 3 These systems have an ACTIVair option available for VOC control to improve indoor air quality. 100mm Isover Modular Roll in the cavity.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . whichever is the more onerous. 25mm Isover APR 1200 in the cavity. Linings as in table. Linings as in table.Plasterboard drylinings / partitions / ceilings 86 A Table 5a – GypWall CLASSIC 92mm Gypframe ‘C’ Studs . weight kg/m2 System reference 30 minutes fire resistance EN 1 2 4 3 5 4 124 124 119 124 124 124 SoundBloc SoundBloc SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 12. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres.
100mm Isover Modular Roll in the cavity. whichever is the more onerous. and the Company’s fixing recommendations are strictly observed.Plasterboard drylinings / partitions / ceilings 87 GypWall CLASSIC 6 RR LIFETIM E . NB For heights between 4200mm and 8000mm. 50mm Isover APR 1200 in the cavity. Linings as in table. Linings as in table. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. walls and ceilings incorporating boards with all joints taped and filled. 3 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout.enquiries@bpb.T 0844 800 1991 F 0844 561 8816 E bgtechnical. 3 x 25mm Isover APR 1200 in the cavity. NB The fire resistance and sound insulation performances are for imperforate partitions.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 NBS work section K10 . One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table.com SP ECSURE ANTY EN 1 SY STEM W 2 3 4 5 One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair3 mm Max. Linings as in table. Any variation in the specifications should be checked with British Gypsum. weight kg/m2 System reference 90 minutes fire resistance EN 6 9 7 154 154 154 SoundBloc FireLine SoundBloc 2 x 15 2 x 15 2 x 15 5000 4000 5000 52 53 562 Severe Severe Severe 52 53 52 A206269 A206276 A206270 120 minutes fire resistance EN 6 7 9 154 154 154 FireLine FireLine FireLine 2 x 15 2 x 15 2 x 15 5900 5000 3000 50 522 53 Severe Severe Severe 52 52 53 A206273 A206274 A206276 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 25mm Isover APR 1200 in the cavity. 6 7 8 9 Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. or skimmed according to British Gypsum’s recommendations. A Table 5a – GypWall CLASSIC 92mm Gypframe ‘C’ Studs . 25mm Isover APR 1200 in the cavity. Linings as in table. 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. Linings as in table. Linings as in table. 3 x 25mm Isover APR 1200 in the cavity. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Refer to section 3 and section 14 for further details. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 100mm Isover Modular Roll in the cavity.
and the Company’s fixing recommendations are strictly observed.Principles of robust design. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. 3 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. 25mm Isover APR 1200 in the cavity. 100mm Isover Modular Roll in the cavity. or skimmed according to British Gypsum’s recommendations. or reduced stud centres. The quoted performances are achieved only if British Gypsum components are used throughout. 3 x 25mm Isover APR 1200 in the cavity. 50mm Isover APR 1200 in the cavity. 6 NBS work section K10 . Linings as in table. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Any variation in the specifications should be checked with British Gypsum.4. NB The fire resistance and sound insulation performances are for imperforate partitions. 100mm Isover Modular Roll in the cavity. 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance. weight kg/m2 System reference 30 minutes fire resistance BS 1 2 4 3 5 4 124 124 119 124 124 124 SoundBloc SoundBloc SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 12. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). walls and ceilings incorporating boards with all joints taped and filled. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair3 mm Max. 3 x 25mm Isover APR 1200 in the cavity. Linings as in table. Linings as in table. 6 7 8 9 Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 25mm Isover APR 1200 in the cavity. Refer to section 3 and section 14 for further details. Linings as in table. Linings as in table.Plasterboard drylinings / partitions / ceilings 88 A Table 5b – GypWall CLASSIC 92mm Gypframe ‘C’ Studs .Basic principles of system design) SP ECSURE ANTY BS 1 SY STEM W 2 3 4 5 One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres.com GypWall CLASSIC Performance ( Refer to section 3 . One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Refer to section 3.5 1 x 15 1 x 15 1 x 15 4700 4700 4500 4700 4700 4700 44 49 50 50 51 52 Heavy Heavy Medium Heavy Heavy Heavy 27 27 23 27 27 27 A206261 A206262 A206232 A206263 A206264 A206233 60 minutes fire resistance BS 1 2 2 5 2 3 5 4 8 124 124 124 124 124 124 124 124 144 FireLine SoundBloc F FireLine FireLine SoundBloc F SoundBloc F SoundBloc F SoundBloc F SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12.british-gypsum.2 .5 4700 4700 4700 4700 4700 4700 4700 4700 5700 40 44 442 46 49 50 51 52 56 (51) Heavy Heavy Heavy Heavy Heavy Heavy Heavy Heavy Severe 25 27 25 25 27 27 27 27 44 A206265 A206305 A206266 A206268 A206306 A206309 A206308 A206307 A206234 1 Based on a limiting deflection of L/240 at 200 Pa.www. NB For heights between 4200mm and 8000mm.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 RR LIFETIM E .
One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. and the Company’s fixing recommendations are strictly observed. weight kg/m2 System reference 90 minutes fire resistance BS 6 7 154 154 SoundBloc SoundBloc 2 x 15 2 x 15 5900 5900 52 562 Severe Severe 52 52 A206269 A206270 120 minutes fire resistance BS 6 7 9 154 154 154 FireLine FireLine FireLine 2 x 153 2 x 153 2 x 153 5900 5900 5900 50 522 53 Severe Severe Severe 52 52 53 A206273 A206274 A206276 1 Based on a limiting deflection of L/240 at 200 Pa. Linings as in table. 25mm Isover APR 1200 in the cavity. Refer to section 3.2 . 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. 50mm Isover APR 1200 in the cavity. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).5mm lining thickness is acceptable for 120 minutes BS but acoustic test data is not available. 6 7 8 9 Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. or reduced stud centres. Linings as in table. Linings as in table.Principles of robust design. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. 3 x 25mm Isover APR 1200 in the cavity.enquiries@bpb. NB The fire resistance and sound insulation performances are for imperforate partitions.Plasterboard drylinings / partitions / ceilings 89 GypWall CLASSIC 6 RR LIFETIM E . The quoted performances are achieved only if British Gypsum components are used throughout. One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. 4 These systems have an ACTIVair option available for VOC control to improve indoor air quality. 3 x 25mm Isover APR 1200 in the cavity.T 0844 800 1991 F 0844 561 8816 E bgtechnical. 25mm Isover APR 1200 in the cavity.com BS 1 SP ECSURE ANTY SY STEM W 2 3 4 5 One layer of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. walls and ceilings incorporating boards with all joints taped and filled. or skimmed according to British Gypsum’s recommendations. 3 2 x 12.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 . Refer to section 3 and section 14 for further details. NB For heights between 4200mm and 8000mm. A Table 5b – GypWall CLASSIC 92mm Gypframe ‘C’ Studs . 100mm Isover Modular Roll in the cavity. Linings as in table. Two layers of board each side of 92mm Gypframe ‘C’ Studs at 600mm centres. Any variation in the specifications should be checked with British Gypsum. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair4 mm Max. 100mm Isover Modular Roll in the cavity. Linings as in table. Linings as in table. Linings as in table.4.
100mm Isover Modular Roll in the cavity. Linings as in table. NB For heights between 4200mm and 8000mm. Linings as in table. Linings as in table. Linings as in table. 100mm Isover Modular Roll in the cavity.Plasterboard drylinings / partitions / ceilings 90 A Table 6a – GypWall CLASSIC 92mm Gypframe AcouStuds .www. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.5 2 x 12. The quoted performances are achieved only if British Gypsum components are used throughout.british-gypsum.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . Linings as in table. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. Linings as in table. Refer to section 3 and section 14 for further details. or skimmed according to British Gypsum’s recommendations. 50mm Isover APR 1200 in the cavity. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. whichever is the more onerous. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. NB The fire resistance and sound insulation performances are for imperforate partitions. 3 These systems have an ACTIVair option available for VOC control to improve indoor air quality. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. Linings as in table. weight kg/m2 System reference 30 minutes fire resistance EN 1 2 3 4 124 124 124 124 SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 4000 4000 4000 4000 45 50 51 52 Heavy Heavy Heavy Heavy 27 27 27 27 A206A281 A206A282 A206A283 A206A284 60 minutes fire resistance EN 1 2 1 4 2 3 4 5 6 7 8 124 124 124 124 124 124 124 144 144 144 144 FireLine FireLine SoundBloc F FireLine SoundBloc F SoundBloc F SoundBloc F SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance. Any variation in the specifications should be checked with British Gypsum. walls and ceilings incorporating boards with all joints taped and filled. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). 25mm Isover APR 1200 in the cavity. 50mm Isover APR 1200 in the cavity. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 4 One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres.5 2 x 12. and the Company’s fixing recommendations are strictly observed.5 4000 4000 4000 4000 4000 4000 4000 5000 5000 5000 5000 41 442 45 46 50 51 52 54 57 (51) 58 (53) 59 (54) Heavy Heavy Heavy Heavy Heavy Heavy Heavy Severe Severe Severe Severe 24 24 27 24 27 27 27 52 52 52 52 A206A285 A206A286 A206A305 A206A288 A206A306 A206A309 A206A308 A206A289 A206A290 A206A291 A206A292 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. Linings as in table. 5 6 7 8 Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. 6 NBS work section K10 .5 2 x 12. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair3 mm Max. 25mm Isover APR 1200 in the cavity.com GypWall CLASSIC Performance ( Refer to section 3 .
Linings as in table. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. 100mm Isover Modular Roll in the cavity. walls and ceilings incorporating boards with all joints taped and filled. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres.single and double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 NBS work section K10 . 5 6 7 8 Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.T 0844 800 1991 F 0844 561 8816 E bgtechnical. Any variation in the specifications should be checked with British Gypsum.com SP ECSURE ANTY EN 1 SY STEM W 2 3 4 One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. Refer to section 3 and section 14 for further details. Linings as in table. NB The fire resistance and sound insulation performances are for imperforate partitions. Linings as in table. Linings as in table. 100mm Isover Modular Roll in the cavity.5 2 x 12.5 2 x 12. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. 50mm Isover APR 1200 in the cavity. Linings as in table. 25mm Isover APR 1200 in the cavity. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. 25mm Isover APR 1200 in the cavity. and the Company’s fixing recommendations are strictly observed. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).Plasterboard drylinings / partitions / ceilings 91 GypWall CLASSIC 6 RR LIFETIM E . A Table 6a – GypWall CLASSIC 92mm Gypframe AcouStuds . The quoted performances are achieved only if British Gypsum components are used throughout. NB For heights between 4200mm and 8000mm. whichever is the more onerous. Linings as in table. or skimmed according to British Gypsum’s recommendations. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.5 2 x 12.5 3000 4000 4000 3000 51 54 55 56 Severe Severe Severe Severe 52 52 52 52 A206A293 A206A294 A206A295 A206A296 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. Linings as in table. 50mm Isover APR 1200 in the cavity. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.enquiries@bpb. weight kg/m2 System reference 120 minutes fire resistance EN 5 6 7 8 144 144 144 144 FireLine FireLine FireLine FireLine 2 x 12. Linings as in table.
NB For heights between 4200mm and 8000mm. 3 These systems have an ACTIVair option available for VOC control to improve indoor air quality. 5 6 7 8 Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.5 2 x 12. Any variation in the specifications should be checked with British Gypsum. or reduced stud centres. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. 6 NBS work section K10 .5 2 x 12. 25mm Isover APR 1200 in the cavity. Linings as in table. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. NB The fire resistance and sound insulation performances are for imperforate partitions.2 . Linings as in table.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 RR LIFETIM E . Linings as in table. 100mm Isover Modular Roll in the cavity. Linings as in table. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres.5 4900 4900 4900 4900 4900 4900 4900 5800 5800 5800 5800 41 442 45 46 50 51 52 54 57 (51) 58 (53) 59 (54) Heavy Heavy Heavy Heavy Heavy Heavy Heavy Severe Severe Severe Severe 24 24 27 24 27 27 27 52 52 52 52 A206A285 A206A286 A206A305 A206A288 A206A306 A206A309 A206A308 A206A289 A206A290 A206A291 A206A292 1 Based on a limiting deflection of L/240 at 200 Pa. walls and ceilings incorporating boards with all joints taped and filled. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. Refer to section 3 and section 14 for further details. Linings as in table.Plasterboard drylinings / partitions / ceilings 92 A Table 6b – GypWall CLASSIC 92mm Gypframe AcouStuds . 50mm Isover APR 1200 in the cavity. 100mm Isover Modular Roll in the cavity.www. 25mm Isover APR 1200 in the cavity.5 2 x 12. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. Linings as in table. Refer to section 3. weight kg/m2 System reference 30 minutes fire resistance BS 1 2 3 4 124 124 124 124 SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 4900 4900 4900 4900 45 50 51 52 Heavy Heavy Heavy Heavy 27 27 27 27 A206A281 A206A282 A206A283 A206A284 60 minutes fire resistance BS 1 2 2 4 2 3 4 5 6 7 8 124 124 124 124 124 124 124 144 144 144 144 FireLine FireLine SoundBloc F FireLine SoundBloc F SoundBloc F SoundBloc F SoundBloc SoundBloc SoundBloc SoundBloc 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 1 x 15 2 x 12. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair3 mm Max. Linings as in table. and the Company’s fixing recommendations are strictly observed.com GypWall CLASSIC Performance ( Refer to section 3 . or skimmed according to British Gypsum’s recommendations.Principles of robust design. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).Basic principles of system design) SP ECSURE ANTY BS 1 SY STEM W 2 3 4 One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. The quoted performances are achieved only if British Gypsum components are used throughout. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. 2 Increasing insulation to 50mm Isover APR 1200 will not improve this system performance. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. Linings as in table.4. 50mm Isover APR 1200 in the cavity.british-gypsum.
100mm Isover Modular Roll in the cavity. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. 25mm Isover APR 1200 in the cavity.5 2 x 12. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres.com BS 1 SP ECSURE ANTY SY STEM W 2 3 4 One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. Refer to section 3 and section 14 for further details. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Linings as in table.4. weight kg/m2 System reference 120 minutes fire resistance BS 5 6 7 8 144 144 144 144 FireLine FireLine FireLine FireLine 2 x 12. or reduced stud centres.5 2 x 12. Any variation in the specifications should be checked with British Gypsum. NBS work section K10 . NB The fire resistance and sound insulation performances are for imperforate partitions. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.single and double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 GypWall CLASSIC RR LIFETIM E .Plasterboard drylinings / partitions / ceilings 93 A Table 6b – GypWall CLASSIC 92mm Gypframe AcouStuds . Linings as in table. Refer to section 3. One layer of board each side of 92mm Gypframe AcouStuds at 600mm centres. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. Linings as in table. 50mm Isover APR 1200 in the cavity. Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres.T 0844 800 1991 F 0844 561 8816 E bgtechnical. NB For heights between 4200mm and 8000mm. Linings as in table. walls and ceilings incorporating boards with all joints taped and filled.2 . or skimmed according to British Gypsum’s recommendations. Linings as in table. 5 6 7 8 Two layers of board each side of 92mm Gypframe AcouStuds at 600mm centres. 100mm Isover Modular Roll in the cavity. 50mm Isover APR 1200 in the cavity.5 2 x 12. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout. and the Company’s fixing recommendations are strictly observed. Linings as in table. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.5 5800 5800 5800 5800 51 54 55 56 Severe Severe Severe Severe 52 52 52 52 A206A293 A206A294 A206A295 A206A296 1 Based on a limiting deflection of L/240 at 200 Pa. 25mm Isover APR 1200 in the cavity.enquiries@bpb. Linings as in table. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.Principles of robust design.
For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Any variation in the specifications should be checked with British Gypsum.5 2 x 15 2 x 15 2 x 15 4200 4000 4000 7900 7800 7800 50 51 51 50 51 51 Severe Severe Severe Severe Severe Severe 40 40 40 46 46 46 A206091 A206151 A206123 A206180 A206181 A206254 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 6 94 NB For heights between 4200mm and 8000mm. Linings as in table. NBS work section K10 . and outer layer of Gyproc FireLine fixed vertically each side of 146mm Gypframe ‘C’ Studs at 600mm centres. 25mm Isover APR 1200 in the cavity. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria).5 2 x 15 2 x 15 2 x 15 19 + 12.5 2 x 12. Inner layer of Gyproc Plank fixed horizontally. Refer to section 3 and section 14 for further details. The quoted performances are achieved only if British Gypsum components are used throughout. and the Company’s fixing recommendations are strictly observed. Linings as in table.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 4 Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.5 2 x 15 2 x 15 2 x 15 2 x 15 19 + 12. whichever is the more onerous.5 2 x 12.com GypWall CLASSIC Performance ( Refer to section 3 . 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.5 2 x 12. Linings as in table.5 2 x 12.5 2 x 12. weight kg/m2 System reference 30 minutes fire resistance EN 1 2 3 1 2 198 198 198 198 198 WallBoard WallBoard WallBoard SoundBloc SoundBloc 2 x 12. walls and ceilings incorporating boards with all joints taped and filled. 50mm Isover APR 1200 in the cavity. 25mm Isover APR 1200 in the cavity.www.5 2 x 12.british-gypsum. NB The fire resistance and sound insulation performances are for imperforate partitions.5 4000 5000 4000 5000 4000 4000 5000 7100 51 53 55 (49) 50 51 51 56 (50) 51 Severe Severe Severe Severe Severe Severe Severe Severe 36 43 43 42 42 43 51 54 A206149 A206178 A206210 A206028 A206060 A206150 A206179 A226002 90 minutes fire resistance EN 1 2 3 1 2 3 4 198 198 198 208 208 208 211 FireLine FireLine FireLine SoundBloc SoundBloc SoundBloc Plank + FireLine 2 x 12.double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx.5 2 x 12. or skimmed according to British Gypsum’s recommendations.5 2 x 12.Plasterboard drylinings / partitions / ceilings A Table 7a – GypWall CLASSIC 146mm Gypframe ‘C’ Studs .5 2 x 12. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table.5 2 x 12.5 7600 7600 7600 3000 4000 4000 4000 50 51 51 56 (50) 58 (52) 59 (53) 51 Severe Severe Severe Severe Severe Severe Severe 40 40 40 51 51 52 54 A206091 A206123 A206151 A206179 A206211 A206243 A226002 120 minutes fire resistance EN 1 3 2 1 2 3 198 198 198 208 208 208 FireLine FireLine FireLine FireLine FireLine FireLine 2 x 12.5 7600 7600 7600 7600 7600 50 51 51 53 55 (49) Severe Severe Severe Severe Severe 35 35 36 43 43 A206027 A206059 A206149 A206178 A206210 60 minutes fire resistance EN 3 1 2 1 2 3 1 4 198 198 198 208 208 208 208 211 WallBoard SoundBloc SoundBloc WallBoard WallBoard WallBoard SoundBloc Plank + FireLine 2 x 12.
Refer to section 3 and section 14 for further details. Linings as in table. Linings as in table.5 7100 7600 7600 7600 7100 48 50 51 51 51 Severe Severe Severe Severe Severe 40 40 40 41 54 G106014 A206091 A206123 A206151 A226002 1 Based on a limiting deflection of L/240 at 200 Pa.5 7100 59 Severe 54 A226001 120 minutes fire resistance BS 1 1 2 3 4 188 198 198 198 211 Glasroc F MULTIBOARD FireLine FireLine FireLine Plank + FireLine 2 x 10 2 x 12. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Linings as in table.double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 . Refer to section 3.5 2 x 12. Linings as in table.5 2 x 12.enquiries@bpb.T 0844 800 1991 F 0844 561 8816 E bgtechnical. or reduced stud centres.4. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available with ACTIVair2 Lining thickness mm Max. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. A Table 7b – GypWall CLASSIC 146mm Gypframe ‘C’ Studs . 25mm Isover APR 1200 in the cavity.5 2 x 12. NB The fire resistance and sound insulation performances are for imperforate partitions. and the Company’s fixing recommendations are strictly observed.5 19 + 12. and outer layer of Gyproc board fixed vertically each side of 146mm Gypframe ‘C’ Studs at 600mm centres. Inner layer of Gyproc Plank fixed horizontally. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx.5 2 x 12. 50mm Isover APR 1200 in the cavity. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.5 7600 7600 7600 7600 7600 7600 50 51 51 53 55 (49) 56 (50) Severe Severe Severe Severe Severe Severe 35 36 35 43 43 43 A206027 A206149 A206059 A206178 A206210 A206244 90 minutes fire resistance BS 1 2 1 2 3 4 208 208 208 208 208 211 WallBoard WallBoard SoundBloc SoundBloc SoundBloc Plank + SoundBloc 2 x 15 2 x 15 2 x 15 2 x 15 2 x 15 7900 7900 7900 7900 7900 50 51 56 (50) 58 (52) 59 (53) Severe Severe Severe Severe Severe 42 42 51 51 52 A206028 A206060 A206179 A206211 A206243 19 + 12. walls and ceilings incorporating boards with all joints taped and filled.5 2 x 12.Principles of robust design. The quoted performances are achieved only if British Gypsum components are used throughout. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. NB For heights between 4200mm and 8000mm.com BS 1 SP ECSURE ANTY SY STEM W 2 3 4 Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.5 2 x 12. 25mm Isover APR 1200 in the cavity.5 2 x 12. Any variation in the specifications should be checked with British Gypsum.Plasterboard drylinings / partitions / ceilings 95 GypWall CLASSIC 6 RR LIFETIM E . or skimmed according to British Gypsum’s recommendations. weight kg/m2 System reference 60 minutes fire resistance BS 1 3 2 1 2 3 198 198 198 198 198 198 WallBoard WallBoard WallBoard SoundBloc SoundBloc SoundBloc 2 x 12. Greater heights can be achieved through the use of Gypframe ‘I’ Studs.2 .
double layer board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 RR LIFETIM E . 50mm Isover APR 1200 in the cavity. or skimmed according to British Gypsum’s recommendations. NB For heights over 8000mm. The quoted performances are achieved only if British Gypsum components are used throughout. Linings as in table. walls and ceilings incorporating boards with all joints taped and filled. Linings as in table. NB For heights between 4200mm and 8000mm. 150mm Isover APR 1200 (100mm and 50mm) in the cavity. whichever is the more onerous. and the Company’s fixing recommendations are strictly observed. For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Gypframe Extra Deep Flange Floor & Ceiling Channel should be used at head and base.5 2 x 15 2 x 15 2 x 15 7800 4000 4000 4000 52 (48) 59 (54) 61 (56) 61 (57) Severe Severe Severe Severe 40 51 52 53 A206A091 A206A179 A206A243 A206A255 120 minutes fire resistance EN 1 1 198 208 FireLine FireLine 2 x 12. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality. Any variation in the specifications should be checked with British Gypsum. Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres. Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres.www. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. weight kg/m2 System reference 60 minutes fire resistance EN 1 1 3 208 208 208 WallBoard SoundBloc SoundBloc 2 x 15 2 x 15 2 x 15 5000 5000 5000 52 (47) 59 (54) 61 (57) Severe Severe Severe 42 51 53 A206A028 A206A179 A206A255 90 minutes fire resistance EN 1 1 2 3 198 208 208 208 FireLine SoundBloc SoundBloc SoundBloc 2 x 12.com GypWall CLASSIC Performance ( Refer to section 3 .5 2 x 15 4200 8100 52 (48) 52 (47) Severe Severe 40 50 A206A091 A206A180 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 6 NBS work section K10 . Refer to section 3 and section 14 for further details. NB The fire resistance and sound insulation performances are for imperforate partitions.british-gypsum.Basic principles of system design) SP ECSURE ANTY EN 1 SY STEM W 2 3 Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres.Plasterboard drylinings / partitions / ceilings 96 A Table 8a – GypWall CLASSIC 146mm Gypframe AcouStuds . Linings as in table.
NB For heights between 4200mm and 8000mm. NB The fire resistance and sound insulation performances are for imperforate partitions. Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres. or reduced stud centres. weight kg/m2 System reference 90 minutes fire resistance BS 1 1 2 3 208 208 208 208 WallBoard SoundBloc SoundBloc SoundBloc 2 x 15 2 x 15 2 x 15 2 x 15 8100 8100 8100 8100 52 (47) 59 (54) 61 (56) 61 (57) Severe Severe Severe Severe 42 51 52 53 A206A028 A206A179 A206A243 A206A255 120 minutes fire resistance BS 1 198 FireLine 2 x 12. 50mm Isover APR 1200 in the cavity.enquiries@bpb. Gypframe Deep Flange Floor & Ceiling Channel should be used at base and at head (subject to deflection criteria). Greater heights can be achieved through the use of Gypframe ‘I’ Studs. NB For heights over 8000mm. Gypframe Extra Deep Flange Floor & Ceiling Channel should be used at head and base. 150mm Isover APR 1200 (100mm and 50mm) in the cavity.com BS 1 SP ECSURE ANTY SY STEM W 2 3 Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres.4.5 7800 52 (48) Severe 40 A206A091 1 Based on a limiting deflection of L/240 at 200 Pa. Any variation in the specifications should be checked with British Gypsum. Linings as in table. Two layers of board each side of 146mm Gypframe 146 AS 50 AcouStuds at 600mm centres. Linings as in table. Linings as in table. Refer to section 3 and section 14 for further details. Refer to section 3. or skimmed according to British Gypsum’s recommendations.double layer board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 NBS work section K10 . For single layer Severe Duty solutions please also refer to GypWall ROBUST and GypWall EXTREME sections Detail Partition thickness mm Board type Available Lining with thickness ACTIVair2 mm Max.Principles of robust design. walls and ceilings incorporating boards with all joints taped and filled. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx. A Table 8b – GypWall CLASSIC 146mm Gypframe AcouStuds . and the Company’s fixing recommendations are strictly observed. 2 These systems have an ACTIVair option available for VOC control to improve indoor air quality.T 0844 800 1991 F 0844 561 8816 E bgtechnical. The quoted performances are achieved only if British Gypsum components are used throughout.2 .Plasterboard drylinings / partitions / ceilings 97 GypWall CLASSIC 6 RR LIFETIM E .
Detail Partition thickness mm Board type Lining thickness mm Max. The quoted performances are achieved only if British Gypsum components are used throughout.Plasterboard drylinings / partitions / ceilings 98 A RR E .5 + 1 x 12.5 3000 49 Severe 39 H206035 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa.5 + 1 x 12.5 2500 2500 3400 34 40 42 Medium Medium Severe 22 22 39 H206001 H206033 H206003 Glasroc H TILEBACKER Glasroc H TILEBACKER Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 4 100 1 x 12. Linings as in table. partition height1 mm Sound insulation Rw dB Duty rating Approx. NB The fire resistance and sound insulation performances are for imperforate partitions. 25mm Isover APR 1200 in the cavity.www. Linings as in table. 6 NBS work section K10 . Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table.com GypWall CLASSIC Performance ( Refer to section 3 .5 1 x 12. whichever is the more onerous. Linings as in table. Any variation in the specifications should be checked with British Gypsum.5 1 x 12. and the Company’s fixing recommendations are strictly observed.british-gypsum. or skimmed according to British Gypsum’s recommendations. Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. weight kg/m2 System reference 30 minutes fire resistance 1 2 3 75 75 100 EN 1 x 12.Basic principles of system design) Table 9a – GypWall CLASSIC 48mm Gypframe ‘C’ Studs .single and double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 SP LIFETIM ECSURE ANTY EN 1 SY STEM W 2 3 4 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. 25mm Isover APR 1200 in the cavity. walls and ceilings incorporating boards with all joints taped and filled. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.
partition height1 mm Sound insulation Rw dB Duty rating Approx.5 + 1 x 12.5 + 1 x 12.5 2500 2500 34 40 Medium Medium 22 22 H206001 H206033 Glasroc H TILEBACKER Glasroc H TILEBACKER 60 minutes fire resistance 3 100 BS 1 x 12.Principles of robust design.5 3400 42 Severe 39 H206003 Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 4 100 1 x 12.single and double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 SP LIFETIM ECSURE ANTY SY STEM W 2 3 4 One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. or reduced stud centres. Linings as in table.com BS 1 Table 9b – GypWall CLASSIC 48mm Gypframe ‘C’ Studs . Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.enquiries@bpb. Linings as in table. The quoted performances are achieved only if British Gypsum components are used throughout. NBS work section K10 . Two layers of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. Any variation in the specifications should be checked with British Gypsum. Linings as in table. Linings as in table. Detail Partition thickness mm Board type Lining thickness mm Max. 25mm Isover APR 1200 in the cavity. or skimmed according to British Gypsum’s recommendations. and the Company’s fixing recommendations are strictly observed. NB The fire resistance and sound insulation performances are for imperforate partitions.5 1 x 12. Refer to section 3. weight kg/m2 System reference 30 minutes fire resistance 1 2 75 75 BS 1 x 12.5 3400 49 Severe 39 H206035 1 Based on a limiting deflection of L/240 at 200 Pa. 25mm Isover APR 1200 in the cavity.4.T 0844 800 1991 F 0844 561 8816 E bgtechnical.Plasterboard drylinings / partitions / ceilings 99 GypWall CLASSIC 6 A RR E .2 . walls and ceilings incorporating boards with all joints taped and filled. One layer of board each side of 48mm Gypframe ‘C’ Studs at 600mm centres.
5 4000 50 Severe 39 H206142 Outer layer Glasroc H TILEBACKER and inner layer WallBoard 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. whichever is the more onerous.5 1 x 12.5 3600 3600 3600 4600 36 42 43 45 Medium Medium Medium Severe 22 22 23 39 H206013 H206045 H206138 H206015 Glasroc H TILEBACKER Glasroc H TILEBACKER Glasroc H TILEBACKER Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 5 122 1 x 12. partition height1 mm Sound insulation Rw dB Duty rating Approx. 25mm Isover APR 1200 in the cavity. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 + 1 x 12.5 + 1 x 12. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.british-gypsum. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. 50mm Isover APR 1200 in the cavity. Linings as in table.com GypWall CLASSIC Performance ( Refer to section 3 .www.5 4600 50 Severe 39 H206142 60 minutes fire resistance 6 122 EN 1 x 12.5 1 x 12. The quoted performances are achieved only if British Gypsum components are used throughout. Linings as in table. Linings as in table. NB The fire resistance and sound insulation performances are for imperforate partitions. walls and ceilings incorporating boards with all joints taped and filled. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. Any variation in the specifications should be checked with British Gypsum. and the Company’s fixing recommendations are strictly observed.5 + 1 x 12.single and double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 SP LIFETIM ECSURE ANTY EN 1 SY STEM W 2 3 One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table.Plasterboard drylinings / partitions / ceilings 100 A RR E . 6 NBS work section K10 . Linings as in table. 4 5 6 Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. 50mm Isover APR 1200 in the cavity. weight kg/m2 System reference 30 minutes fire resistance 1 2 3 4 97 97 97 122 EN 1 x 12.5 + 1 x 12. or skimmed according to British Gypsum’s recommendations. Linings as in table. Detail Partition thickness mm Board type Lining thickness mm Max.Basic principles of system design) Table 10a – GypWall CLASSIC 70mm Gypframe ‘C’ Studs . 25mm Isover APR 1200 in the cavity.5 1 x 12.5 4600 49 Severe 39 H206047 6 122 1 x 12.
2 . Any variation in the specifications should be checked with British Gypsum. 25mm Isover APR 1200 in the cavity.5 4600 45 Severe 39 H206015 Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 5 122 1 x 12. or skimmed according to British Gypsum’s recommendations. Detail Partition thickness mm Board type Lining thickness mm Max. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.single and double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 SP LIFETIM ECSURE ANTY SY STEM W 2 3 One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 + 1 x 12. Linings as in table.5 4600 50 Severe 39 H206142 1 Based on a limiting deflection of L/240 at 200 Pa. weight kg/m2 System reference 30 minutes fire resistance 1 2 3 97 97 97 BS 1 x 12. NB The fire resistance and sound insulation performances are for imperforate partitions.T 0844 800 1991 F 0844 561 8816 E bgtechnical.4.com BS 1 Table 10b – GypWall CLASSIC 70mm Gypframe ‘C’ Studs . Refer to section 3. 4 5 6 Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. partition height1 mm Sound insulation Rw dB Duty rating Approx.5 1 x 12.enquiries@bpb.5 + 1 x 12. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. Linings as in table.5 1 x 12.5 3600 3600 3600 36 42 43 Medium Medium Medium 22 22 23 H206013 H206045 H206138 Glasroc H TILEBACKER Glasroc H TILEBACKER Glasroc H TILEBACKER 60 minutes fire resistance 4 122 BS 1 x 12. Linings as in table. and the Company’s fixing recommendations are strictly observed. The quoted performances are achieved only if British Gypsum components are used throughout. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. NBS work section K10 .Principles of robust design. Two layers of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres. One layer of board each side of 70mm Gypframe ‘C’ Studs at 600mm centres.5 + 1 x 12.5 4600 49 Severe 39 H206047 6 122 1 x 12. walls and ceilings incorporating boards with all joints taped and filled. Linings as in table. 50mm Isover APR 1200 in the cavity.Plasterboard drylinings / partitions / ceilings 101 GypWall CLASSIC 6 A RR E . 50mm Isover APR 1200 in the cavity. Linings as in table. or reduced stud centres. Linings as in table. 25mm Isover APR 1200 in the cavity.
NB The fire resistance and sound insulation performances are for imperforate partitions. or skimmed according to British Gypsum’s recommendations. whichever is the more onerous. walls and ceilings incorporating boards with all joints taped and filled. Linings as in table.5 + 1 x 12.5 7600 51 Severe 40 H206149 60 minutes fire resistance 3 198 EN 1 x 12. 6 NBS work section K10 .com GypWall CLASSIC Performance ( Refer to section 3 .www. partition height1 mm Sound insulation Rw (Rw + Ctr) dB Duty rating Approx.5 4000 51 Severe 40 H206149 Outer layer Glasroc H TILEBACKER and inner layer WallBoard 1 The maximum heights quoted are limited by the fire state field of application or by limiting deflection of L/240 at 200 Pa. 25mm Isover APR 1200 in the cavity. Linings as in table.5 7600 51 Severe 39 H206059 3 198 1 x 12. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. Any variation in the specifications should be checked with British Gypsum. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. 50mm Isover APR 1200 in the cavity. The quoted performances are achieved only if British Gypsum components are used throughout.double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS EN 1364-1: 1999 SP LIFETIM ECSURE ANTY EN 1 SY STEM W 2 3 Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.Plasterboard drylinings / partitions / ceilings 102 A RR E .5 + 1 x 12. and the Company’s fixing recommendations are strictly observed.5 7600 50 Severe 39 H206027 Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 2 198 1 x 12. Linings as in table. Detail Partition thickness mm Board type Lining thickness mm Max. weight kg/m2 System reference 30 minutes fire resistance 1 198 EN 1 x 12.5 + 1 x 12.5 + 1 x 12.british-gypsum.Basic principles of system design) Table 11a – GypWall CLASSIC 146mm Gypframe ‘C’ Studs .
5 7600 50 Severe 39 H206027 Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard Outer layer Glasroc H TILEBACKER and inner layer WallBoard 2 198 1 x 12. Greater heights can be achieved through the use of Gypframe ‘I’ Studs. 25mm Isover APR 1200 in the cavity.T 0844 800 1991 F 0844 561 8816 E bgtechnical. or skimmed according to British Gypsum’s recommendations. NB The fire resistance and sound insulation performances are for imperforate partitions. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres. NBS work section K10 .2 . Refer to section 3. Any variation in the specifications should be checked with British Gypsum. Linings as in table. or reduced stud centres.4.5 7600 51 Severe 40 H206149 1 Based on a limiting deflection of L/240 at 200 Pa.Principles of robust design. Linings as in table. Detail Partition thickness mm Board type Lining thickness mm Max. 50mm Isover APR 1200 in the cavity. and the Company’s fixing recommendations are strictly observed.5 + 1 x 12.double layer incorporating Glasroc H TILEBACKER board linings Solutions to satisfy the requirements of BS 476: Part 22: 1987 SP LIFETIM ECSURE ANTY SY STEM W 2 3 Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.5 + 1 x 12. Linings as in table. partition height1 mm Sound insulation Rw dB Duty rating Approx. weight kg/m2 System reference 60 minutes fire resistance 1 198 BS 1 x 12.enquiries@bpb.5 7600 51 Severe 39 H206059 3 198 1 x 12.5 + 1 x 12. walls and ceilings incorporating boards with all joints taped and filled. The quoted performances are achieved only if British Gypsum components are used throughout. Two layers of board each side of 146mm Gypframe ‘C’ Studs at 600mm centres.Plasterboard drylinings / partitions / ceilings 103 GypWall CLASSIC 6 A RR E .com BS 1 Table 11b – GypWall CLASSIC 146mm Gypframe ‘C’ Studs .
Refer to section 3.com GypWall CLASSIC Design Planning . For special detailing that minimises the loss of acoustic performance: Refer to section 3. The cut-outs in the studs can be used for routing electrical and other small services (see Construction details – 1).5mm Gyproc plasterboard. For more information refer to the British Gypsum SITE BOOK.26.2 – Principles of building acoustics.2. a 38mm thick timber sole plate equal to the width of the channel should be used. consideration should be given to the size and weight of the damper . two rows of staggered fixings are required. Tiling. Fixing floor and ceiling channels Gypframe Floor & Ceiling Channels must be securely fixed with a row of fixings at 600mm maximum centres. Switch boxes and socket outlets can be supported from Gypframe 99 FC 50 Fixing Channel fixed horizontally between studs.this will determine whether it can be supported directly from the partition or needs to be independently supported from the structure. Where Gypframe AcouStuds are used. The openings should be constructed using established metal stud procedures. Heavyweight fixtures (to BS 5234) such as wash basins and wall cupboards.2 – Principles of building acoustics.21. Access panels must be fully compatible with drywall construction and match the fire rating of the partition. or other suitable precautions taken to prevent abrasion when they pass through the metal frame. consideration should be given to the installation of a damp-proof membrane between the floor surface and the channel or sole plate. can be fixed using Gypframe Service Support Plate. Electrical The installation of electrical services should be carried out in accordance with BS 7671.british-gypsum. services are routed through 50mm x 28mm ‘H’ shaped push-outs.2. Fixtures Lightweight fixtures can be made directly to the partition linings. Independent support When designing for the installation of services such as fire dampers and associated ductwork through a GypWall partition. Deflection heads Partition head deflection designs may be necessary to accommodate deflections in the supporting floor. Deflection heads may also be required to the underside of roof structures subjected to positive and negative pressures.5 – Service installations. or a high performance socket box detail used where higher acoustic performance is required. Board finishing Refer to section 13 – Finishing systems and decorative effects.5. consideration should be given to the potential loss of sound insulation performance through the steelwork. each row at 600mm centres and each fixing 25mm in from the flange. Partition to structural steelwork junctions When designing the layout of rooms requiring separation by sound insulating walls abutting structural steelwork. For 94mm channels and above.Basic principles of system design for general guidance . Medium weight fixtures can be made to Gypframe 99 FC 50 Fixing Channel.5 – Service installations.key factors The position of services and heavy fixtures should be pre-determined and their installation planned into the frame erection stage. Framing surround for openings Where services such as horizontal ducts. If the concrete or screeded floor is new. Standard door frame detailing to suit BS 5234 Light and Medium Duty applications is shown in Construction details – 24. Refer to section 3. fire dampers and access panels are required to penetrate the wall. See Construction details – 30 . available to download from www. their position should be pre-determined in order that a framed opening can be provided. Refer to section 3.british-gypsum.www. Detailing to satisfy BS 5234 requirements for Heavy and Severe Duty is shown in Construction details – 25 .31. Refer to section 3. screw-fixed into the web of perimeter channels or vertical studs. will provide a satisfactory closure to flame or smoke. Cavity fire barriers Minimum 12. The door manufacturer should also be consulted in relation to door details.2 – Service penetrations and fixing into drywall systems. Door openings The designer should consider thickness tolerances of the partition types in relation to the proposed door frame detail. at the same centres as shown in Construction details – 1a for conventional cut-outs. Refer to section 10 – Cavity fire barriers. Tiling For further details on tiling guidance: Refer to section 13 – Finishing systems and decorative effects. Refer to Construction details – 14 . Control joints Control joints may be required in the partition to relieve stresses induced by expansion and contraction of the structure (see Construction details – 11). Services Penetrations Penetrations of fire-resistant or sound-insulating constructions for services need careful consideration to ensure that the performance of the element is not downgraded and also that the services themselves do not act as the mechanism of fire spread or sound transmission. If the floor is uneven. They should coincide with movement joints within the surrounding structure. Access for maintenance Gyproc Profilex Access Panels are available to provide access for maintenance.com 6 104 Please refer to section 3 . Cables should be protected by conduit.
Gypframe ‘C’ and Gypframe ‘I’ Studs Centres at 600mm thereafter 1a Service cut-outs .Gypframe AcouStuds Centres at 600mm thereafter 1479mm 1479mm 75mm 30mm 879mm 75mm 38mm 75mm 38mm 75mm 38mm 75mm 38mm 50mm 50mm 28mm 28mm 28mm 279mm 279mm 879mm 48mm stud 60mm stud 70mm stud 92mm stud 146mm stud 70mm 70mm AcouStud 92mm 92mm AcouStud 146mm 146mm AcouStud 2 Head and base 4 2a Base with timber sole plate 50mm 3 1 2 1 2 6 3 11 7 8 6 3 Junction with masonry and stop end detail 3 2 1 10 4 5 1 2 3 4 5 6 Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Gypframe Floor & Ceiling Channel Gyproc Sealant Bulk fill with Gyproc jointing materials (where gap exceeds 5mm) Skirting 9 7 8 9 10 11 Floating screed on resilient layer Timber sole plate suitably fixed to structure Internal blockwork DriLyner BASIC wall lining system Isover insulation 105 GypWall CLASSIC 6 Construction details .T 0844 800 1991 F 0844 561 8816 E bgtechnical.enquiries@bpb.com 1 Service cut-outs .
detail may not be suitable for all solutions 2 1 2 1 3 6a ‘T’ junction to optimise acoustic performance and reduce flanking transmission 6b ‘T’ junction to optimise acoustic performance and reduce flanking transmission 2 1 4 2 1 3 3 7 Four way junction to optimise acoustic performance and reduce flanking transmission 8 Splayed corner 2 1 1 5 2 3 5 6 106 1 2 3 4 Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Isover insulation Gypframe GA5 Internal Fixing Angle 5 Gypframe GA6 Splayed Angle .british-gypsum.single layer 5 ‘T’ Junction when partition with higher acoustic performance abuts a partition with lower acoustic performance.www. Acoustic principles only .com GypWall CLASSIC Construction details 4 ‘T’ junction .
com 9 Corner detail .single layer 10 Corner detail .enquiries@bpb. 107 GypWall CLASSIC 6 Construction details .T 0844 800 1991 F 0844 561 8816 E bgtechnical.double layer 1 2 1 2 11 Typical control joint 12 Gypframe 99 FC 50 Fixing Channel (short legs flattened at stud positions) 16 mm 12 12 mm mm 2 5 2 3 1 1 4 13 Gypframe Service Support Plate 2 7 1 6 1 2 3 4 5 Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Stone mineral wool (minimum density 23kg/m3) (by others) Gyproc Control Joint Gypframe 99 FC 50 Fixing Channel 6 18mm plywood 7 Gypframe Service Support Plate NB If Gypframe Service Support Plates are being installed and not immediately boarded. secure plates with a Gyproc Wafer Head Drywall Screw or Gyproc Wafer Head Jack-Point Screw.
16).www. .british-gypsum. tightly fitted between studs 6 108 NB No fixings should be made through the boards into the flanges of the head channel. Where there is a need for a deflection head in a 90 minute wall.16) or alternatively. Continuous Gyproc FireStrip must be installed as shown to maintain fire performance.com GypWall CLASSIC Construction details 14 Deflection head for 15mm downward movement and 60 minutes fire resistance 8 7 15mm 15mm 15mm 15mm 15 Deflection head for 15mm downward movement and up to 120 minutes fire resistance 8 7 4 11 4 20mm 15mm (bottom of channel to top of stud nogging) 3 2 1 12 2 1 16 Deflection head for plus or minus 25mm movement and 60 minutes fire resistance 8 17 Deflection head for 50mm downward movement and 60 minutes fire resistance 8 9 25mm 9 50mm 25mm 8 6 50mm 8 6 30mm 55mm 3 2 1 3 2 1 18 Deflection head for plus or minus 25mm movement and 60 minutes fire resistance 8 19 Deflection head for 50mm downward movement and 60 minutes fire resistance 8 25mm 50mm 10 25mm 10 50mm 8 5 8 5 55mm 30mm 3 2 1 3 2 1 1 2 3 4 Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Gypframe GFS1 Fixing Strap Gypframe Deep Flange Floor & Ceiling Channel suitably fixed through fire-stop to structure at 600mm 5 Gypframe Extra Deep Flange Floor & Ceiling Channel suitably fixed through fire-stop to structure at 600mm 6 7 8 9 10 11 12 Gypframe Extra Deep Flange Floor & Ceiling Channel fixed to timber head plate Gyproc CoreBoard Gyproc FireStrip (continuous) Timber head plate suitably fixed to structure 25mm Glasroc F FIRECASE Stone mineral wool (minimum 33kg/m3) retained by stud nogging (by others) Nogging cut from Gypframe ‘C’ Stud. The arrow ( ) denotes the position of the uppermost board fixing. which should be made into Gypframe GFS1 Fixing Strap (or stud nogging in Construction details . the 120 minute solution can be used (refer to Construction details . please contact the British Gypsum Drywall Academy for further guidance.
The arrow ( 109 GypWall CLASSIC 6 Construction details .T 0844 800 1991 F 0844 561 8816 E bgtechnical.helps reduce flanking transmission 12 13 1 4 13 1 4 11 11 14 1 2 3 4 5 6 7 8 Gyproc plasterboard or Glasroc F specialist board Gyproc FireStrip (continuous line) Gypframe Deep Flange Floor & Ceiling Channels (DC) Gypframe ‘C’ Stud Gyproc Sealant Gyproc CoreBoard Fire-stopping (by others) Glasroc F FIRECASE 9 Gypframe 99 FC 50 Fixing Channel 10 Gypframe GFS1 Fixing Strap fixed to studs with Gyproc Wafer Head Drywall Screws 11 Isover insulation 12 External cladding 13 External wall stud framework 14 Cavity barrier (subject to regulatory requirements) ) denotes the position of the uppermost board fixing. which should be made into Gypframe GFS1 Fixing Strap.enquiries@bpb. Continuous Gyproc FireStrip must be installed as shown to maintain fire performance. NB No fixings should be made through the boards into the flanges of the head channel.com 20 Deflection head parallel to floor profile for 15mm downward movement and up to 60 minutes fire resistance 2 5 9 8 15mm 15mm 21 Deflection head perpendicular to floor profile for 15mm downward movement and up to 60 minutes fire resistance 7 2 5 15mm 15mm 6 6 3 3 15mm 15mm 10 10 4 1 4 1 22 Junction with external wall 12 23 Junction with external wall when acoustic performance is a key consideration .
www.com GypWall CLASSIC Construction details 24 Door frame to satisfy BS 5234: Parts 1 & 2: 1992 .british-gypsum.Light and Medium Duty 150mm 4 6 2 3 1200mm 1200mm 5 1 7 1 2 3 4 Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Gypframe Floor & Ceiling Channel Gypframe Floor & Ceiling Channel cut and bent to form door head 5 Timber door frame and architrave 6 Gypframe ‘C’ Stud to maintain stud module 7 Timber sub-frame 6 NB Advice should be sought from the door manufacturer prior to the construction of these details. 110 .
111 GypWall CLASSIC 6 Construction details .enquiries@bpb. The studs each side of the opening are sleeved full height of opening with Gypframe Floor & Ceiling Channel.Heavy and Severe Duty 150mm 4 6 3 2 300mm 7 1200mm 1200mm 5 1 150mm 1 Gyproc plasterboard or Glasroc F specialist board 2 Gypframe ‘C’ Stud 3 Gypframe Floor & Ceiling Channel to sleeve studs 4 Gypframe Floor & Ceiling Channel cut and bent to form door head 5 Timber door frame and architrave 6 Gypframe ‘C’ Stud to maintain stud module 7 Gypframe Floor & Ceiling Channel cut and bent to extend up studs NB Advice should be sought from the door manufacturer prior to the construction of these details.T 0844 800 1991 F 0844 561 8816 E bgtechnical. NB At the base. the channel is cut and bent to extend 300mm up the studs and fixed each side with two Gyproc Wafer Head Drywall Screws.com 25 Door frame to satisfy BS 5234: Parts 1 & 2: 1992 .
com GypWall CLASSIC Construction details 26 Alternative door frame to satisfy BS 5234: Parts 1 & 2: 1992 . NB At the base.british-gypsum. GypWall ROBUST and GypWall EXTREME for fixed head situations only. NB The principle of this alternative detail is only suitable for GypWall CLASSIC. The studs each side of the opening are sleeved full height of opening with Gypframe Floor & Ceiling Channel. the channel is cut and bent to extend 300mm up the studs and fixed each side with two Gyproc Wafer Head Drywall Screws.www. .Heavy and Severe Duty 8 7 150mm 4 6 3 2 300mm 9 1200mm 1200mm 1200mm 5 1 150mm 1 Gyproc plasterboard or Glasroc F specialist board 2 Gypframe ‘C’ Stud 3 Gypframe Floor & Ceiling Channel to sleeve studs 4 Gypframe Floor & Ceiling Channel cut and bent to form door head 5 Timber door frame and architrave 6 Gypframe ‘C’ Stud to maintain stud module 7 Gypframe ‘C’ Studs fixed back to back with Gyproc Drywall Screws at 300mm centres staggered 8 Plasterboard infill (same type as lining) cut to fit between studs 9 Gypframe Floor & Ceiling Channel cut and bent to extend up studs 6 112 NB Advice should be sought from the door manufacturer prior to the construction of these details.
typical configuration 3 5 2 1 4 28 Horizontal board joint .double layer 29 Horizontal board joint .single layer 6 6 3 8 7 7 1 2 3 4 Inner layer of Gyproc plasterboard or Glasroc F specialist board Outer layer of Gyproc plasterboard or Glasroc F specialist board Gypframe GFS1 Fixing Strap Gypframe metal framing 5 6 7 8 Gyproc Drywall Screws Gyproc plasterboard or Glasroc F specialist board Gypframe ‘C’ Stud Gypframe GFT1 Fixing T (alternatively use Gypframe GFS1 Fixing Strap) 113 GypWall CLASSIC 6 Construction details .enquiries@bpb.T 0844 800 1991 F 0844 561 8816 E bgtechnical.com 27 Board layout .
com GypWall CLASSIC Construction details 30 Opening for service penetrations in fire-rated partitions 2 Section X .british-gypsum.X 1 3 4 Elevation X Y Section Y .Y 3 1 2 4 31 Fire tested construction in which the damper is supported by the partition (isometric view) 5 4 2 1 1 Gyproc plasterboard or Glasroc F specialist board 2 Gypframe ‘C’ Stud 3 Gypframe Floor & Ceiling Channel 6 114 4 Penetration seal (as tested by damper manufacturer or proprietary alternative. Size of damper should not exceed 1400 x 1200mm .www. Weight of damper should not exceed 57kg. confirmed as compatible by system designer / specifier (plasterboard lining around opening may not be required) 5 Damper (by others).
com 115 GypWall CLASSIC 6 .T 0844 800 1991 F 0844 561 8816 E bgtechnical.enquiries@bpb. | 2019-04-22T21:09:40Z | https://www.scribd.com/document/187957143/White-Book-Gypwall-Classic-13 |
As reflected in the title, the main objective of the paper is to explore an appropriate approach to promote technological innovation for developing countries. Aiming to this goal, the paper studies three main innovation system approaches, whose implantation is being attempted in developing countries: first, national innovation systems (NIS), which was developed in OECD countries; second, the system of innovation for development (SID), which is a concept that tries to adapt NIS to developing countries; and third, inclusive innovation which is a pro-poor innovation system. Based on the strengths and the weaknesses of each concept and their potential adaptation in developing countries, the paper proposes an integrated approach of innovation system for developing countries. Compared to developed countries, the concept of innovation system in developing countries should be more complex because it involves not only the formal sector such as enterprises, universities, research institutes, government, and financial system but it also involves NGOs, informal companies, grassroots inventors, local and indigenous knowledge, etc. The last part of the paper discusses the ideas that innovation stakeholders in developing countries can use to promote their proper innovation system.
Innovation occupies a very important place in our society. On the one hand innovation is considered as a critical factor in enhancing economic growth and competitiveness; and on the other hand innovation is considered as a crucial element for social cohesion, equality and poverty alleviation. Innovation might also be seen as a way to solve important problems relating to pollution, energy and urbanism. Yet the main focus of innovation is to create economic wealth (Lundvall and Borras 2005).
Since the early 1990s, the concept of a national innovation system (NIS) has attracted the attention of many policymakers. The concept has gained much intellectual and practical coherence over the previous decades and has been adopted by the OECD, the European Commission, UNCTAD and developed countries. The NIS was widely diffused in all corners of the world, including in developing countries. For more than a decade, NIS has increasingly become the focus of a means to address some of the more profound issues for developing nations. The NIS was developed in OECD countries. Its implementation in developing countries varied greatly based on reactions from scholars. Some of them completely rejected the notion and certain scholars proposed an adaptation to the concept to take into account the local, social, economic and political situation of developing countries.
On the hand, there is also a similar initiative to promote innovation in developing countries, for example grassroots innovation, with the ambition to use innovation to improve the productivity and livelihoods of people. Little is known about innovation, technological development, entrepreneurships and the dynamics and changes that take place between sectors, and their relationship with economic and social changes in developing countries. However, there is an increase of interest in promoting this type of inclusive innovation.
The main purpose of the paper is to explore an appropriate approach to promote technological innovation for developing countries. The elaboration of new mechanisms shall require the analysis of current approaches and existing practices to (1) understand the limitation of each concept, (2) understand the current constraints faced by the main actors and (3) propose new possible mechanisms to make innovation work in developing countries.
The paper will begin with an introduction and be followed by a discussion about the nature and the limitation of the three main innovation system approaches whose implementation is being attempted in developing countries: first, national innovation systems (NIS), which was developed in OECD countries; second, the system of innovation for development (SID), which is a concept that tries to adapt NIS to developing countries; and third, inclusive innovation which is a pro-poor innovation. To end, the paper proposes an integrated approach to promote innovation in developing countries.
The majority of science, technology and innovation (STI) policy specialists agree that notion of the National Innovation System (NIS) is based on the research of Freeman (1987), Lundvall (1992) and Nelson (1993). These researchers are considered the founding fathers of the NIS. According to Benoit Godin, the NIS concept is rooted on the system approach which was developed by the OECD back in 1960 along with the notion of the system dynamic and system analysis which were popular at the time (Godin 2007). Godin also explains that many researchers, particularly concerning management, began to use a system approach to study decisions and choices regarding STI at the end of 1950s. Therefore, the NIS concept is not completely new. However, he recognizes that that OECD has been a very early and systematic user of system approach. Lundvall – Deputy Director of the OECD Directorate for Science, Technology and Industry from 1992 to 1995 – set up the concept of NIS in OECD.
To date, there is no single accepted definition of a NIS. However there is a semantic core that appears in most of the definitions. Box 1 outlines some of the definitions.
Based on these definitions, we can conclude that the basic notion of the NIS is a set of interrelated institutions; its core is made up of those institutions that produce, diffuse and adapt new technical knowledge, be they industrial firms, universities, or government agencies. The links between these institutions consist of flows: knowledge, financial, human (people being the bearers of tacit knowledge and knowhow), regulatory, and commercial.
A. The NIS adopts the systemic approaches as opposed to the linear model of innovation. In the linear model, knowledge flows are modeled quite simply: the initiator of innovation is science and an increase in scientific inputs into the pipeline will directly increase the number of new innovations and technologies. In reality, ideas for innovation can come from many sources and at any stage of research, development, marketing and diffusion. Innovation can take many forms, including adaptations of products and incremental improvements to processes (OECD 1997). This systemic approach is also arguably better suited for policymakers as it allows them to identify leverage points or weak links within the network. NIS is holistic and interdisciplinary. The operation and governance of an NIS is interdisciplinary in nature, in terms of technology convergence as well as administration. NIS covers all the technologies that operate in the nation and draws from all ministries and departments, though the science and technology (S&T) ministry might take the lead in the design of an NIS.
B. Innovation is the focus of national innovation system. It is the result of a complex interaction between various actors and institutions. Lundvall pointed out that “innovation is a ubiquitous phenomenon in the modern economy. In practically all parts of the economy, and at all times, we expect to find on-going processes of learning, searching and exploring, which result in new products, new techniques, new forms of organization and new markets.” He underlined that innovation is both gradual and cumulative, and is a process rather than a stage. Therefore innovation is not merely an individual act of learning by a firm or entrepreneur, but is situated within a larger system that both enables and draws on the innovative process (Lundvall 2000).
C. There is a flow of knowledge in the NIS. There are many channels and mechanisms through which knowledge can flow among the institutions. Principally, there are four basic knowledge flows among actors in a national innovation system: 1) interactions among enterprises; 2) interactions among enterprises, universities and public research laboratories; 3) diffusion of knowledge and technology to firms; and 4) movement of personnel (OECD 1997).
D. The NIS is the networking of the firms, public research institutes, universities, financial institutions, educational system government regulatory bodies and others. They are interdependence each other. In the systems approaches, overall innovation performance of an economy depends not so much on how specific formal institutions (firms, research institutes, universities etc.) perform, but on how they interact with each other as elements of a collective system of knowledge creation and use, and on their interplay with social institutions such as values, norms, legal frameworks, and so on (Smith 1994).The linkages among the stakeholders involved in innovation are key to improving technology performance.
Between 1994 and 2001, the OECD conducted two phases of projects on NIS. The OECD countries have been using the NIS concept without much difficulty due to the fact that it was developed in OECD countries. However, many scholars have been questioning the implementation of NIS in developing countries. Taking in consideration the nature of the NIS concept, its implementation in developing countries is problematic, as shows the below synthesis.
- The key science and technology institutions of the innovation system which are often analyzed in developed countries, such as universities, research institutes and laboratories, are missing or inadequate (Pietrobelli and Rabellotti 2009). If any, there is lack of capacity to conduct advanced research (Chaminade et al. 2010). The absence or inadequacy of these institutions raises an important systemic problem.
- The developing countries have a large number of microenterprises operating in the informal sector. NIS does not take in consideration the informal sector meanwhile it is an important economic player in developing countries.
- Non-Governmental Organizations (NGOs) play an important role in promoting grassroots innovation in many developing countries. Unfortunately, NIS has not foreseen the role that they can play in NIS.
Second, the processes of innovation in developing countries are of a different nature in comparison with developed countries: incremental innovations and absorption of knowledge and technologies new to the firms are more frequent and relevant in developing countries than radical innovations that are new to the world. While the analysis of NIS in industrialized economies has increasingly focused on R&D and frontier innovation, in most LDCs, the nature of innovation is quite different (Pietrobelli and Rabellotti 2009). Furthermore, NIS focuses only on firm based innovation and neglects the grassroots innovation which has an immense potential for wealth creation and which meet the need of economically disadvantaged people. Currently, there are many successful grassroots technological innovations in developing countries, unfortunately, so far, the economic impact of these innovations has been low.
Third, regarding the flow of knowledge, as the system has very limited capacity in creating knowledge, the inflows of knowledge and technology from external sources are essential components in the innovation and learning process in the developing countries. There is a more or less important number of foreign-based firms which tend to be disconnected from the rest of the economy.
Fourth, on the contrary to the developed countries, as a whole, developing countries have a heterogeneous economy with a large number of micro-enterprises operating in the informal sector. The innovation system in developing countries is characterized by a low degree of institutional thickness and thus weak interactive learning (D’Costa 2006). Moreover, the links between informal and formal institutions seem to be weak in general (Chaminade et al. 2010).
In addition to the problems which are related to the nature of NIS concept, developing countries face several other obstacles in the race to innovation, which mainly derive from contrasting business models, poor governance and low education level.
Low educational levels : Educational levels are low in developing countries and this is a significant barrier to the development and diffusion of innovation in these countries. In fact, one can establish a clear relation between educational needs and the different phases of industrialization. In the pre-industrial phase, educational needs demand only basic literacy. In the industrial phase, more professional and medium- level skills are required. In the post-industrial phase, there is a need for a significant share of a population with tertiary education, with the rest of the population having at least functional literacy (Aubert 2004).
Weak infrastructure : There is the issue of a lack of infrastructure. Of primary importance is, of course, the telephone infrastructure and internet connection. Mobile phone technology has transformed the conditions of telecommunications in developing countries. Yet, the tele-density remains weak in a number of developing countries, inferior to what may be considered the minimal threshold for take-off (around 30 percent). Progress made with mobile phone technology can lead to rapid improvements in connectivity; however it does not solve the necessity for greater internet penetration – something which remains quite low in most developing countries. Infrastructural needs for innovation in developing countries are, however, not limited to telecommunications. Road and other transport infrastructure are of primary importance, as well as sanitation, water, and other systems (Aubert 2004). Another problem is the lack of technological support services and infrastructure (metrology, quality control, standards, etc.).
Poor quality of the business environment : In developing countries, formal rules and laws are less well developed and, more importantly, their enforcement tends to be unreliable and arbitrary (Altenburg 2008). More generally, when judging the quality of a business environment it is of crucial importance to go beyond the formal appearance of laws, to examine how laws are applied in practice in taking due account of the more or less informal relations regulating transactions among economic agents (Aubert 2004). Altenburg (2008) stated that the results of such interference rarely stimulate innovative behaviour.
Almost inexistent innovation policy : There are only a very few developing countries that have innovation policies or strategies in place. If any, most of the innovation initiatives in developing countries are hi-tech oriented that do not meet the needs of the poor or the marginalized.
In order to overcome the difficulties to implement NIS in developing countries, which were discussed in the previous section, in 2001, Charles Edquist, Director of the Centre for Innovation, Research and Competence in the Learning Economy (CIRCLE), Lund University, Sweden, proposed System Innovation for Developing Countries, so called System Innovation for Development (SID). The SID concept was based on the existing OECD System of Innovation (SI) however Edquist included specific measures to guarantee its applicability in developing countries.
To better understand the difference between the two approaches, in particular the difference between innovation in developed and developing countries, Edquist has laid out the different kinds of innovation in order to provide an answer what is meant by innovation in the context of a developing country. He made a useful distinction between (i) process and product innovations, (ii) incremental and radical/ breakthrough innovations, (iii) development, diffusion and use/production of new processes and products, and (iv) innovation in low, medium and high technology sectors.
Edquist also points out that a system of innovation (SI) and a system of innovation for development (SID) have the same nine basic characteristics (listed below). For example, they place innovation at the core and they both consider the innovation process to be evolutionary, stress the differences between systems and that innovation is an interactive learning process (systemic), reject the notion of optimality , emphasize interdependence between organizational actors in a context of institutional rules, and encompass different kinds of innovations.
(1) They place innovation and other learning processes at the centre of focus.
(2) They adopt a holistic and interdisciplinary perspective.
(3) They use a historical perspective and consider innovation processes to be evolutionary.
(4) They stress differences between systems, and that the notion of optimality is irrelevant.
(6) They include product and process innovations, as well as their development and diffusion.
(8) They are associated with conceptual diffuseness.
(9) They are conceptual frameworks, rather than formal theories.
(1) Product innovations are more important than process innovations because of their effect on production structure. Such structural changes are more called for in developing countries than in developed ones, simply because achieving a more advanced production structure is an immanent part of the process of development. Therefore the difference in importance between product and process innovations is larger in developing countries.
(2) Incremental innovations are more important than radical ones in developing countries, partly because they are more attainable for them. This concerns particularly countries at an early stage of development.
(3) Absorptions (diffusion) is more important than development of innovations that are new to the world. For developing countries the generation of technological capability is primarily a matter of absorbing products and processes developed in other countries and deepening their knowledge about them over time. Therefore, the diffusion and absorption of innovations are of more interest in a SID perspective than in a general SI perspective. With regard to emphasis on different kinds of innovations, this is the most important difference between the general SI approach and the SID version.
(4) Finally, innovations in low and medium technology sectors are more easily attainable in developing countries than innovations in high technology sectors. This has to do with the fact that innovations in high technology sectors are often science based and quite sophisticated.
Despite the introduction of new elements in the SID concept, its implementation in developing countries is still difficult. Edquist (2001), himself, recognized that the implementation of this approach has a limit because many of the organizations and institutions that are instrumental and important for innovation processes are simply not in place or not appropriate in developing countries. Private organizations are often less capable of handling the absorption of innovations than firms in developed countries. Meaning that private organizations (including firms) do not produce enough innovation-based economic growth and welfare. In addition, many public organizations of innovation relevance are insufficiently integrated with other organizations in the system. Also formal institutions, like legal frameworks and incentive systems, and informal institutions like business practices and norms governing collaboration between firms are often less appropriate in developing countries. As the concept was developed based on the NIS, so SID maintains the same constrain that the NIS has.
The main issue in developing countries is poverty with a large percentage of people having limited access to basic services such as food, water, housing, health and education. Innovation can be a critical tool to overcome these challenges. What is needed is not only to reduce costs and increase the availability of goods and services, but more importantly to encourage sustainable livings and produce income-generating opportunities for the poor. Furthermore, innovation, through access to new and existing technology, can help create more and better paying jobs.
During the last decades, there has been an increase in interest of the role of innovation in developing countries. Unfortunately, with some exceptions, they do not systematically address reducing poverty or socially inclusive types of innovation because the innovation in formal sector was designed to achieve economic growth and competitiveness and not to reduce poverty (Kaplinsky 2010; STEP Centre 2010).
At least during the last several years, we witnessed the growth of interest in pro-poor innovation. This has been reflected by the growing body of literature dealing with this subject. Iizuka and SadreGhazi (2011) explain that the growing attention to “pro-poor innovation” is related to the current transformation of global challenges that requires a different approach to search for the possible solutions. First, there is an enlarging role of developing countries as new producers and markets. Second, there is a growing global awareness that the widening gap between those who have and those who do not have has been endangering long term sustainability not only for the developing countries but also for developed countries. Third, conventional approaches to international aids and their effectiveness are being widely questioned. Fourth, innovation capability, together with science and technology, are increasingly highlighted as important elements not only for the economic growth but also for poverty alleviation.
A pro-poor innovation system can be defined as a multi-stakeholder social learning process that generates new knowledge, puts it to use, and expands the capabilities and opportunities of the poor (Berdegué 2005). Inclusion of the poor in every step of innovation process is the key of success in pro-poor innovation concept. Inclusion can take place by building the capacity of the poor to produce what they already know how to and do produce, as well as building the capacity of the poor to use their innovations and outstanding traditional knowledge (World Bank 2010).
An important means of encouraging inclusive innovation is to support grassroots innovation networks and indigenous and traditional knowledge initiatives and to promote and diffuse their innovations (World Bank 2010). Grassroots innovation is primary a bottom-up approach of pro-poor innovation (Gupta 2010). It is networks of activists and organizations that generate novel bottom–up solutions for sustainable development: solutions that respond to the local situation and the interests and values of the communities involved (Seyfang and Smith 2010).
The output of a grassroots innovation is a product that caters to the local need, by offering simple-to-operate products that are transformed or no-frills versions of an existing product category. Some of them are based on indigenous knowledge, like medicine. However, such innovations are centred on a product/invention and face similar obstacles in terms of diffusion and scaling up.
Anil Gupta (2009) states that the grassroots method can help the organized (formal) sector learn from grassroots innovators and traditional knowledge holders to solve problems in an affordable, accountable and accessible manner. He explains that there are three main reasons: first, the lack of material resources spurs knowledgeintensive innovations by common people in the informal sector and thus provides a basis for sustainability by reducing entropy; second, the grassroots innovations are important not only because they are low cost and maintainable at local levels, but also because they offer the problem solving techniques which can be applied in different contexts; and third, several of these innovations can be blended.
- For instance, to encourage formal creation and commercialization efforts that focus on the challenges facing the poor, it can be very difficult to find private companies that will invest in this kind of innovation because there is no economic guarantee. Thus, funding is dependent on government subsidization. Observing many failure cases of the grassroots initiatives, policy-makers are reluctant to support these ventures.
- There are five main challenges regarding the implementation of grassroots innovation: high transaction costs of scouting and documentation, the need for value addition, for commercialization, and for finance; and unclear intellectual property rights (Utz and Dahlman 2007). These challenges make the implementation of grassroots innovation very difficult.
- Hua et al.(2010) state that individual grassroots innovation in China still faces great difficulties, due to: (i) lack of policy measures to support grassroots innovation, (ii) limited capacity of grassroots inventors and lack of inter-related social network among them, (iii) no existence of a financial system to support the grassroots innovation; (iv) the products of grassroots innovation are relatively simple (low technology) and therefore easy to imitate, which mainly make the protection of the intellectual property rights very difficult. It constrains the benefits of China’s grassroots innovation to a large extent.
- The sustainability of the activities that help informal enterprises better absorb existing knowledge is questionable as it depends on government incentives that provide resources of knowledge.
The discussion in the previous sections shows us that there are many challenges to promote both firm based and grassroots innovation in developing countries. This section will discuss about a new strategy for promoting innovation in developing countries that can overcome the difficulties in putting in place NIS, SID and inclusive innovation. The strategy should be able to create a synergy among very high diversity of the innovation stakeholders in developing countries. It requires having a capacity to foster the investment in advanced technology and promote the development of affordable technology to meet the need of the poor, as well as to develop, attract and retain strong talents for innovation.
Compared to developed countries, the concept innovation system in developing countries should be more complex because it is not only involving the formal sector such as enterprises, universities, research institutes, the government and the financial system but also NGOs, informal companies, grassroots inventors, local and indigenous knowledge, etc. The implementation of such a concept is also more difficult because the formal rules and laws are less well developed, their enforcement tends to be unreliable and they have less effective accountable governance. The innovation system in developing countries is situated in a dichotomy situation between formal and informal sector, between riche and poor, and between high and low technology. The main challenges in the governance of such an innovation system are to meet the needs of both the formal and informal sectors of economy. On the one hand, the innovation system should allow private companies to generate wealth and, on the other hand, it should also be able to improve the living conditions of the poor. The innovation system in developing countries should not exclude R&D in advance technology.
Below, I describe the basic and preliminary ideas that facilitate the elaboration of an integrated approach in promoting technological innovation in developing countries.
First and foremost, developing countries need to set up their innovation policy with targets and priorities that are based on the specific challenges and opportunities faced by the country concerning innovation. An innovation policy is an instrument to move towards a knowledge economy. It addresses specific problems of the innovation system, such as its rules and regulations conducting innovation to ensure competition, determine levels of entry and exit of firms, and allow financial markets to provide appropriate signals to investors (Altenburg 2008). Furthermore, innovation policy is crucial for development, at least for two reasons: (i) innovation and learning -understood in broad sense- are fundamental for growth and industrial competitiveness and thus for catching-up; and (ii) innovation can be targeted to solve or mitigate particular development problem (Chaminade et al. 2010).
To move towards achieving a holistic architecture of innovation policy design and implementation, broad-based societal participation must be mobilized. Reflecting the global trend towards achieving a greater democratization and transparency in the decision making process, citizens are becoming engaged in the deliberative processes of science-related governance issues. In this context, decision makers, entrepreneurs, scientists, NGOs, including women, youth, local and indigenous communities, are not only considered beneficiaries of the innovation, but also agents of change of the innovation system.
The other problem related to innovation policy is that developing countries tend to have limited capabilities to design, implement and monitor complex innovation policies. The situation is even more difficult because most developing countries do not have a special institution dealing specifically with innovation policy. Thus, special emphasize has to be given to human and institutional capacity building for innovation policy. The existence of national and regional bodies that deal with innovation policy formulation, monitoring and its evaluation is very important to ensure the effectiveness of the policy. It could be an innovation council or innovation institute. Innovation research institutes are also crucial as once innovation polices have been made they should be subject to continuous monitoring and evaluation.
Research and development (R&D) activities in developing countries is very low. It is related to the low investment in STI. Very little attention is paid to S&T research by low income developing countries because it is considered a longterm investment with very low return which results in weak R&D capacities. In order to improve their research systems, developing countries need to increase their investment in STI, particularly in two fields: building the capacity of human resources and upgrading or modernizing the research infrastructure. Capacity building is central for absorption and acquisition of knowledge and technology, which are both very important processes precedingthe technological innovation capacity. Innovation and capacity building in most developing countries would benefit from upgrading the skills of workers and farmers and from training more skilled workers and technicians. This can be done by formal education and training, but also by diffusing the concept of learning organizations among firms; the diffusion should function as heuristic device for local firms’ experimentation within specific context of learning organizational form (Chaminade et al. 2010).
Universities and other higher educational institutions are essential players in a country’s innovation system. Universities produce well-trained human resources and conduct research that generates knowledge for innovation. In general, in developing countries universities focus more on education and do little R&D. Universities in many developing countries like India, Indonesia, Colombia and other developing countries, already have the critical mass of scientists and have considerable intellectual capital that can be deployed to work on the technological problems of the poor. Universities could eventually play an important role in dealing with social, economic and environmental challenges. For example, there is a great opportunity for universities and research centres to conduct R&D to support grassroots innovation initiatives and to develop technology business incubators and science parks to host small and medium enterprises (SMEs).
The enterprise sector in developing countries is a large part composed of micro-enterprises which operate in the informal economy and which have a very low technology competency, if any. A less important segment is composed of SMEs with minimal technological capabilities. An even smaller segment is constituted of technology competent enterprises. Finally, there is small number of R&D rich enterprises (Aubert 2004). Thus, a specific approach is needed to enhance the innovation capacities of firms in developing countries. The approach should take into consideration the diverse nature of the existing enterprises. A board range of support network, including research centers, universities, firms and NGOs, need to mobilize to accelerate the absorption of technology by micro enterprises and SMEs.
Engaging in interactive learning with other organizations of the system is fundamental for development on innovation. There are thee linkages which are more important than others: (i) the interaction between indigenous firms and subsidiaries of multinationals to facilitate technology transfer; (ii) the interaction between domestic users and producers to create the condition of trust in absorption of technology; and (iii) the interaction between industry and domestic universities for the provision of human resources (Chaminade et al. 2010).
The common tools that have been used to promote the creation of knowledge-based SMEs are technology business incubators and science parks. They play a crucial element of national, regional and local innovation system. Technology business incubators are part of the basic infrastructure that supports start up SMEs by providing the physical infrastructure (facilities and rental spaces), professional services advice (management, tax, accounting, technological lectures, etc.), financial support (seed money, access to venture capital, etc.), training and mentoring. The aim of business incubation is to increase the success ratio of start-up firms even if the incubator is not a definitive place for the SMEs. The mature (graduated start-up) companies must relocate to a science park. The existence of a science park is very important to facilitate networking for innovation. It aims to enhance the innovative capacity and foster the enterprises through the interaction and close linkage among government, R&D centres, research institutes, high-tech industry: initiating university and industry partnerships, launching commercialization, marketing and providing financial support.
During the last several decades, we have been witnessing that science and technology parks play an important role in advancement of the various fields of technology, such as information and communication technology, biotechnology, nanotechnology, electronics, etc. Many developing countries have also taken the initiative in developing science parks and incubators. However, many of them face problems, such as low successful rate of incubator tenants, very slow advancement of innovation, etc. I think the main cause of the problem is that there is too much focus on hi-tech, which is based on R&D, in which the developing countries have limited capacity. The potential of grassroots innovation, local and indigenous knowledge are not very well exploited. I suggest that the technology business incubators and science parks in developing countries should not only host hi-tech start-up companies, but also accommodate low-tech start-ups.
Grassroots innovation has an immense potential to be used as a tool for poverty eradication because it is based on local people’s knowledge, innovations, and practices that are largely produced and maintained at the grassroots level. Furthermore, the grassroots technological innovations are needs-based, simple and cost-effective. Our understanding and policies for innovation is inadequate for grassroots community initiatives. Research is needed to develop our understanding of local communities as sources of sustainable innovations.
Currently, there are many successful grassroots technological innovations however the economic impact of these innovations is low. There is therefore a need to build a value chain around these innovations and to provide incubation support, if the benefits from these innovations are to be disseminated to consumers far and wide. To this end, we need to mobilize a broad range of actors, including governments, NGOs, the private sector and local communities. NGOs have an important role to play in the innovation system, particularly as policy implementers and drivers of change in promoting grassroots innovation. NGOs can play their part by creating platforms that assist grassroots innovators diffuse information to people who do not have access. The involvement of NGOs will also accelerate the process of the technological appropriation by local community.
In the OECD member countries, thousands of venture capital funds operate to finance knowledge-based start-up companies. The objective of the venture capital investor is to invest in rapidly growing companies in order to sell out (typically after five to eight years), either to another entrepreneur, other parties or the stock market. The high risk of this type of investment is compensated by the high return on successful ventures. Many venture capital funds do not only provide capital. They also support the young entrepreneurs by closely monitoring them and providing technical and managerial support. Those aimed specifically at new startups almost always provide such support.
Unfortunately such financial systems do not exist in developing countries. In general, it is extremely difficult for SMEs to obtain finance, and certainly equity. Financial institutions are not interested in investing in start-up companies because there is no guarantee, high risk and the run cost of the credit is expensive. However, it is necessary to establish an appropriate financial system to support knowledge-based start-up companies in developing countries.
Finally, an innovation system has to accommodate the interchanges and connectivity among the stakeholders that have the common objective to move towards a knowledgebased society.
The main challenge in developing countries is poverty. Innovation can be a critical tool to solve this challenge and to improve access to basic services such as food, water, housing, health and education. However, in general, their current innovation systems are poorly constructed and are very fragmented which is characterized by poor business, the inexistence of research centers or a very limited research community, low education levels, weak infrastructure, inefficient public institutions, poor governance and the inexistence of an innovation policy or strategy.
The implementation of the existing innovation concepts in developing countries needs to be done carefully, by taking into consideration of the local conditions. Developing countries need to move towards achieving a more structured innovation system based on an established innovation policy. An innovation system, which can accommodate the interaction among the high varieties of stakeholders, such as enterprises, universities, research institutes and government, financial system, NGOs, informal companies, grassroots inventors, local and indigenous knowledge, etc. must be developed.
An integrated approach is needed to establish an appropriate innovation system in developing countries. An innovation system which is based on relevant innovation policies, able to accommodate both advanced innovation and grassroots innovations, involves the formal and informal sector and that aims to improve the quality life.
and Y Nur , “Rethinking the Innovation Approach in Developing Countries”, World Technopolis Review, vol. 2, no. 2, Apr 2012. | 2019-04-21T22:32:29Z | http://www.kpubs.org/article/articleMain.kpubs?articleANo=SGGHBZ_2012_v1n2_107 |
Traverse Rod Curtains With Regard To Pinch Pleat Bed Bath Beyond Idea 19.
Traverse Rod Curtains In Custom Curtain Rods Shawna Alecia Medium Plan 18.
Traverse Rod Curtains Throughout Amazon Com Prepare 16.
Traverse Rod Curtains Pertaining To Curtain Rods At Lowes Com Plans 17.
Traverse Rod Curtains In Pinch Pleat Bed Bath Beyond Decorations 15.
Traverse Rod Curtains Regarding Maybe Use Basic And Hide With Cornice Livingroom Decorations 14.
Traverse Rod Curtains Within Rods Stylish And Home Throughout For Inspirations 13.
Traverse Rod Curtains For Double Curtain Grey Living Room Design Decorations 12.
Traverse Rod Curtains Intended For Rods Dosgildas Sloter Plans 11.
Traverse Rod Curtains With How To Fake A Long Curtain Bless Er House Ideas 10.
Traverse Rod Curtains Within Amazon Com Plan 8.
Traverse Rod Curtains Pertaining To 188 Best Standard Sets Cord Draw Images On Pinterest Plan 9.
Traverse Rod Curtains Throughout Drapes Endearing On Idea 7.
Traverse Rod Curtains With Curtain Rods Double Center Open Decorations 6.
Traverse Rod Curtains With Regard To Keep It Simple And Sweet Drapery Room Prepare 5.
Traverse Rod Curtains Pertaining To How Convert Tab Back Home Guides SF Gate Design 4.
Traverse Rod Curtains In Rustic Flat Set Hand Baton Draw 36 180 Inches Decor 3.
Traverse Rod Curtains Pertaining To Desyne 30 In 48 Heavy Duty Center Open Double Ideas 2.
Traverse Rod Curtains For Rods And Drapery Fullness Beginners YouTube Decor 1.
Traverse Rod Curtains Within Making Home Guides SF Gate Remodel 0.
Twin Captains Bed With 6 Drawers Regard To Platform Pallet Storage Beds Wiradjuri Condo Corp Prepare 19.
Twin Captains Bed With 6 Drawers TWO Discovery World Furniture Merlot Bookcase Beds Ideas 17.
Twin Captains Bed With 6 Drawers Intended For Amazon Com Bookcase Desk Hutch Idea 18.
Twin Captains Bed With 6 Drawers Honey Bookcase W Drawer Underbed Storage Ideas 16.
Twin Captains Bed With 6 Drawers Regarding Bedroom Cozy For Your Design Plans 15.
Twin Captains Bed With 6 Drawers Intended For Top Product Reviews Espresso Tall Drawer Captain S Idea 14.
Twin Captains Bed With 6 Drawers For Shop Black Drawer Captain S Platform Storage Free Remodel 13.
Twin Captains Bed With 6 Drawers Within Merlot Full Size Bookcase Frames Discovery Plan 12.
Twin Captains Bed With 6 Drawers Inside Discovery World Furniture Merlot Captain KFS STORES Decorations 11.
Twin Captains Bed With 6 Drawers Pertaining To Amazon Com Bookcase Desk Hutch Plans 10.
Twin Captains Bed With 6 Drawers Inside Xl Dediserv Info Prepare 9.
Twin Captains Bed With 6 Drawers Regarding Honey Size Bookcase Captain S Day Beds Discovery World Ideas 8.
Twin Captains Bed With 6 Drawers In CorLiving Willow Storage Frost Decorations 7.
Twin Captains Bed With 6 Drawers Throughout Amazon Com Discovery World Furniture Charcoal Bookcase Design.
Twin Captains Bed With 6 Drawers Throughout Wayfair Ca Plans 5.
Twin Captains Bed With 6 Drawers In Honey Prepare 4.
Twin Captains Bed With 6 Drawers Regard To Amish Drawer Captain S USA Made Children Furniture Decor 3.
Twin Captains Bed With 6 Drawers In Amazon Com Discovery World Furniture Bookcase Decor 2.
Twin Captains Bed With 6 Drawers Inside Size In White 0235 Teens And Kids Inspirations 1.
Twin Captains Bed With 6 Drawers For Discovery World Furniture Merlot Rake 2835 Decorations 0.
Three Way Lamp In 3 Dimmer Switch Wiring Diagram Variations Simple Decorations 19.
Three Way Lamp With How To Replace 3 Socket YouTube Designs 18.
Three Way Lamp Regarding Leviton 3 Holder Candle Light Socket Hickey Mount E26 250W Plan 16.
Three Way Lamp Regarding 3 Wikipedia Inspirations 17.
Three Way Lamp Within Wiring Diagram With Light Third Level Plans 15.
Three Way Lamp Intended For Light Bulb Bulbs And Batteries Ashburn If You Switch Ideas 14.
Three Way Lamp With Wiring A 3 Diagram And Ebooks Decor 13.
Three Way Lamp Regarding 3 Light Diagram Wiring Third Level Decor 12.
Three Way Lamp In Socket Fuse Test The Smell Of Molten Projects Decor 11.
Three Way Lamp With Regard To 3 Wikipedia Designs 10.
Three Way Lamp For 3 Wiring Diagram Third Level Ideas 9.
Three Way Lamp Pertaining To 3 Wikiwand Design 8.
Three Way Lamp Inside 3 Socket Wiring Simple Diagram Plan 7.
Three Way Lamp With Regard To 3 Logic Juddley Ideas 5.
Three Way Lamp With Regard To 3 Wikipedia Ideas 6.
Three Way Lamp With 3 Wikipedia Decorations 4.
Three Way Lamp Pertaining To 3 Wikipedia Decor 2.
Three Way Lamp In How To Upgrade A Regular Into 3 Decorations.
Three Way Lamp Inside 3 Wikipedia Idea 1.
Three Way Lamp Intended For 3 Wikipedia Plan 0.
Tv Cart With Wheels Regard To Rolling Casters Designs 19.
Tv Cart With Wheels Throughout Aruba Rattan TV Wicker Country Remodel 18.
Tv Cart With Wheels Regard To Audio Visual Carts Classroom Office Media Trolleys Cabinets Decor 17.
Tv Cart With Wheels Regard To TV For LCD LED Plasma Flat Panels Stand Mobile Fits Plans 16.
Tv Cart With Wheels Inside Foxtrot Glass Stand Plans 15.
Tv Cart With Wheels Loctek Mobile TV For LCD LED Plasma Flat Panels Stand Design 14.
Tv Cart With Wheels In Stand E Box Decorations 13.
Tv Cart With Wheels Regard To Industrial Carts Heavy Duty Utility Nationwide Plans 12.
Tv Cart With Wheels Throughout Audio Visual Carts Classroom Office Media Trolleys Cabinets Decor 11.
Tv Cart With Wheels Throughout Plasma TV Carts Storage Shelf Mobile AV LCD Stands Ace Prepare 10.
Tv Cart With Wheels Regarding TV Stands Walmart Com Decor 9.
Tv Cart With Wheels Throughout AV Carts Stands Amazon Com Office Furniture Lighting Prepare 8.
Tv Cart With Wheels Regarding Modern Mobile TV Stand Entertainment Center 4 Casters Decorations 7.
Tv Cart With Wheels Throughout VESA TV Carts Mobile Trolleys For Transporting Audio Visual Devices Designs 6.
Tv Cart With Wheels Intended For Silver 80 TV Fixed Bracket 60 100 Monitors Plans 4.
Tv Cart With Wheels Within TV Stands Walmart Com Plans 5.
Tv Cart With Wheels Throughout Tyke Supply Mobile TV Ideas 3.
Tv Cart With Wheels Pertaining To TV Stand LCD LED Plasma Flat Panels Mobile Fitueyes Decor 2.
Tv Cart With Wheels Throughout Amazon Com Mount Factory Rolling TV Mobile Stand For 40 65 Ideas 1.
Tv Cart With Wheels Regard To Amazon Com Mount It Mobile TV Stand Adjustable Remodel 0.
Tatami Platform Bed Throughout The Ensui Frame Is Constructed Of 100 Ideas 19.
Tatami Platform Bed With Regard To Futon King Size Mats In Willesborough Designs 18.
Tatami Platform Bed Intended For Ideas Beds Stylish Of Plan 17.
Tatami Platform Bed With Making Stickers Stars And Smiles Design Designs 16.
Tatami Platform Bed With DIY Style Downloadable Plans Prepare 15.
Tatami Platform Bed Pertaining To Beds Low Japanese Solid Wood Frame Decor 14.
Tatami Platform Bed For 9 X Decor 13.
Tatami Platform Bed Within Or Base DIY Homes Garden Cars Idea 12.
Tatami Platform Bed In DIY Style With Downloadable Plans Woodworking Designs 11.
Tatami Platform Bed With DharmaCrafts Inspirations 10.
Tatami Platform Bed Within Japanse Metalen Vouwen Frame Met Tegemoetkomt Slaapkamer Remodel 9.
Tatami Platform Bed In Beds Low Japanese Solid Wood Frame Decorations 8.
Tatami Platform Bed Throughout Oriental Furniture TATAMI BED WAL KING Fine Quality Zen Simple Inspirations 7.
Tatami Platform Bed For Raku Japanese Haiku Designs Inspirations 6.
Tatami Platform Bed Within Amazon Com Oriental Furniture Honey Queen Idea 5.
Tatami Platform Bed Inside Beds Low Japanese Solid Wood Frame Idea 4.
Tatami Platform Bed For Beds Low Japanese Solid Wood Frame Design 3.
Tatami Platform Bed Regarding Natural Finish Bedroom Ideas Pinterest Remodel 2.
Tatami Platform Bed Regarding DharmaCrafts Plan 1.
Tatami Platform Bed Throughout Beds Low Japanese Solid Wood Frame Design 0.
Toto Eco Supreme Throughout One Piece Toilet Reviews Aqua Elongated Dual Remodel 19.
Toto Eco Supreme With Regard To Elongated 1 Piece Toilet Bone Free Shipping Today Remodel 18.
Toto Eco Supreme With MS864114E 01 Cotton White One Piece Toilet 1 28 Ideas 17.
Toto Eco Supreme With Regard To Elongated One Piece Toilet 1 28 GPF MS864114E Ideas 16.
Toto Eco Supreme With MS864114E 01 Vitreous China Lever Handle Elongated Designs 15.
Toto Eco Supreme Within Shop TOTO Sedona Beige Round Standard Height 1 Piece Ideas 14.
Toto Eco Supreme Inside Best Flushing 1 28 GPM Toilet Decor 13.
Toto Eco Supreme Within Contemporary 1 28 GPF Elongated One Piece Toilet Design 12.
Toto Eco Supreme In MS864114E 11 Elongated One Idea.
Toto Eco Supreme With Inspiring Ideas 1 28 Gpf Elongated One Piece Toilet 10.
Toto Eco Supreme Pertaining To MS864114E03 Bone 1 28GPF One Piece Elongated Toilet Design 9.
Toto Eco Supreme Regarding Starmotion Club Decor 8.
Toto Eco Supreme Intended For Contemporary 1 28 GPF Elongated One Piece Toilet Plans 7.
Toto Eco Supreme With TOTO ECO SUPREME ROUNDED MS863113E 12 ROUGH TOILET EBay Design 5.
Toto Eco Supreme Within Inspiring Ideas 1 28 Gpf Elongated One Piece Toilet Decor 6.
Toto Eco Supreme Intended For How High Is A Toilet New Bathroom Chic Toilets With Designs 4.
Toto Eco Supreme With Regard To MS864114E Elongated Toilet SoftClose Seat Decor 3.
Toto Eco Supreme Inside Best Flushing 1 28 GPM Toilet Idea 2.
Toto Eco Supreme With TOTO Toilet One Piece Elongated Canaroma Bath Tile Idea 1.
Toto Eco Supreme Intended For TOTO 1 Piece 28 GPF Single Flush Round Toilet In Plans 0.
The Modern Fan Company Intended For Ceiling Residential Metal Plastic VELO THE MODERN FAN Design 19.
The Modern Fan Company Intended For Stratos Ceiling From A Collection Of Prepare 18.
The Modern Fan Company Inside PENSI Ceiling By Stardust Ideas 17.
The Modern Fan Company With Appliances 709 Washington St Ashland Or Prepare 16.
The Modern Fan Company With Designer Fans Decorative Ceiling Remodel 15.
The Modern Fan Company Within Spectacular Deals On Co Torsion 62 Or 52 3 Prepare 14.
The Modern Fan Company For Torsion Ceiling Bright Nickel By Shown Remodel 13.
The Modern Fan Company Inside Tiny Club Simply Enough Idea 12.
The Modern Fan Company In Behind Design Of S I C Air At Lumens Com Designs 11.
The Modern Fan Company With LAPA Ceiling By Stardust Design 10.
The Modern Fan Company Regarding FLUTE Ceiling By Stardust Ideas 9.
The Modern Fan Company Intended For Torsion 52 Gloss White W Blades 17W LED Plan 8.
The Modern Fan Company Throughout Ball Ceiling By Stardust Plans 7.
The Modern Fan Company Pertaining To Buy Torsion Ceiling By Manufacturer Name Inspirations 5.
The Modern Fan Company Throughout Lowest Prices In Stock Ships Free At Lumens Com Prepare 6.
The Modern Fan Company Throughout Cirrus Hugger Neenas Lighting Remodel 4.
The Modern Fan Company Inside BAL 42 651 Ball Inch 4 Blade Ceiling Remodel 3.
The Modern Fan Company With Regard To STELLA Ceiling By Stardust Decor 1.
The Modern Fan Company Intended For Stratos Ceiling From A Collection Of Idea 2.
The Modern Fan Company In CIRRUS Ceiling By Stardust Inspirations 0.
Tall Work Table Inside Fabulous Antique 7 Foot Industrial Iron Wood C 1915 Design 19.
Tall Work Table With Regard To That Can Be Drawn On Great For Sketching Ideas And 18.
Tall Work Table With A Angled Legs And Simple Joints 4 Steps Decor 17.
Tall Work Table For Atlantic Metalworks STT 2424 2BS 24x24 Economy Stainless Steel Prepare 16.
Tall Work Table Throughout Best Office Michelle Dockery Ideas For Plans 15.
Tall Work Table With Design 14.
Tall Work Table Throughout Desk New Furniture Remodel 13.
Tall Work Table With Regard To AE9 764 1 Whistler Leather Top Idea 12.
Tall Work Table Regarding ABC Sewing Machine Idea 11.
Tall Work Table Throughout Indoor Workbench Unexpectedly Progress DIYdiva Plans 10.
Tall Work Table Inside Shop Sportsman Series 72 Inch Stainless Steel Free Prepare 9.
Tall Work Table Throughout Edsal 34 In H X 48 W 24 D Wooden Top Workbench With Shelf Decorations 8.
Tall Work Table For Bench 80 00 24 X 96 36 J Black YouTube Plans 7.
Tall Work Table Within 36 Arlink 7000 Series Workbench With 30 X 84 Worksurface Ideas 6.
Tall Work Table With Regard To Century Furniture Home Office Whistler Leather Decor 5.
Tall Work Table Regarding Tables At RDM Oversized Workbenches Plan 3.
Tall Work Table Regarding Tables Or Desks New Furniture Design 4.
Tall Work Table Within Standing Custom Tables David Stine Woodworking Ideas 2.
Tall Work Table Pertaining To Pin By Prtha Lastnight On Room Ideas Low Budget In 2018 Pinterest Plans 1.
Tall Work Table Inside Husky 6 Ft Solid Wood Top Workbench G7200S US The Home Depot Design 0.
Tile That Looks Like Slate In Vinyl Tiles Look Daltile Porcelain Roof Decor 19.
Tile That Looks Like Slate Pertaining To Porcelain Tiles Look Ne Popular Color Ideas 18.
Tile That Looks Like Slate With Tiles Stunning Look Porcelain Vinyl Wood Ideas 17.
Tile That Looks Like Slate Regarding Painted Subway Backsplash Tutorial Reality Daydream Plans 16.
Tile That Looks Like Slate With Ceramic Tiles Home Design Ideas Decorations 15.
Tile That Looks Like Slate In PAINT Your Backsplash To Look Reality Daydream YouTube Ideas 14.
Tile That Looks Like Slate For Can I Paint Porcelain Floor To Look Idea 13.
Tile That Looks Like Slate Inside Ceramic Floor Including Small Random Ideas 12.
Tile That Looks Like Slate Within Ceramic Look Cove Remodel 10.
Tile That Looks Like Slate Pertaining To Wonderfully Porcelain David Pasha Traffic Idea 11.
Tile That Looks Like Slate Inside Ceramic Fendesignz Prepare 9.
Tile That Looks Like Slate Inside Porcelain Tiles Look Ne Popular Color Idea 8.
Tile That Looks Like Slate With Regard To Ceramic Tiles Home Design Ideas Plans 7.
Tile That Looks Like Slate Inside Rectangular Google Search Remodel In Ideas 6.
Tile That Looks Like Slate Pertaining To How Install Vinyl Flooring Tos DIY Decorations 5.
Tile That Looks Like Slate Regarding Laminate Flooring Best Ideas Plans 4.
Tile That Looks Like Slate With Ceramic Porcelain Look Plans 3.
Tile That Looks Like Slate Intended For Porcelain Benefits Of Looking Plans 2.
Tile That Looks Like Slate For Porcelain Eden S It Has 4 Reviews Design 1.
Tile That Looks Like Slate Regarding Porcelain Association Award Winner Inspirations 0.
Travertine Tile Patterns With Regard To Izmir Pattern Sets Brushed And Chiseled Light Decor 19.
Travertine Tile Patterns In Buy Versailles French Pattern Marble Ideas 18.
Travertine Tile Patterns Regarding Colors Finishes And Styles Of Designs 17.
Travertine Tile Patterns Regarding Flooring French Pattern Builddire Flickr Inspirations 16.
Travertine Tile Patterns Intended For Pattern Guide In Ideas 15 Maxjousse Decorations.
Travertine Tile Patterns Regarding Stone Floor And Wall Laying Marshalls Decor 14.
Travertine Tile Patterns With Regard To Pattern Floor Mosaic Marble Limestone Ideas 13.
Travertine Tile Patterns Throughout Versailles Pattern Tutorial Her Tool Belt Inspirations 12.
Travertine Tile Patterns Inside Versailles Pattern Floor Mexican Decor 11.
Travertine Tile Patterns Intended For Colors Finishes And Styles Of Outside Decor 10.
Travertine Tile Patterns For Versailles Pattern Tutorial Her Tool Belt Design 9.
Travertine Tile Patterns Inside FREE Samples Kesir Antique Pattern Sets Decorations 8.
Travertine Tile Patterns Intended For Create Stunning With Your Choice Of Floor Plan 7.
Travertine Tile Patterns With FREE Samples Kesir Antique Pattern Sets Scabos Designs 6.
Travertine Tile Patterns With Antique Pattern Sets In 2018 New House Ideas Idea 5.
Travertine Tile Patterns Inside FREE Samples Kesir Antique Pattern Sets Denizli Decor 4.
Travertine Tile Patterns With MSI Mediterranean Walnut Pattern Honed Unfilled Chipped Decorations 3.
Travertine Tile Patterns Inside Versailles Pattern French Layout And Installation Inspirations 2.
Travertine Tile Patterns Throughout FREE Samples Kesir Antique Pattern Sets Meandros Remodel 1.
Travertine Tile Patterns Regarding MSI Beige Pattern Honed Unfilled Chipped Floor And Wall Plans 0.
Through Body Porcelain Tile Inside Urbanite Plan 19.
Through Body Porcelain Tile Intended For Shop Style Selections Capri Mixed Glazed Thru Plans 18.
Through Body Porcelain Tile Intended For Color Tiles By Face Impex Pvt Ltd Wall Plans 17.
Through Body Porcelain Tile In Tiles Prepare 16.
Through Body Porcelain Tile Throughout Shop Del Conca Rialto Beige Thru Indoor Outdoor Wall Idea 15.
Through Body Porcelain Tile Within American Olean Infusion 6 Pack Black Fabric Thru Idea 14.
Through Body Porcelain Tile Inside Cover Timber Steel Urbatek Tiles Project Remodel 13.
Through Body Porcelain Tile Pertaining To Stoneware Marazzi USA Inspirations 12.
Through Body Porcelain Tile Within Agora Arizona Concrete Look Decorations 11.
Through Body Porcelain Tile With Regard To United Color Remodel 10.
Through Body Porcelain Tile For SOUL And Decorative Profiles Spaces With Design 9.
Through Body Porcelain Tile With Regard To Deep Light Grey Nature Floor Tiles Urbatek Decor 8.
Through Body Porcelain Tile Pertaining To PORCELANOSA Prepare 7.
Through Body Porcelain Tile Regarding Best Flooring Choices Designs 6.
Through Body Porcelain Tile Regarding Decor Beautiful Texture On Idea 5.
Through Body Porcelain Tile Throughout Granito 4 Tiles Arizona Inspirations.
Through Body Porcelain Tile With China Ceramic Floor Tiles Classification Ideas 3.
Through Body Porcelain Tile Pertaining To 20 Mm Thickness Pastorelli Tiles Plans 2.
Through Body Porcelain Tile Pertaining To V Ceramic Tiles What Is The Difference Depot Inspirations 1.
Through Body Porcelain Tile Regarding Colorbody Vs And Ratings Of Plans 0.
Turquoise Leather Sofa Pertaining To Wayfair Designs 19.
Turquoise Leather Sofa With Regard To Beautiful 81 For Your Table Ideas Plans 18.
Turquoise Leather Sofa Regarding Couch Dark Couches For Decorations 17.
Turquoise Leather Sofa With Shop Abbyson Kilby Bonded Bed Console Design 16.
Turquoise Leather Sofa In Laguna Top Grain Decorations 14.
Turquoise Leather Sofa With Wayfair Decor 15.
Turquoise Leather Sofa With Regard To Wayfair Prepare 13.
Turquoise Leather Sofa For Teal Couch Sectional Throughout Plans 12.
Turquoise Leather Sofa For Option Work In 2018 Pinterest Remodel 11.
Turquoise Leather Sofa Throughout Sectional With Chaise Lounge Design 10.
Turquoise Leather Sofa Within Interesting Teal 2017 Design Blue Idea 8.
Turquoise Leather Sofa Throughout Andersen Top Grain Chaise Sectional Dark Ideas 9.
Turquoise Leather Sofa Inside Double Western Passion Decorations 7.
Turquoise Leather Sofa For Chesterfield Faux Endure Fabrics Design 6.
Turquoise Leather Sofa Throughout Wayfair Decor 5.
Turquoise Leather Sofa Inside Saw One Kinda Like This Today My Style In Plan 4.
Turquoise Leather Sofa With Albuquerque Western Passion Decorations 2.
Turquoise Leather Sofa In 12 Astonishing Couch Image Ideas Home Designs 3.
Turquoise Leather Sofa With Teal Wayfair Ideas 1.
Turquoise Leather Sofa With Regard To Shop Abbyson Leyla Top Grain Push Back Reclining Inspirations 0.
Tall Upholstered Headboards Inside Riverside Full Queen Headboard 21478 Remodel 19.
Tall Upholstered Headboards Throughout Extra Headboard Tufted Plans 18.
Tall Upholstered Headboards Within Stilenier Remodel 17.
Tall Upholstered Headboards With Regard To Tufted Headboard Queen Bedroom Furniture Design 16.
Tall Upholstered Headboards In King Headboard Wayfair Plan 15.
Tall Upholstered Headboards Pertaining To Bed Frames White Frame With Wooden Table And Fancy Design 14.
Tall Upholstered Headboards Intended For Extra Headboard Bed Wayfair Idea 13.
Tall Upholstered Headboards Within Tufted Headboard King Padded Bed Quilted Inspirations 12.
Tall Upholstered Headboards Intended For Headboard Home And Furniture Remodel 11.
Tall Upholstered Headboards In Contemporary Headboard Designs 10.
Tall Upholstered Headboards With Headboard Furniture Modern Sleigh Bed Plans 9.
Tall Upholstered Headboards Within Simple Headboard West Elm Designs 8.
Tall Upholstered Headboards Throughout Tufted Headboard King Fabric Decorations 7.
Tall Upholstered Headboards Within Lorraine Tufted Headboard Pottery Barn CA Designs 6.
Tall Upholstered Headboards Pertaining To New Trend For The Modern Bedroom Decor 5.
Tall Upholstered Headboards Pertaining To 26 Improve Your Bedroom Shelterness Design 3.
Tall Upholstered Headboards In Beautiful Headboard Bedroom Sets Plan 4.
Tall Upholstered Headboards Pertaining To 26 Improve Your Bedroom Shelterness Remodel 1.
Tall Upholstered Headboards With Regard To Fascinating Headboard King 83 For Home Remodel Idea 2.
Tall Upholstered Headboards Within Likeness Of Awe Inspiring Beds That Will Enhance Design 0.
Track Lights Ikea For Kitchen IKEA Lighting Jennifer Home Blog Best Designs 19.
Track Lights Ikea In RANARP Ceiling 3 Spotlights IKEA Prepare 18.
Track Lights Ikea In TROSS Ceiling 3 Spots White IKEA Ideas 17.
Track Lights Ikea Pertaining To Fantastic Lighting Bathroom Ceiling Inspirations 16.
Track Lights Ikea Inside Amusing 25 In Long Lighting Systems With Designs 15.
Track Lights Ikea Pertaining To Ceiling Lighting Amazing Barometer 5 Spots Design 14.
Track Lights Ikea Pertaining To Cable Lighting Captivating Pendant Fixtures Inspirations 12.
Track Lights Ikea Within HUSINGE Ceiling 5 Spots IKEA Designs 13.
Track Lights Ikea Pertaining To Lighting Incredible Best Ideas On Pendant Idea 11.
Track Lights Ikea Pertaining To Led Lighting Review Image ALL ABOUT HOUSE DESIGN Plug In Decor 10.
Track Lights Ikea Intended For Led Lighting Bar Cotton Com Decorations 9.
Track Lights Ikea With Elegant 95 On Crystal Lighting Fixtures Idea 8.
Track Lights Ikea Pertaining To Changing Halogen And IKEA Lighting LED Bulbs GU4 GU5 3 Designs 7.
Track Lights Ikea Throughout HUSINGE Ceiling 3 Spotlights IKEA Decorations 6.
Track Lights Ikea Inside Ceiling LED IKEA Plan 5.
Track Lights Ikea With Regard To Led Lighting Bar Cotton Com Design 4.
Track Lights Ikea Inside Lighting Ideas IKEA Home Tour YouTube Inspirations 3.
Track Lights Ikea Pertaining To Lighting Ideas IKEA Home Tour YouTube 2.
Track Lights Ikea With Regard To BÄVE LED Ceiling 5 Spots IKEA Plan 1.
Track Lights Ikea Inside Lighting LED IKEA Inspirations 0.
Tan Leather Office Chair Inside ACME Furniture Hamilton Cocoa Top Grain Prepare 19.
Tan Leather Office Chair With Regard To Classic Executive Rapid Furniture Plans 18.
Tan Leather Office Chair Inside Vintage Time Life At 1stdibs Inspirations 17.
Tan Leather Office Chair Regarding Helvetica West Elm Inspirations 16.
Tan Leather Office Chair Within Slope West Elm Australia Plan 14.
Tan Leather Office Chair With Regard To Shop 2xhome Modern Brown High Back Ribbed PU Inspirations 15.
Tan Leather Office Chair For Modern Retro Eames Style Brown Plan 13.
Tan Leather Office Chair With Regard To Bond Desk Rejuvenation Prepare 12.
Tan Leather Office Chair Inside Premium Eames Style EA219 Onske Remodel 11.
Tan Leather Office Chair Throughout Helvetica West Elm Australia Prepare 10.
Tan Leather Office Chair Within Santiago Executive Armchair 618KTAG 121 Furniture Ideas 9.
Tan Leather Office Chair In House 2018 Pinterest Decor 8.
Tan Leather Office Chair Intended For Aviation Aviator Industrial Inspirations 7.
Tan Leather Office Chair With Aria Com Plan 6.
Tan Leather Office Chair For Meelano Vegan Reviews Wayfair Inspirations 5.
Tan Leather Office Chair Within VAIL MEDIUM Designer Chairs Design 3.
Tan Leather Office Chair With Work Smart High Back Executive EX5162 G11 Inspirations 4.
Tan Leather Office Chair With Regard To DURBAN Soft Feel Executive Chairs Remodel 2.
Tan Leather Office Chair With Slope West Elm UK Plans 1.
Tan Leather Office Chair Inside Siena Executive Amazon Co Uk Idea 0.
Transitional Bedroom Furniture Inside Beijing Ideas 19.
Transitional Bedroom Furniture With Full Sets Free Assembly Delivery Inspirations 18.
Transitional Bedroom Furniture Throughout Buy Sets Online At Overstock Com Our Best Decorations 17.
Transitional Bedroom Furniture Regarding Stanley Collection Bed Plans 16.
Transitional Bedroom Furniture With Regard To Pin By Rahayu12 On Spaces Room Low Budget In 2018 Pinterest Idea 15.
Transitional Bedroom Furniture In Free Shipping Bellacor Inspirations 14.
Transitional Bedroom Furniture Within Phenomenal Delightful Stylish Decorations 13.
Transitional Bedroom Furniture Pertaining To Master Idea 12.
Transitional Bedroom Furniture With Fashionable Ideas 11.
Transitional Bedroom Furniture In Contemporary And Sets Idea 10.
Transitional Bedroom Furniture In Decorating Ideas HGTV 8.
Transitional Bedroom Furniture Throughout Sets Wayfair Design 9.
Transitional Bedroom Furniture For Coaster Fenbrook Set In Dark Cocoa Local Prepare 7.
Transitional Bedroom Furniture Within Amazon Com Castor Collection 4pc Set Plan 6.
Transitional Bedroom Furniture Within Free Shipping Bellacor Plans 5.
Transitional Bedroom Furniture In Designs Style Sets Remodel 4.
Transitional Bedroom Furniture Intended For Stanley Portfolio Panel Set In Ideas 3.
Transitional Bedroom Furniture For Meline Designs 2.
Transitional Bedroom Furniture Inside Ideas 1.
Transitional Bedroom Furniture For Sets Wayfair Design 0.
Tv Cabinet With Doors Inside Large Oak TV Unit Glass Plans 19.
Tv Cabinet With Doors Throughout Favorite Store Alert Arhaus Furniture Entertainment Center Remodel 18.
Tv Cabinet With Doors In Baxton Studio Beasley 70 Inch Dark Brown TV 2 Sliding Decorations 17.
Tv Cabinet With Doors Regard To Solid Mahogany TV Lead Decorative In Ideas 16.
Tv Cabinet With Doors For Livingston Small TV Stand Glass Pottery Barn Remodel 15.
Tv Cabinet With Doors Within HAVSTA TV Storage Combination Glass Dark Brown 322 X 212 47 Ideas 14.
Tv Cabinet With Doors Inside EC 104 Reclaimed Wood Truckee Plasma TV W Open Our Decorations 13.
Tv Cabinet With Doors Inside Television Amazon Com Remodel 12.
Tv Cabinet With Doors Within Country Classics Painted Furniture Hillsboro Flat Screen TV Wall Ideas 11.
Tv Cabinet With Doors Regarding The Rocking Chair Dorset Oak Painted TV Glass Design 10.
Tv Cabinet With Doors Inside Barn Door TV Stand Rustic Design 9.
Tv Cabinet With Doors Throughout Adelino 63 Wood TV 4 Glass And 2 Drawers Dark Design 8.
Tv Cabinet With Doors Regarding Sliding Door Stand Wayfair Plans 7.
Tv Cabinet With Doors Within Modern Corner Just Inspiration For Your Home Inspirations 6.
Tv Cabinet With Doors Pertaining To Walker Edison Furniture Co 58 Inch Barn Door Stand Side Plan 5.
Tv Cabinet With Doors Pertaining To Amazon Com Baxton Studio Wholesale Interiors Walda Wood TV Designs 3.
Tv Cabinet With Doors Inside Mainstays 55 TV Stand Sliding Glass Multiple Colors Ideas 4.
Tv Cabinet With Doors Regard To Rustic 80 TV Stand Barn Door Decorations 2.
Tv Cabinet With Doors Inside Armoires For Flat Screens The Open You Can See Ideas 1.
Tv Cabinet With Doors For Hillsboro Flat Screen TV Wall Console The Home Remodel 0.
Tray Top Table In American Country End Side With Drawer And Scroll Designs 19.
Tray Top Table With Regard To Parker Iron Removal The Company Store Idea 18.
Tray Top Table For Accent Target Design 17.
Tray Top Table Pertaining To Square Jayla Coffee World Market Decor 16.
Tray Top Table With Mahogany Councill Craftsmen Chippendale Style Chairish Inspirations 15.
Tray Top Table Pertaining To George II Mahogany Tea With Candle Slides And Carved Inspirations 14.
Tray Top Table For Belham Living Lincoln 2 Tone Coffee White Walmart Com Plan 13.
Tray Top Table Regarding Amazon Com Privilege 28235 Accent With Round Designs 12.
Tray Top Table Throughout Coffee Made Of Wood Mango Measuring 48 X 24 18 Decorations 11.
Tray Top Table Throughout SOLD Carved 1930 S Vintage Coffee Glass Harp Gallery Ideas 10.
Tray Top Table Inside Small Mahogany Tea Sale Number 2922M Lot Remodel 9.
Tray Top Table For Coffee Tables Better Living Through Design 8.
Tray Top Table Regarding Decorative English For Sale Antiques Com Classifieds Plans 7.
Tray Top Table Pertaining To Iris Rectangle Side II Brown Wood Contemporary Decorations 6.
Tray Top Table With French Empire Walnut Drawers Doric Columns And Inspirations 5.
Tray Top Table Within Coffee Remodel 4.
Tray Top Table In Berber Benares Brass Coffee Antiques Atlas Prepare 3.
Tray Top Table Inside Coffee Tiffany Collection Black Rose Gold Frame Inspirations 2.
Tray Top Table For Wooden Console Shades Of Light Decor 1.
Tray Top Table Throughout Shop Luna Free Shipping Today Overstock Com Plans 0.
Teak Wood Flooring Inside 2018 Burmese Floor Bevel Fight Wax Russia Plans 19.
Teak Wood Flooring Pertaining To Wooden Wholesaler Wholesale Design 18.
Teak Wood Flooring Pertaining To Pre Nished Wooden Parquet SOLID TEAK OIL FINISHED By DELBASSO Ideas 17.
Teak Wood Flooring With Brazilian Aka Cumaru Hardwood Design 16.
Teak Wood Flooring With Regard To TEAK Reclaimed Parquet Plan 15.
Teak Wood Flooring Regarding 5 Inch Solid Hardwood Pacific Natural 6 Sample Remodel 14.
Teak Wood Flooring Inside Indonesia Parquet Prices Construction Remodel 13.
Teak Wood Flooring In Discount 3 1 4 X Brazilian Cumaru Clear Grade Plans 12.
Teak Wood Flooring Within FREE Samples Mazama Hardwood Handscraped Tropical Collection Inspirations 11.
Teak Wood Flooring Regarding Brazilian Smooth Engineered Hardwood 1 2in X 5in Ideas 10.
Teak Wood Flooring With Solid At Rs 115 Square Feet Crosscut Road Design 9.
Teak Wood Flooring Throughout Best Selling Prices Ash Acacia Oak Solid Decor 8.
Teak Wood Flooring For Asian Rs 350 Square Feet Inspirations 7.
Teak Wood Flooring With Floor Decor Design 6.
Teak Wood Flooring Regarding Fab Vinyl Antique Floor Backdrop Plans 5.
Teak Wood Flooring Pertaining To How Care For Indoors TRC Ideas 4.
Teak Wood Flooring Throughout Hardwood The Home Depot Remodel 2.
Teak Wood Flooring Inside Mazama Hardwood Real Collection Cabana Prepare 3.
Teak Wood Flooring Inside FREE Samples Mazama Hardwood Real Collection Remodel 1.
Teak Wood Flooring In Cumaru Dark Brazilian Hardwood Prefinished Solid Prepare 0.
Tommy Bahama Dresser In Dressers Hayneedle Decorations 19.
Tommy Bahama Dresser Throughout Home Bedroom Costa Sera Triple 593 234 Paul Decorations 18.
Tommy Bahama Dresser Within Island Estate Barbados Triple Idea 17.
Tommy Bahama Dresser With Regard To Home Island Estate West Indies Wood Poster Canopy Bed 5 Decorations 16.
Tommy Bahama Dresser Throughout Home Bedroom Martinique Double 531 222 Plan 15.
Tommy Bahama Dresser With Regard To Bedroom Chest Cheap Jimbaran Bay Inspirations 14.
Tommy Bahama Dresser Regarding Island Estate Round Hill Bedroom Set SALE Ends Dec 10 Ideas 13.
Tommy Bahama Dresser Within Home Dressers You Ll Love Wayfair Remodel 12.
Tommy Bahama Dresser In Triple Chairish Plans 11.
Tommy Bahama Dresser Within Island Estate Dressers Plantation Benjamin Rugs Inspirations 10.
Tommy Bahama Dresser Pertaining To Bedroom Furniture Amazon Com Plans 9.
Tommy Bahama Dresser Regarding Home Furniture Prepare 8.
Tommy Bahama Dresser Throughout Island Fusion Heron Double In Dark Design 7.
Tommy Bahama Dresser For Home Ocean Club 536 233 Nine Drawer Oceania Remodel 6.
Tommy Bahama Dresser Intended For Bedroom Furniture Cheap Jimbaran Bay Remodel 5.
Tommy Bahama Dresser Regarding Home Furniture Prepare 4.
Tommy Bahama Dresser Regarding Furniture By Com Ideas 3.
Tommy Bahama Dresser Intended For Home Furniture Remodel 2.
Tommy Bahama Dresser Within Home Island Estate 531 222 Martinique Double Prepare 1.
Tommy Bahama Dresser Throughout Home Island Estate Barbados Triple In Design 0.
Tiffany Style Desk Lamp Within Serena D Italia 25 In Bronze Sunflower Table Inspirations 19.
Tiffany Style Desk Lamp For Bulbs Fixtures Like Lamps Coral Table Design 18.
Tiffany Style Desk Lamp Within What Are Architect Lamps And How To It In The Work Area Ideas 17.
Tiffany Style Desk Lamp Regarding Dragonfly Table 581821 Lighting At Sportsman S Remodel 16.
Tiffany Style Desk Lamp With Large Table Lamps Designs 15.
Tiffany Style Desk Lamp Throughout Jeweled Peacock Bridge Arm Page 1 QVC Com Plans 14.
Tiffany Style Desk Lamp Intended For Lamps Table LuxeDecor Decor 13.
Tiffany Style Desk Lamp Inside Decorative Stained Glass For Bedroom Idea 12.
Tiffany Style Desk Lamp Throughout Amazing Deal On Harley Davidson Table HD Shield Idea 11.
Tiffany Style Desk Lamp In What Are Architect Lamps And How To It The Work Area Ideas 10.
Tiffany Style Desk Lamp With Regard To ESCENA Swing Arm Table Light Remodel 8.
Tiffany Style Desk Lamp Inside Makenier Vintage Stained Glass Green Dragonfly Cat Remodel 9.
Tiffany Style Desk Lamp Intended For Warehouse Of 13 In Butterfly Multicolored Brown Decorations 7.
Tiffany Style Desk Lamp Pertaining To Stained Glass Mission Amazon Com Decorations 6.
Tiffany Style Desk Lamp Pertaining To Elegant Sunflower Patterned For Bedroom Plans 5.
Tiffany Style Desk Lamp Throughout Table Victorian Double Lit Stained Prepare 4.
Tiffany Style Desk Lamp For Serena D Italia Baroque 25 In Bronze Table 16099 The Design 3.
Tiffany Style Desk Lamp In ESCENA Swing Arm Table Vintage Light Prepare 2.
Tiffany Style Desk Lamp In Shop Grape On Sale Free Shipping Today Decor 1.
Tiffany Style Desk Lamp Pertaining To Dale TA100700 Ainsley 5 X 21 Mica Decorations 0.
Tranquility Resilient Flooring Throughout 5 Mm Vinyl 5mm Venetian Cream Ideas 19.
Tranquility Resilient Flooring Within Fresh Bargains On 5Mm Grizzly Bay Oak Click Vinyl Designs 18.
Tranquility Resilient Flooring Throughout Lumber Liquidators 3mm Rustic Reclaimed Oak Vinyl Plans 17.
Tranquility Resilient Flooring In Featured Floor Tuscan Amber Idea 16.
Tranquility Resilient Flooring Within Vinyl Plank Amazing Flo Globoesporte Co Ideas 15.
Tranquility Resilient Flooring Within Manufacturer Arandompackage Co Plan 14.
Tranquility Resilient Flooring Regarding Vinyl Wood Plank Installation Wikizie Co Inspirations 13.
Tranquility Resilient Flooring Regarding Home Decorators Collection Take Sample Oak Luxury Decorations 12.
Tranquility Resilient Flooring Throughout 5mm Tuscan Amber Click Vinyl Lumber Designs 11.
Tranquility Resilient Flooring Inside 2013 Time Lapse Vinyl Floor Installation YouTube Idea 10.
Tranquility Resilient Flooring For 1 5mm North Perry Pine Vinyl Idea 9.
Tranquility Resilient Flooring Pertaining To 5 Reasons Rethink Vinyl Designs 8.
Tranquility Resilient Flooring Pertaining To Rustic Reclaimed Oak Vinyl Floor Planks Google Search Idea 7.
Tranquility Resilient Flooring Within Outstanding Amazing Vinyl Plank Reviews Inspirations 6.
Tranquility Resilient Flooring With Trafficmaster Shelton Hickory Ideas 5.
Tranquility Resilient Flooring Inside First Totally Glueless Vinyl Plank YouTube Plan 4.
Tranquility Resilient Flooring With 5mm Grizzly Bay Oak LVP Ultra Lumber Liquidators Prepare 3.
Tranquility Resilient Flooring Within Weekend Upgrade How To Install Click Vinyl Ideas 2.
Tranquility Resilient Flooring In 5mm Grizzly Bay Oak Click Vinyl Lumber Designs 1.
Tranquility Resilient Flooring For 4mm Clear Lake Chestnut LVP Lumber Liquidators Design 0.
Tiger Wood Flooring Within Tungston Unfinished Tigerwood Natural Premier Design 19.
Tiger Wood Flooring Pertaining To TigerWood Product Catalog Hardwood And Decking Nova USA Designs 18.
Tiger Wood Flooring With Tigerwood Idea 17.
Tiger Wood Flooring In Tigerwood Hardwood Clear 5 Prepare 16.
Tiger Wood Flooring Within Home Legend Tigerwood 3 8 In T X 1 2 W Varying Length Click Design 15.
Tiger Wood Flooring For Tigerwood Smore Newsletters Designs 13.
Tiger Wood Flooring With FREE Samples Sonora Floors Engineered Exotics Natural Tigerwood Idea 14.
Tiger Wood Flooring Throughout Hardwood YouTube Design 12.
Tiger Wood Flooring For What Is Tigerwood Hardwood Pros And Cons Plan 11.
Tiger Wood Flooring Intended For FREE Samples Lamton Laminate 12mm Tigerwood Collection Siberian Designs 10.
Tiger Wood Flooring Intended For Pictures Of Floors Product Code Tigerwood Description Ideas 9.
Tiger Wood Flooring Inside Tigerwood Pictures Gaylord Plans 8.
Tiger Wood Flooring Regarding Tigerwood 3 4 X 1 7 Clear Prefinished Prepare.
Tiger Wood Flooring Throughout Prefinished Premium Grade Brazilian Tigerwood Inspirations 6.
Tiger Wood Flooring Throughout Hardwood Floors House Ideas In 2018 Pinterest Decorations 5.
Tiger Wood Flooring Inside Shop Exotic Brazilian Tigerwood Engineered Hardwood Free Plans 4.
Tiger Wood Flooring Inside Discount 5 X 3 4 Tigerwood Clear Prefinished Solid 1 7 Hardwood Idea.
Tiger Wood Flooring For Easoon USA 5 Engineered Brazilian Tigerwood Hardwood In Ideas 2.
Tiger Wood Flooring Inside Triangulo Tigerwood Prefinished Solid Hardwood Floors Unique Plans 1.
Tiger Wood Flooring Throughout 3 1 2 X 8 Tigerwood Prefinished Engineered Hardwood Inspirations 0.
Teal Glass Lamp In Blue Table Lamps Plus Idea 19.
Teal Glass Lamp Within Luminous Murano Art Silver Aventurine Bullicante Idea 17.
Teal Glass Lamp In Table Top Lamps Unique Shades World Market Decor 18.
Teal Glass Lamp Intended For Eva Colored Table Pottery Barn Idea 16.
Teal Glass Lamp Pertaining To Sea Green Blue Table Lamps Beach Decor Cottage Idea 15.
Teal Glass Lamp Regarding And Champagne Metal Table Plans 14.
Teal Glass Lamp For Green Venetian And Table Design 13.
Teal Glass Lamp For Blue In Commercial Wayfair Idea 12.
Teal Glass Lamp In Amazon Com Table A Living Style Statement One By Plan 11.
Teal Glass Lamp Inside Blue Handblown Pair Of Lamps By Joe Cariati Ideas 10.
Teal Glass Lamp Pertaining To Claudette Turquoise Table 4G322 Lamps Plus Prepare 9.
Teal Glass Lamp Intended For Uttermost Almanzora Blue One Light Table 27087 1 Bellacor Prepare 8.
Teal Glass Lamp Inside Teardrop Luxe Pier 1 Imports Plans 7.
Teal Glass Lamp Within Elegant Designs 24 In Light Blue Table With Fabric Shade Idea 6.
Teal Glass Lamp With Florence Droplet Table In Linen Shade Bed Decor 5.
Teal Glass Lamp Within Elegant Designs LT3214 BLU Table With Fabric Shade 14 X Design 4.
Teal Glass Lamp Intended For Table And Shade Chrome Base Amazon Co Uk Plan 3.
Teal Glass Lamp With Catalina 18578 000 25 1 2 Inch Gourd Table Idea.
Teal Glass Lamp Regarding Claudette Turquoise Table Amazon Com Inspirations 1.
Teal Glass Lamp Inside Titan Lighting Wayfarer 24 In Table TN 999177 The Plans 0.
Toilet For Small Bathroom Intended Top 5 Best Compact Toilets Bathrooms Review Guide Plans 19.
Toilet For Small Bathroom In Bathrooms Big Design HGTV Decorations 18.
Toilet For Small Bathroom With Is Beautiful Ideas KOHLER Prepare 17.
Toilet For Small Bathroom Inside 55 Ideas Best Designs Decor Bathrooms Idea 16.
Toilet For Small Bathroom Pertaining To Combination In 2018 My Tiny Home Pinterest Decor 15.
Toilet For Small Bathroom Throughout Suites Space Saving Bathrooms Bathshop321 Designs 14.
Toilet For Small Bathroom Pertaining To Very Showerhead Is Just Above Seat Picture Idea 13.
Toilet For Small Bathroom With Regard To And Wetroom Ideas Ideal Standard Idea 12.
Toilet For Small Bathroom In Compact Bathrooms MiniLoo Pink By Neo Metro Plans 11.
Toilet For Small Bathroom Regarding 32 Stylish Sink Combos Bathrooms DigsDigs Ideas 10.
Toilet For Small Bathroom Regarding And Sink Combo 32 Stylish Plans 9.
Toilet For Small Bathroom Inside GALBA 24 5 Long X 13 Wide 28 High Inch 1 Piece Idea 8.
Toilet For Small Bathroom With Regard To Crazy Solution Corner Sink Tiny Designs 7.
Toilet For Small Bathroom With Regard To Walnut Vanity Unit Space Saving Bathrooms YouTube Decor 6.
Toilet For Small Bathroom Throughout Toilets A Cloakroom Or Bathstore Design 5.
Toilet For Small Bathroom 9 Tips Bathrooms Kohler Ideas Design 4.
Toilet For Small Bathroom Throughout Toilets A Cloakroom Or Bathstore Design 3.
Toilet For Small Bathroom Pertaining To The Best Toilets Bathrooms Cloakrooms Drench Decorations 2.
Toilet For Small Bathroom Intended Top 8 Best Compact Toilets Bathrooms 2018 Ultimate Reviews Decorations 1.
Toilet For Small Bathroom Within Top 5 Best Compact Toilets Bathrooms Review Guide Plan 0.
Tall Bar Stools For Sale Inside Regal Seating 309 Jailhouse Back Counter Height Commercial Swivel Design 19.
Tall Bar Stools For Sale Inside Shop Greyson Living Pesaro Backless Stool On Free Inspirations 18.
Tall Bar Stools For Sale Inside Signature Design By Ashley Barstool 2 CN On At Elgin Prepare 17.
Tall Bar Stools For Sale Inside Buy Tables High Set Nightclub Furniture Decor 16.
Tall Bar Stools For Sale Inside Swivel Commercial Heavy Duty Design 15.
Tall Bar Stools For Sale With Regard To Melina Stool Ideas 14.
Tall Bar Stools For Sale With Buy Timber Breakfast Chairs Online Australia Remodel 13.
Tall Bar Stools For Sale With Wooden And Metal Folding High Chairs Buy Plans 12.
Tall Bar Stools For Sale Throughout Benches Ireland Design 11.
Tall Bar Stools For Sale Inside Shop Powell Elle Big Wood Metal Barstool On Free Remodel 10.
Tall Bar Stools For Sale In AHB Chase Stool Black With Smoke Linen Upholstery Set Decorations 9.
Tall Bar Stools For Sale Intended Stool Chairs Prices Brands Review In Remodel 8.
Tall Bar Stools For Sale Inside Mezzi Metal High Outdoor Furniture In Aluminium Decorations 6.
Tall Bar Stools For Sale Intended You Ll Love Wayfair Plan 7.
Tall Bar Stools For Sale In Wayfair Counter Height Stool Target Home Design 5.
Tall Bar Stools For Sale Hugo Barstool Evan John Philp Furniture Sofa S Design 4.
Tall Bar Stools For Sale Regarding Buy Tables High Set Nightclub Furniture Prepare 3.
Tall Bar Stools For Sale Throughout Shop Shelby 34 Inch Extra Swivel Stool By Greyson Living Plans 2.
Tall Bar Stools For Sale Pertaining To Palazzo 34 Inch Extra Stool Black From Hayneedle Com Prepare 1.
Tall Bar Stools For Sale Intended Furniture AFFORDABLE HIGH QUALITY Saddle Seat Design 0.
Tri Fold Doors Throughout Aluminium Folding Thind Glass House Service Provider Remodel 19.
Tri Fold Doors Inside 6ft White UPVC Bifold Folding Door Set Flying Design 18.
Tri Fold Doors For Normadoiron Info Inspirations 17.
Tri Fold Doors With Regard To Internal Windows Departments Decorations 16.
Tri Fold Doors Inside NEW Door Aluminium Bi Patio 271 Vat M2 Design 15.
Tri Fold Doors With Aluminium Ideas 14.
Tri Fold Doors Regarding Three Pane Trifold Folding Sliding Bifold Made From Liniar Inspirations 13.
Tri Fold Doors With Regard To New Cozy Door Interior Folding For 29 59549 Remodel 12.
Tri Fold Doors Pertaining To Ideas 10.
Tri Fold Doors Intended For Trifold Wwwitch Org Decor 11.
Tri Fold Doors Throughout Folding External Prepare 9.
Tri Fold Doors With Cool Internal Patio Usopengolf Co Remodel 7.
Tri Fold Doors Inside Plans 8.
Tri Fold Doors Pertaining To 4 Panel Lite Oak Veneer Glazed Internal Folding Door H 2035mm W Decor 6.
Tri Fold Doors With Folding Bi Sliding Designs 5.
Tri Fold Doors For Trifold Google Search Lake House Ideas In 2018 Pinterest Plan 4.
Tri Fold Doors Pertaining To EBay Remodel 2.
Tri Fold Doors With Regard To The 32 Best Images On Pinterest Door Sets Internal Ideas 3.
Tri Fold Doors With The 32 Best Images On Pinterest Door Sets Internal Decorations 1.
Tri Fold Doors With Regard To Freefold White Shaker 4 Panel Style Folding 3 Door Set Height Decorations 0.
Turquoise Dinner Plates Regarding OLMO TURQUOISE Speckled Plate 27cm Buy Now At Decor 19.
Turquoise Dinner Plates Inside Kate Spade Stoneware 12 Piece Dinnerware Set Everything Decor 18.
Turquoise Dinner Plates With Amazing December Savings On Lenox Rutherford Circle Ideas 16.
Turquoise Dinner Plates Inside Amazon Com Happy Sales HSTG DNRPLT Japanese Green Kosui Plans 17.
Turquoise Dinner Plates Pertaining To Sky And Earth Large Square Japanese Set For Plan 15.
Turquoise Dinner Plates Throughout Fiesta Plate 466107U The Home Depot Decor 14.
Turquoise Dinner Plates Throughout Artimino Ciao II At Replacements Ltd Prepare 13.
Turquoise Dinner Plates Throughout Tag Sonoma Set Of 4 Home Decor Ideas 12.
Turquoise Dinner Plates For Used Gorgeous Nicole Miller Crackle Salad Inspirations 11.
Turquoise Dinner Plates With Swirl Melamine Plate Pottery Barn Plan 10.
Turquoise Dinner Plates In Home Zazen At Replacements Ltd Decorations 9.
Turquoise Dinner Plates Throughout Amazon Com O Ware Stoneware 10 Inch Plate Set Of Ideas 8.
Turquoise Dinner Plates Intended For West Elm Alta Reactive Glaze Set Of 4 Ideas 7.
Turquoise Dinner Plates In Ceramic An Acqua Glaze Set Of 4 Prepare 6.
Turquoise Dinner Plates For Dinnerware Plate Sea In A Etsy Plans 5.
Turquoise Dinner Plates Inside Kate Spade New York Sculpted Scallop Plate By Ideas 4.
Turquoise Dinner Plates For Amazon Com Kotobuki 161 746 Sky Glazed Large Inspirations 3.
Turquoise Dinner Plates Inside Speckled Enamel Set Of 4 World Market Designs 2.
Turquoise Dinner Plates Within Rustic Melamine Plate Williams Sonoma AU Decor 1.
Turquoise Dinner Plates Within Amazon Com Le Cadeaux Antiqua Melamine Inspirations 0.
Table With Bench Seating For Versatile Dining Configurations Decorations 19.
Table With Bench Seating A Great Way To Have The Luxury Or Minimizing Inspirations 18.
Table With Bench Seating Regarding Kitchen Rustic Hethrone Decor 17.
Table With Bench Seating Regard To 26 Dining Room Sets Big And Small 2018 Ideas 16.
Table With Bench Seating Intended For Dining Foter Prepare 15.
Table With Bench Seating For Kitchen Seat Back Plus A Together As Well Inspirations 14.
Table With Bench Seating Regarding Modern Style Dining Set Ideas HomesFeed Room Prepare 13.
Table With Bench Seating Intended For Kitchen Plans Designs 12.
Table With Bench Seating Within For Dining Room Tables Furniture Design Designs 11.
Table With Bench Seating Regarding How A Kitchen Can Totally Complete Your Home Plan 10.
Table With Bench Seating Regard To Dining Room Furniture Design Plans 9.
Table With Bench Seating Within Dining Room Seat HomesFeed Decor 8.
Table With Bench Seating In 14 Dining Seats Plans 7.
Table With Bench Seating Pertaining To Farmhouse And Chairs Foter Remodel 6.
Table With Bench Seating For How A Kitchen Can Totally Complete Your Home Idea 5.
Table With Bench Seating Inside Counter Height Foter Prepare 4.
Table With Bench Seating Pertaining To My Husband Built This And For Nook Area I Plan 3.
Table With Bench Seating Versatile Dining Configurations Ideas 1.
Table With Bench Seating Regarding 26 Dining Room Sets Big And Small 2018 Decor 2.
Table With Bench Seating Intended For 26 Dining Room Sets Big And Small 2018 Remodel 0.
Tv Media Stand In Shop Decorotika Luka 71 TV With Bookshelves And Wall Designs 19.
Tv Media Stand Regarding Walker Edison Furniture Company 58 In Wood TV Storage Prepare 18.
Tv Media Stand Pertaining To Austin 78 Console Reviews Crate And Barrel Ideas 17.
Tv Media Stand Pertaining To Simpli Home Draper TV Auburn Brown Hayneedle Decorations 16.
Tv Media Stand Intended For Walker Edison Furniture Company 44 In Wood Corner TV Ideas 15.
Tv Media Stand Inside Amazon Com Simpli Home Artisan Solid Wood Wide TV For Plan 13.
Tv Media Stand Within Amherst TV Simpli Home Remodel 14.
Tv Media Stand With Saracina Home 52 Wood TV Storage Console Target Decor 12.
Tv Media Stand Intended For FITUEYES TV Entertainment Center Shelf Glass Cabinet Plan 11.
Tv Media Stand Intended For Rawley 65 Inch TV Design 10.
Tv Media Stand Regarding Floating TV Entertainment Center Console Curve Mocha 3 Designs 9.
Tv Media Stand Inside Low Profile Walnut TV With Glass Shelf Philadelphia Prepare 8.
Tv Media Stand Regarding Amazon Com WE Furniture 52 Wood TV Storage Console Ideas 7.
Tv Media Stand Throughout 44 Wood Corner TV Storage Console Barnwood Walmart Com Decor 6.
Tv Media Stand Throughout Essex Natural Oak Ideas 5.
Tv Media Stand In Walker Edison Furniture Company 52 White Wood TV Decorations 4.
Tv Media Stand Within Amazon Com Simpli Home Redmond Solid Wood Tall TV Prepare 3.
Tv Media Stand With Shop Pine Canopy Lassen 70 TV Console Barnwood X 16 Decorations 2.
Tv Media Stand Inside Amazon Com Simpli Home Amherst Solid Wood TV Black Plan 1.
Tv Media Stand Within 44 Wood TV Storage Console Driftwood Saracina Home Remodel 0.
Toto Pedestal Sink Pertaining To Google Search Client MZ Pinterest Decor 19.
Toto Pedestal Sink In LPT241G 01 Supreme Suite Lavatory W Single Hole Inspirations 18.
Toto Pedestal Sink With TOTO LPT960 8 01 Soiree Lavatory And Inch Centers Idea 16.
Toto Pedestal Sink Pertaining To LPT754 8 01 Whitney Lavatory Idea 17.
Toto Pedestal Sink Pertaining To Sinks You Ll Love Wayfair Ca Idea 15.
Toto Pedestal Sink Regarding 10 Easy Pieces Traditional Sinks Remodelista Design 14.
Toto Pedestal Sink Throughout Guinevere Lavatory 27 1 8 X 19 7 Allied PHS Decorations 13.
Toto Pedestal Sink In PT530N Promenade Vitreous China Leg Cotton White Idea 12.
Toto Pedestal Sink With Regard To LPT642 8 01 Dartmouth Lavatory Cotton Design 11.
Toto Pedestal Sink With Regard To Promenade Lavatory 27 1 2 X 22 4 Allied PHS Ideas 10.
Toto Pedestal Sink Pertaining To LPT790 8 01 Nexus Suite Lavatory W Faucet Holes On Inspirations.
Toto Pedestal Sink For TOTO White Sinks Bathroom The Home Depot Plan 9.
Toto Pedestal Sink Within TOTO Supreme 23 In Combo Bathroom With 4 Faucet Plan 6.
Toto Pedestal Sink Inside TOTO LPT242G 01 Prominence Lavatory And With Single Hole Designs 7.
Toto Pedestal Sink In Soir E Lavatory TotoUSA Com Ideas 5.
Toto Pedestal Sink Regarding TOTO Soiree 30 In Combo Bathroom With Single Faucet Designs 4.
Toto Pedestal Sink Pertaining To Guinevere Vitreous China 27 Bathroom With Idea 3.
Toto Pedestal Sink Pertaining To TOTO LPT532 8N 01 Promenade Lavatory And With 8 Inch Inspirations 2.
Toto Pedestal Sink With TOTO Promenade 24 In Combo Bathroom 4 Faucet Decor 0.
Toto Pedestal Sink Within TOTO PT960 01 Soiree Cotton White Sinks Ideas 1.
Tall Tv Console With Regard To Legends Furniture Inc Ashton Place 62 TV AP1228 DNC Design 19.
Tall Tv Console Pertaining To TV Stands Simpli Home Decorations 18.
Tall Tv Console Within Jali Sheesham TV Cabinet Casa Bella Furniture UK Plan 17.
Tall Tv Console Pertaining To Tahoe Traditional 62 In Corner TV Vintage Burnished Plans 16.
Tall Tv Console Within Shop WE Furniture 52 Fireplace TV With Open Storage Idea 15.
Tall Tv Console Inside Ana White Corner Media DIY Projects Ideas 14.
Tall Tv Console With Stand For 65 Inch ActiveEscapes Remodel 13.
Tall Tv Console In Unfinished TV 36 Inspirations 12.
Tall Tv Console Within Rustic TV Stand Decorations 11.
Tall Tv Console Pertaining To Nexera 31 Pinnacle TV Stand 100206 Walmart Canada Decor 10.
Tall Tv Console For TV Sideboard Window Pane Doors Black DCG Stores Prepare 9.
Tall Tv Console With Regard To Corner TV Stand Stands Pinterest TVs And Inspirations 8.
Tall Tv Console Inside Simpli Home Artisan Black 53 In TV Media Stand AXCHOL005 BL Prepare 7.
Tall Tv Console With Regard To Post Taged Stand Corner Decor 6.
Tall Tv Console Regarding Build Your Own Get Out Of The Way TV P Remodel 5.
Tall Tv Console Regarding TV Stand IKEA Hackers Plans 4.
Tall Tv Console Pertaining To Amazon Com WE Furniture 70 Highboy Style Wood TV Stand Prepare 3.
Tall Tv Console With Regard To Walker Edison Highboy Style Wood Media Storage TV Stand For Plan 2.
Tall Tv Console Inside Parker House TID 62TL Tidewater 62 TV Stand In Vintage Plan 1.
Tall Tv Console In Cyber Week Shopping Special Wyndenhall Stratford Collection Plan 0.
Target Living Room Furniture With Beautiful Creative Ideas Inspirations 19.
Target Living Room Furniture Inside Tables Under Couch Floor Lamp Behind Table Sofa Remodel 18.
Target Living Room Furniture Regarding 10 Things You Need To Buy From Now Plans 17.
Target Living Room Furniture Inside The New Fall Style Collection Emily Henderson Remodel 16.
Target Living Room Furniture Pertaining To Sofas Sectionals Decor 15.
Target Living Room Furniture Intended For Makes Your Dreams Come True Virtually Decorations 14.
Target Living Room Furniture Regarding Cheap With Photo Of Design 13.
Target Living Room Furniture With Regard To Colorful Small Space Collection Remodel 12.
Target Living Room Furniture Within Top 69 In Interior Designing Home Ideas 11.
Target Living Room Furniture Intended For Ship Art In Rooms To Go Store Prepare 9.
Target Living Room Furniture Pertaining To Remodel 10.
Target Living Room Furniture Intended For Budget Emily Henderson Inspirations 8.
Target Living Room Furniture For Idea 7.
Target Living Room Furniture Within Cheap With Photo Of Set At Tv Remodel 6.
Target Living Room Furniture Pertaining To Decorations 4.
Target Living Room Furniture With 30 Off At Today Only Design 5.
Target Living Room Furniture Inside Extraordinary Ideas Citiesofmyusa Com Plan 3.
Target Living Room Furniture Intended For Design 2.
Target Living Room Furniture In Design Ideas Inspiration 1.
Target Living Room Furniture Intended For Sets Remodel 0.
Table Tray Set In 5pc TV Wood Natural Plastic Dev Group Target Inspirations 19.
Table Tray Set In Sets Inspirational Top Penguins Designs 18.
Table Tray Set For Individual Rectangle Of 2 Tables Consoles Idea 17.
Table Tray Set In Linon Home Decor Tracey Blue And White Snack THD01977 The Remodel 16.
Table Tray Set Pertaining To Folding Tables Target Dinner Inspirations 15.
Table Tray Set Throughout Mainstays 5 Piece Folding In Walnut Walmart Com Prepare 13.
Table Tray Set Regarding 5pc TV Wood Black Plastic Dev Group Target Designs 14.
Table Tray Set Pertaining To Essential Home 5 Pc Shop Your Way Online Shopping Idea 12.
Table Tray Set Pertaining To 5Pc TV Wood Stand End Folding Portable Top Furniture Remodel 11.
Table Tray Set With Regard To Folding TV And Snack Black Of 2 Walmart Com Design 10.
Table Tray Set Inside Oriental Furniture 4 Piece Victorian Tile TV With Stand Ideas 9.
Table Tray Set Within Home And Furniture Cheap Decor 8.
Table Tray Set For Sets TV Trays You Ll Love Wayfair Ideas 7.
Table Tray Set Inside Linon Home Decor Faux Marble In Brown 43001TILSET 01 Plan 6.
Table Tray Set With Regard To Nature S Wonders 5 Piece Snack Bed Bath Beyond Design.
Table Tray Set With Regard To Amazon Com Essential Home 5 Pc Sturdy Light Finish Remodel 4.
Table Tray Set For Amazon Com Oversized Snack Tables Of 4 With Stand Kitchen Remodel 3.
Table Tray Set Pertaining To Amazon Com 5 Piece TV Snack Dinner Folding Kitchen Design 1.
Table Tray Set Intended For Winsome Walnut 5 Piece Curved Rectangular TV Walmart Com Remodel 2.
Table Tray Set Regarding Amazon Com Winsome Wood TV Kitchen Dining Ideas 0.
Tv Stands With Drawers In Coaster TV Contemporary Media Console Shelves And Plans 19.
Tv Stands With Drawers For Coaster TV Contemporary Media Console Shelves And Prepare 18.
Tv Stands With Drawers Avila 2 TV Stand Inspirations 17.
Tv Stands With Drawers Regarding Walker Edison 52 Inch Wood TV Stand Console Walnut Decor 16.
Tv Stands With Drawers Inside Derwent Modern TV Stand Dark Brown Ideas 15.
Tv Stands With Drawers Regard To TV Units IKEA Prepare 14.
Tv Stands With Drawers Regard To Amazon Com Leick 10510 Laurent 50 TV Stand Kitchen Dining Decor 13.
Tv Stands With Drawers Square Black Stand Storage And Shelves Of Cool Prepare 12.
Tv Stands With Drawers In Great Deal On Monarch 2 Drawer Dark Taupe Brown 60 Inch TV Stand Prepare 11.
Tv Stands With Drawers For South Shore Fynn Oak TV Stand S Up To 55 Inches Ideas 10.
Tv Stands With Drawers Within Amazing December Savings On 60 TV Stand Console Cabinet Media Plans 8.
Tv Stands With Drawers Intended For Home Decorators Collection Hamilton 26 In Grey TV Stand 9787800270 Plan 9.
Tv Stands With Drawers Amazon Com Wholesale Interiors Baxton Studio Gerhardine Wood TV Decorations 7.
Tv Stands With Drawers Intended For International Furniture Direct 900 Antique IFD964STAND 8 Drawer TV Decor 6.
Tv Stands With Drawers Intended For TV Stand TVs Up To 52 And Buy Designs 5.
Tv Stands With Drawers Within Coaster 71 4 Drawer Two Tone TV Stand In Black 700826 Inspirations.
Tv Stands With Drawers Inside Derwent Modern TV Stand 6594629 HSN Decorations 3.
Tv Stands With Drawers Livingston Small TV Stand Pottery Barn Designs 2.
Tv Stands With Drawers Regard To Baxton Studio Carlingford Dark Brown 2 Drawer TV Stand 28862 7971 HD Decorations 1.
Tv Stands With Drawers Regarding White Wood Finish TV Stand Multi Grain Drawer Door Inspirations 0.
Tall Floor Lamps Inside You Ll Love Wayfair Ideas 19.
Tall Floor Lamps Intended For Uttermost 28597 1 Cairano Oil Rubbed Bronze Finish 79 5 Inspirations 18.
Tall Floor Lamps Throughout Adesso Prescott Lamp Silver Target Plan 17.
Tall Floor Lamps Pertaining To Furniture Lights John Lewis Partners Idea 15.
Tall Floor Lamps Pertaining To Tripod Standing Wayfair Co Uk Plans 16.
Tall Floor Lamps Within Modern Contemporary IKEA Plans 13.
Tall Floor Lamps Inside And Task World Market Design 14.
Tall Floor Lamps For Score Big Savings On Natural Finish Wood Lamp Brown Prepare 12.
Tall Floor Lamps For 61 In 72 Plus Inspirations 11.
Tall Floor Lamps Regarding Artisan Lamp Designer Indoor Lighting Storm Decor 10.
Tall Floor Lamps Intended For And Task World Market Remodel 9.
Tall Floor Lamps Intended For 73 In And Up Extra Transitional Torchiere Ideas 8.
Tall Floor Lamps Throughout COZYZONE LED Torchiere Lamp Dimmable Uplight Bright Ideas 6.
Tall Floor Lamps In Adesso Odyssey 71 Satin Steel Lamp 5233 22 The Home Designs 7.
Tall Floor Lamps Throughout 73 In And Up Extra Plus Prepare 5.
Tall Floor Lamps With Regard To Lamp Made From Root And Burl For Sale At 1stdibs Plan 4.
Tall Floor Lamps With And Task World Market Prepare 2.
Tall Floor Lamps Regarding Adesso Prescott 71 In Satin Steel Lamp 1515 22 The Design 3.
Tall Floor Lamps With Amazon Com Brightech Montage Bedroom LED Lamp Industrial Idea 1.
Tall Floor Lamps Intended For Lamp Mr Light By Nemo Shiny Black White Inner Inspirations 0.
Toilet Bidet Combo Throughout Heated Seat By Philippe Starck New SensoWash Prepare 19.
Toilet Bidet Combo With Regard To American Standard Electronic YouTube Inspirations 18.
Toilet Bidet Combo With Bio Plans 17.
Toilet Bidet Combo With The 5 Best Combos Of 2018 Reviewed Top Models Plan 16.
Toilet Bidet Combo Inside Electronic Learn More At Http Decor 15.
Toilet Bidet Combo Throughout And Combination From Hatria KARMATRENDZ Plans 13.
Toilet Bidet Combo With Org Remodel 14.
Toilet Bidet Combo Regarding Toto Video Talkeverytime Com Decor 12.
Toilet Bidet Combo With Installation Repairs In Canton GA Design 11.
Toilet Bidet Combo Pertaining To Wc Combined All Splendid Graphics Plans 10.
Toilet Bidet Combo Within What Is Combined Remodel 9.
Toilet Bidet Combo Intended For Lmcompost Com Designs 8.
Toilet Bidet Combo In Toto Neorest 600 User Reviews The Finest Ideas 6.
Toilet Bidet Combo Inside Combos BidetKing Com Plan 7.
Toilet Bidet Combo With Regard To Spence Ideas Infinity Houses Prepare 5.
Toilet Bidet Combo Within Ideas Tips Sensational For Your Home Idea Remodel 4.
Toilet Bidet Combo Regarding And Tictac Ideas Infinity Houses Remodel 3.
Toilet Bidet Combo Regarding FA GEBR DE BOER Plans 2.
Toilet Bidet Combo Within Combos BidetKing Com Idea 1.
Toilet Bidet Combo With Prepare 0.
Tom Dixon Lights Intended For Etch Brass Pendant Decor 19.
Tom Dixon Lights Within Indoor Light Copper Design Shade Pendant Lamp E27 Bulbs Ideas 18.
Tom Dixon Lights With Regard To TOM DIXON Lighting Set 3 3D CGTrader Ideas 17.
Tom Dixon Lights Regarding Cut Tall Pendant Lamp Milia Shop Design 16.
Tom Dixon Lights Within Beat Light Fat Black Ideas 15.
Tom Dixon Lights In Mirror Ball Gold 25cm Pendant Light Houseology Plans 14.
Tom Dixon Lights Within Lighting Furniture Modern Accessories At Lumens Com Decorations 13.
Tom Dixon Lights In Buy Beat Light Wide Black Brass By Designer Plan 12.
Tom Dixon Lights Inside Beat Stout Kopen Bekijk Ons Assortiment Powerlight Decor 11.
Tom Dixon Lights Regarding Beat By Dimensiva Design 10.
Tom Dixon Lights In Beat Pendant Light Black Copper From Tall Remodel 9.
Tom Dixon Lights In Etch Shade Pendant Lamp Modern Lighting And Contemporary Prepare 8.
Tom Dixon Lights For Copper Wide Pendant Lamp By Prepare 7.
Tom Dixon Lights For Melt Pendant Lamp By In Our Shop Decor 6.
Tom Dixon Lights For Beat Light Wide Zwart Messing Van Designer Plan 5.
Tom Dixon Lights In Melt Pendant Lamp GR Shop Canada Prepare 4.
Tom Dixon Lights With Regard To New Arrival Indoor Light Copper Design Shade Pendant Lamp Idea 3.
Tom Dixon Lights Intended For Beat Light Pendant Lamps Shop Prepare 2.
Tom Dixon Lights Inside Melt Pendant Chrome Design 1.
Tom Dixon Lights For Melt Pendant Gold Prepare 0.
Torchiere Floor Lamp With Reading Light In Amazon Com CO Z 3 Way Switch Combo Side Plan 18.
Torchiere Floor Lamp With Reading Light Throughout Bronze Task Lamps Plus Ideas 19.
Torchiere Floor Lamp With Reading Light Within The Aquaria Ideas 17.
Torchiere Floor Lamp With Reading Light Regard To London Table And EBay Design 16.
Torchiere Floor Lamp With Reading Light In Kendal Lighting TC4028 3 Lowe S Canada Prepare 14.
Torchiere Floor Lamp With Reading Light Throughout Shop Allen Roth Eastview 72 4 In Dark Oil Rubbed Bronze 3 Way Plans 15.
Torchiere Floor Lamp With Reading Light Modern Lamps Plans 13.
Torchiere Floor Lamp With Reading Light In Shop Task 2 Gooseneck Style Idea 12.
Torchiere Floor Lamp With Reading Light Throughout Rust Finish Inspirations 10.
Torchiere Floor Lamp With Reading Light Lamps Beautiful Design 11.
Torchiere Floor Lamp With Reading Light In Shop Woodbine 72 Dark Oil Rubbed Bronze Plan 9.
Torchiere Floor Lamp With Reading Light Regard To SPECTACULAR Deal On Splitz Series 72 Satin Nickel Led Plan 8.
Torchiere Floor Lamp With Reading Light For London Table And Design 7.
Torchiere Floor Lamp With Reading Light Intended For 32234BS Destination Lighting Decorations 5.
Torchiere Floor Lamp With Reading Light In Adesso Piedmont Black Design 6.
Torchiere Floor Lamp With Reading Light Throughout Awesome Halogen BEBLICANTO DESIGNS About Decorations 4.
Torchiere Floor Lamp With Reading Light Regard To Amazon Com Catalina Lighting 17539 000 Contemporary Designs 3.
Torchiere Floor Lamp With Reading Light For Cal Lighting Rust Finish Metal Side Ideas 2.
Torchiere Floor Lamp With Reading Light Inside Amazon Com Catalina Lighting 18223 002 Kerrington Prepare 0.
Torchiere Floor Lamp With Reading Light Intended For Piedmont In Steel Walmart Com Plan 1.
Tall Side Table Throughout Hexagonal For Sale At 1stdibs Inspirations 19.
Tall Side Table Inside Dutchbone Agate Round Cuckooland Prepare 18.
Tall Side Table Throughout Extra Wayfair Decorations 17.
Tall Side Table With Regard To Circle Furniture Shaker Accent Tables Ma Decorations 16.
Tall Side Table Within Newport White Belle Escape Design 15.
Tall Side Table Within Yabbyou Slim Rustic Oak Plant Hall 55cm High Amazon Decor 14.
Tall Side Table Intended For Rock Shop Ep Nimo Online At Artemest Prepare 13.
Tall Side Table With Regard To Coco Solid Wood Blu Dot Design 12.
Tall Side Table For American Heritage Flip Top Multiple Colors EBay Prepare 11.
Tall Side Table Within Monterey Gold Badgley Mischka Home Remodel 10.
Tall Side Table With Turn Round Blu Dot Decorations 9.
Tall Side Table With Buy Desalto S Helsinki By Caronni Bonanomi Olson Plans 7.
Tall Side Table With Regard To Ritz Rose Gold Urb SPACE Target Plans 8.
Tall Side Table Throughout DREW Bamboo And Black Lacquer Buy Now At Habitat UK Ideas 6.
Tall Side Table Throughout Home Essence Modal Reviews Wayfair Co Uk Ideas 5.
Tall Side Table With Regard To Disicole Gun Metal Am Pm La Redoute Inspirations 4.
Tall Side Table Pertaining To HABIBI Black The Conran Shop Remodel 3.
Tall Side Table Throughout Extra Wayfair Co Uk Idea 2.
Tall Side Table Inside Amazon Com Ikea End Black Beige Kitchen Dining Ideas 1.
Tall Side Table Intended For DREW Bamboo And White Lacquer Buy Now At Habitat UK Decor 0.
Tile For Shower Floor Regarding Reasons To Choose Porcelain HGTV Plans 19.
Tile For Shower Floor In How To A Design Contemporary Ideas Decor 18.
Tile For Shower Floor Regarding Ideas Pebble Charter Home 17.
Tile For Shower Floor With Regard To How Install In A Bathroom Tos DIY Plans 16.
Tile For Shower Floor Regarding Ideas Amazing Your Home Idea 15.
Tile For Shower Floor Pertaining To What Are The Best Mosaic Floors We Ll Show You Idea 14.
Tile For Shower Floor Throughout The Shop Design 13.
Tile For Shower Floor Within Top 50 Best Ideas Bathroom Flooring Designs 12.
Tile For Shower Floor Intended 11 75 A Sheet Carrara Venato 3x3 Hexagon Marble Mosaic Honed Inspirations.
Tile For Shower Floor Regarding Glass On Ceramic Advice Forums John Decorations 10.
Tile For Shower Floor Regarding Top 50 Best Ideas Bathroom Flooring Designs Decor 9.
Tile For Shower Floor Mixed Quartz Mosaic Pebble Shop Inspirations 8.
Tile For Shower Floor Inside The Is Hexagon Shaped Marble Tiles With Darker Gray Designs 7.
Tile For Shower Floor Within Mosaic Wayfair Prepare 6.
Tile For Shower Floor Pertaining To Top 50 Best Ideas Bathroom Flooring Designs Decorations 5.
Tile For Shower Floor Pin By Shauna Brown Briscoe On Dream Home In 2018 Pinterest Designs 4.
Tile For Shower Floor In Marble Carrara Bathroom Part 5 Installing The Design 3.
Tile For Shower Floor In Tiled Floors Pictures With 2 X2 Porcelain Decor.
Tile For Shower Floor Intended The Shop Inspirations 1.
Tile For Shower Floor Regarding The Shop Inspirations 0.
Traverse Rod Drapes Throughout One Way Draw Drapery Info Designs 19.
Traverse Rod Drapes Within Double Curtain EBay Inspirations 18.
Traverse Rod Drapes With Regard To Preview Medium Rods And Drapery Fullness For Beginners Remodel 17.
Traverse Rod Drapes Within Keep It Simple And Sweet With Curtains Drapery Room Designs 16.
Traverse Rod Drapes Pertaining To ONAVERSE Iron YouTube Plans 15.
Traverse Rod Drapes Inside What Is A Little Design Help Ideas 14.
Traverse Rod Drapes Intended For Drapery Cord Decorative Traversing Curtain Rods Idea 13.
Traverse Rod Drapes Pertaining To Custom Curtain Rods Decorative Blinds Curtains Remodel 12.
Traverse Rod Drapes Throughout Curtain Rods Double Center Open Design 11.
Traverse Rod Drapes Regarding 188 Best Standard Sets Cord Draw Images On Pinterest Idea 9.
Traverse Rod Drapes Pertaining To Rods Stylish Curtains And Home Throughout For Remodel 10.
Traverse Rod Drapes Inside Daniels Homeport Coastal Furnishings Plan 8.
Traverse Rod Drapes Throughout And Curtain Decor 6.
Traverse Rod Drapes With Regard To Curtain Rods Pinch Pleated For Keep It Design 7.
Traverse Rod Drapes For Home Beme International LLC Plan 5.
Traverse Rod Drapes Regarding How To Restring A Drapery Repair Window Blinds Plan 4.
Traverse Rod Drapes Intended For 9 Best Keep It Simple And Sweet With Curtains Images On Remodel 3.
Traverse Rod Drapes Pertaining To How Convert Tab Back Curtains Home Guides SF Gate Decorations 2.
Traverse Rod Drapes With Making Curtains Home Guides SF Gate Plan 1.
Traverse Rod Drapes For Rustic Flat Set Hand Baton Draw 36 180 Inches Designs 0. | 2019-04-20T03:33:16Z | http://revamelia.com/sitemap/gl-t/ |
Do you want modern-day dumps modern-day 00M-651 examination to pass the exam?
killexams.com changed into very fresh access in my life, specifically because the material that I used through this killexams.coms assist changed into the only that got me to smooth my 00M-651 exam. Passing 00M-651 exam isnt always antiseptic however it became for me due to the reality I had regain perquisite of access to to the tremendous reading dump and i am immensely grateful for that.
i've located a superb source of 00M-651 fabric.
I passed 00M-651 certification with 91 percent marks. Your thoughts dumps are very much relish actual exam. Thank you for your superb help. I am able to preserve to exhaust your dumps for my subsequent certifications. When i used to live hopeless that i cant forward to live an IT licensed; my friend informed me approximately you; I attempted your on line education tools for my 00M-651 exam and was capable of regain a ninety one result in exam. I very own thanks to killexams.
New Syllabus 00M-651 Exam prep study steer with questions are provided here.
Hiya gents I passed my 00M-651 exam the usage of killexams.com brain dump test steer in most effective 20 days of preparation. The dumps virtually modified my life once I allotting them. Presently im labored in a first ratebusiness organisation with a decent income. passage to killexams.com and the entire organization of the trutrainers. Tough subjects are correctly secured by means of them. Likewise they provide remarkable reference it truly is useful for the examine motive. I solved nearly every unique questions in only 225 minutes.
What enact you imply by 00M-651 examination?
I prepared 00M-651 with the assist of killexams.com and create that they accommodate pretty accurate stuff. I will evaporate for other IBM tests as rightly.
Little effor, great output, remarkable questions and answers.
Very splendid 00M-651 exam education questions solutions, I handed 00M-651 exam this month. killexams.com could live very reliable. I didnt assume that braindumps ought to regain you this excessive, but now that i accommodate passed my 00M-651 exam, I purchase into account that killexams.com is greater than a dump. killexams.com offers you what you want to pass your 00M-651 exam, and additionally allows you anatomize matters you will in every unique likelihood want. Yet, it offers you simplest what you really exigency to recognise, saving it gradual and strength. i accommodate passed 00M-651 exam and now recommend killexams.com to definitely anyone out there.
Is there a passage to pass 00M-651 exam at first attempt?
Hurrah! I accommodate passed my 00M-651 this week. And I got flying color and for every unique this I am so thankful to killexams. They accommodate forward up with so fabulous and well-engineered program. Their simulations are very much relish the ones in real exams. Simulations are the main aspect of 00M-651 exam and worth more weight age then other questions. After preparing from their program it was very smooth for me to unravel every unique those simulations. I used them for every unique 00M-651 exam and create them trustful every time.
Get 00M-651 certified with actual purchase a recognize at question monetary institution.
My muster is Suman Kumar. i accommodate were given 89.25% in 00M-651 exam after getting your check materials. Thanks for imparting this form of profitable examine material as the reasons to the answers are top class. Thanks killexams.com for the super query monetary organization. The excellent cataclysm about this questions bank is the one of a benevolent answers. It permits me to understand the concept and mathematical calculations.
quick, all and actual bank latest 00M-651 exam.
I missed more than one questions simplest given that I went antiseptic and didnt keep in brain the solution given inside theunit, but on the grounds that I got the relaxation right, I passed and solved 43/50 questions. So my recommendation is to examine every unique that i am getting from killexams.com - this is the all lot I exigency to pass. I passed this exam due tokillexams. This p.c. is 100% trustworthy, a colossal portion of the questions were the equal as what I got on the 00M-651 exam.
Is there a shortcut to relish a flash spot together and pass 00M-651 examination?
i accommodate currently passed the 00M-651 exam with this package. this is a notable solution in case you exigency a quick butdependable practise for 00M-651 exam. this is a expert degree, so weigh on which you quiet want to disburse time gambling with - practical revel in is prime. yet, as a long passage and exam simulations cross, killexams.com is the winner. Their trying out engine truely simulates the exam, which includes the specific question sorts. It does manufacture matters simpler, and in my case, I accept as just with it contributed to me getting a 100% score! I couldnt believe my eyes! I knew I did well, but this became a surprise!!
in which will I learn cloth for 00M-651 examination?
Thankyou killexams..I accommodate cleared my 00M-651 exam with 92%. Your question bank turned into very beneficial. If every unique peoplepractices 100% in reality from your query set and studies every unique of the questions nicely, then he is going to definately live successful. Until now i accommodate cleared three other tests every unique with the assist of your website. Thanks once more.
credit score Suisse has towering expectations for IBM ’s $34 billion acquisition of application company crimson Hat . Analysts Matthew Cabral, Dan Knauff, and Michael Allen initiated coverage of cloud providers today and argued that IBM will whirl into probably the most better of the bunch after it closes the deal.
The back story. traders haven’t appeared terribly optimistic about alien traffic Machines’ (ticker: IBM) planned large-ticket purchase of crimson Hat (RHT), which is expected to nearby the finish of this year. IBM’s inventory is the third-worst performer in the Dow Jones Industrial commonplace for the past twelve months. Even after a 26% 12 months-to-date rally, shares are 7.7% under their fee from three hundred and sixty five days in the past.
it's as a result of crimson Hat’s hefty cost tag—sixty six times its annual web profits from operations—makes it censorious for IBM to efficiently integrate the company and exhaust it to generate cash circulate and revenue increase. colossal Blue will likely concern $25 billion of debt to finance the deal, analysts say. IBM has talked about it is going to respite participate buybacks in 2020 and 2021 and exhaust that money in its spot to pay down debt.
What’s new. credit score Suisse gave a vote of self assurance to the deal in a live sensible on Thursday.
The monetary institution’s analysts are bullish on the plan of the “hybrid cloud,” or company expertise methods that operate partly with on-website servers and partly with cloud application. They referred to that most of groups are looking to keep a participate of their software on-site, in preference to poignant every unique of it to the cloud. They argued as a passage to supply IBM an aspect because the deal will enable the traffic to present both typical on-site company hardware and cloud-computing services.
searching forward. numerous questions wait about IBM’s capability to efficaciously integrate purple Hat.
“one of the vital essential hazards to display screen can live the cultural hardy between IBM and crimson Hat after the close. red Hat’s lifestyle is constructed around the company’s dedication to the open-supply neighborhood, with a company model based on promoting ‘IP-less’ utility,” the credit score Suisse analysts wrote.
IBM shares accommodate been lately up 0.5% at $143.75.
What Does It purchase to maintain a traditional Mainframe Alive?
photo: badge Richards/computing device history Museum IBM spent US $5 billion to build the gadget/360, introduced in 1964. These 9-music magnetic tape drives had been among the many S/360’s one hundred fifty-product line.
a brief record of the most transformative items of the past century and a half would comprise the lightbulb, Ford’s model T—and the IBM equipment/360. This mainframe collection always changed the laptop industry and revolutionized how corporations and governments worked, improving productiveness and making countless new initiatives feasible.
within the years leading as much as its 7 April 1964 launch, however, the 360 become probably the most scariest dramas in American enterprise. It took an almost fanatical commitment in any respect levels of IBM to bring on this fabulous assortment of machines and software. while the technological improvements that went into the S/360 accommodate been critical, how they had been created and deployed bordered on disaster. The enterprise skilled what science policy expert Keith Pavitt referred to as “tribal struggle”: individuals clashing and taking participate in a hastily turning out to live traffic with unstable, and in some situations unknown, technologies, as dubiety and ambiguity dogged every unique the protagonists.
finally, IBM turned into great and distinctive enough in skill, staffing, financing, and materiel to prevail. In an almost entrepreneurial trend, it took odds of rising technologies, no weigh number where they had been determined inside the business. In hindsight, it appeared a sloppy and unwell-suggested exercise, chaotic in execution and yet brilliantly a success. They live in an age that celebrates innovation, so inspecting situations of how innovation is finished can best illuminate their figuring out of the process.
through the conclusion of the 1950s, computing device clients confronted a reputedly intractable problem. Had it no longer been solved, it will accommodate prevented computers from fitting widespread, and any innovations of live in an recommendation Age would accommodate been fiction.
picture: IBM The S/360 turned into designed to change IBM’s 1401 mainframe, which became widespread but couldn’t live extended or upgraded.
corporations accommodate been buying computers in extraordinary numbers, automating lots of the feeble punch card operations and doing extra with facts processing. The popularity of the IBM 1401 illustrates the quick adoption of computing. Over 12,000 of these techniques had been sold from their introduction in 1959 to 1971, when IBM retired the line.
With the 1401 so dominating the laptop enterprise, any complications with it were serious. considered one of them changed into that the 1401 became too small.
users create these machines so effective that they kept piling more work on them, achieving the gadget’s skill. They then had three alternatives: circulation to a much bigger IBM system, such as an IBM 7000, install a competitor’s gadget, or purchase extra 1401s. not one of these alternate options was eye-catching. To change to an even bigger gadget required rewriting software, due to the fact that the historical software would no longer work on a special kind of laptop. The freight of rewriting may comfortably exceed the monetary benefits of relocating to an even bigger machine. Such a metamorphosis besides known as for retraining team of workers or hiring new group of workers standard with the new device. adding extra contraptions of the equal equipment changed into equally unattractive as a result of each and every unit required duplicate group of workers, gadget, and maintenance of hardware and application. customers desired techniques that had been “upgradable” or “suitable,” such that as their wants grew, they could bring in better machines but quiet flee the equal application and peripheral equipment. within the 1950s and early 1960s, it changed into a hope, and for providers an aspiration.
IBM had worse issues than its purchasers did. The 1401s accommodate been proving so confidential that engineers in Endicott, N.Y., which had developed the gadget, resisted attempts via their counterparts in Poughkeepsie to construct larger computer systems, resulting in turning out to live competition between the two corporations. As one engineer recalled, “So unreasonable changed into it that sometimes it looked as if it would exceed the contention with external rivals.” methods made by Poughkeepsie would no longer flee courses written for the 1400 collection. consumers wanting to gallop from the smaller 1400s to the larger Poughkeepsie machines spot increasing drive on IBM to supply compatibility. Senior administration had to purchase care of the charges of sustaining R&D for a half-dozen incompatible product traces and training IBMers to promote and retain so many methods.
Consensus grew that IBM needed to regain perquisite down to one gadget to simplify construction, reduce the cost of R&D, and live extra competitive against a growing array of opponents. If customers had to better within the early 1960s, they may simply as effortlessly stream to a competitor’s computer, seeing that they would should rewrite their utility anyway.
The power of compatibility turned into established within the drop of 1960, when IBM brought the extra potent 1410 to replace the 1401. utility and peripheral machine for the 1401 labored with the more recent desktop. shoppers and IBM income loved that fact. Poughkeepsie’s engineers accommodate been near finishing work on a group of four computer systems regularly occurring because the 8000s that accommodate been suitable with the 7000s.
photo: IBM To regain the S/360 off the ground, T. Vincent Learson compelled engineering factions inside IBM to cooperate.
Learson replaced the Poughkeepsie supervisor in cost of the 8000 assignment with Bob O. Evans, who had served as the engineering manager for the 1401 and 1410. Evans preferred compatibility throughout every unique future items. After ninety days in his new function, Evans informed that work on the 8000s live stopped and that both sites inaugurate working “to better a complete cohesive product line.” He besides proposed a bold new ground technology for every unique future systems, called solid righteous judgment know-how (SLT), to manufacture IBM’s machines greater competitive.
Frederick P. Brooks Jr., who led the design group for the 8000, fought lower back. Evans and Brooks had been ambitious opponents. the two engineers each had years of journey operating engineering and product construction activities at IBM, and that they had been articulate and particularly revered by passage of their staffs and senior management. Brooks changed into not as unreasonable rating as Evans, so Learson introduced in Jerrier A. Haddad, who had spent the outdated two years in freight of the advanced Engineering construction Division, to anatomize the proposed procedures of Evans and Brooks. Haddad counseled going with Evans’s ideas, and Learson killed the 8000 challenge in may additionally 1961.
Bob Evans immediately requested Brooks to enhance the map for a usurp household of computer systems. Brooks turned into flabbergasted, however he authorized, and with that the two engineering communities stopped feuding and commenced taking part. there were nevertheless opponents in the enterprise, but no count—the trajectory toward a standard system had been set.
pictures: IBM Bob O. Evans [left] recommended killing IBM’s bigger 8000 mainframe in want of a new line of compatible computer systems. Frederick P. Brooks Jr. [middle], who led the 8000’s design, objected, however Jerrier A. Haddad [right] sided with Evans. Evans then asked Brooks to work on the brand new line, which became the S/360.
Learson besides assigned John W. Haanstra, president of the customary products Division, which produced the 1400s, to chair an inside project drive known as spread (for systems Programming, research, Engineering, and development), with Evans as vice chair. Brooks later joined the stint drive. In December 1961, the community offered its technical recommendations.
Their document known as for five usurp computer systems, labeled processors (defined as the computing device, its memory, and channels to connect to peripheral gadget). The application and peripherals for one processor had been to work with every unique other processors. The map known as for the usage of ordinary hardware and application interfaces between computers and peripherals, equivalent to between disk drives and tape drives connecting to computer systems, so that the peripherals did not should live swapped out when a brand new processor was installed. The recommendations grew to become the basis for the gadget/360.
as a result of so a remarkable deal can live new, the processors would now not live usurp with IBM’s latest items. That become an totally vital point. valued clientele relocating to the brand new IBM machines would ought to rewrite latest software just once to regain on the route of the brand new equipment.
Then, IBM received a fortunate spoil. As one engineer wrote, “pretty much miraculously [Evans’s] vision of the new product line became saved by means of a last-minute technical accomplishment. In mid-1963, engineers in the Poughkeepsie and Endicott laboratories had begun exploring the occasion of including special microcode to the manage retailers of computers to extend their efficiency when simulating past IBM computer systems.” This characteristic would enable 1401 utility to flee within the two smaller fashions of the proposed new device, most effective sooner. sales acquired on board, and its executives began pressuring R&D and manufacturing administration for early introduction of the brand new processors.
From the starting they faced two dangers, both of which became enough to keep us unsleeping at nighttime. First there turned into the project of coordinating the hardware and software design work for the brand new line. They had engineering groups in every unique places america and Europe working simultaneously on six new processors and dozens of new peripherals…but within the finish every unique of this hardware would ought to plug together. The application changed into a bigger hurdle nonetheless. in order for system/360 to accommodate a common character, a all lot of programmers needed to write thousands and thousands of lines of desktop code. nobody had ever tackled that complicated a programming job, and the engineers accommodate been below top notch coerce to regain it accomplished.
A 2d set of problems worried manufacturing the electronic accessories for the brand new programs. The electronics industry changed into nascence to work on built-in circuits, and the new computer systems accommodate been going to live stuffed with these new components. To live independent, IBM needed to manufacture its own. It proved to live a dear proposition.
eventually, the corporate management committee, including Watson and the board of directors, sucked in a abysmal breath and authorized the spread suggestions. IBM was off to the races in the wildest trip of its background.
IBM could not conceal what changed into going on. New personnel flocked to Endicott, Poughkeepsie, and other labs and plants. purchasers heard rumors, the computer press changed into speculating, and executives at GE, Honeywell, Sperry Univac, and somewhere else were attempting to expect what IBM would do.
At IBM, nobody appeared satisfied with development on the brand new device. Engineering, manufacturing, sales, and company staff were in lots of circumstances working a hundred-hour weeks. Engineers moved cots into their offices. When Watson stopped in to recognize how programming turned into going, an engineer yelled at him to regain out so he may work. The chairman of IBM beat a hasty retreat.
photos: IBM On 7 April 1964, a educate from ny metropolis’s imposing Important Terminal shuttled reporters to Poughkeepsie, the spot IBM chairman Thomas J. Watson Jr. formally unveiled the system/360.
image: badge Richards/desktop background Museum among the gadget/360’s forty four peripherals turned into the 2311 disk storage power. each removable disk pack stored 7.25 megabytes.
On that day, IBM brought a mind-boggling a hundred and fifty new products: 6 computer systems; 44 peripherals, including tape drives, disk drives, printers, and manage devices; and a covenant to provide the utility indispensable to manufacture every slight thing work collectively. the clicking packet become an inch thick, and manuals describing every unique the machines, accessories, software, and their installation and operation crammed more than 50 linear toes.
The principal characteristic of the gadget/360 became, of path, its compatibility. A growing statistics middle might set up a wee 360 laptop and later upgrade to a larger one devoid of rewriting application or replacing peripheral device. as soon as regular with the system, one did not ought to gain information of a pretty righteous deal more to deal with an upgrade. The designation 360 become chosen to imply the concept of 360 levels, protecting everything.
within the first month following the S/360 announcement, customers international ordered over one hundred,000 programs. to spot that quantity in standpoint, in that equal yr within the united kingdom, every unique of Western Europe, the us, and Japan, there were by far greater than 20,000 computers of any kind installed. the primary deliveries of the smaller machines accommodate been promised for the third quarter of 1965, and deliveries of the bigger ones within the first quarter of 1966. The prolong between announcement and transport date gave valued clientele time to forward to a determination which models to purchase, regain them accredited and budgeted, map on the spot to apartment them, train staff, complete application remediation, etc. With the April announcement, IBM bought itself two years to manufacture first rate on its guarantees and knock rivals again on their heels.
From 7 April to when the traffic began delivering machines to consumers, IBM entered probably the most bad, excessive, and challenging epoch of its historical past. The enterprise spent US $5 billion (about $40 billion nowadays) to enhance the system/360, which at the time was more than IBM made in a year, and it will eventually rent greater than 70,000 new employees. each IBMer believed that failure reputed the death of IBM.
Watson assigned his brother, Arthur, to manage engineering and manufacturing going forward. Learson would flee earnings for the brand new gadget, “twisting the tails of their salesmen.” Tom Watson Jr. thought Learson had the greater difficult assignment. The possibility of customers converting to a person else’s machines in preference to to the S/360 tremendously worried Watson.
picture: IBM IBM promised to inaugurate offering the first S/360 machines in the third quarter of 1965. production issues emerged almost immediately.
as the number of orders for the S/360 kept increasing, manufacturing changed into asked in 1965 to double creation. One production supervisor mentioned it couldn't live done and turned into replaced. first-class declined. probably the most electronic circuits inside an SLT, for instance, had been now not complete, so electrons couldn't evaporate the spot they were reputed to. by using the finish of the year, the first-rate control branch had impounded 25 p.c of every unique SLT modules, bringing construction to a halt.
picture: IBM With the S/360, IBM delivered its solid righteous judgment technology (SLT), a precursor to integrated circuits. Doubling the production of the S/360 in 1965 led to defects in a quarter of the SLT modules.
After the issues accommodate been solved, manufacturing proceeded in 1966, resulting in ninety million SLT modules convey produced, in comparison to just 36 million the feeble yr. IBM opened a new plant in East Fishkill, just south of Poughkeepsie, which made greater semiconductor instruments than every unique different producers international combined. production besides multiplied to new amenities in Burlington, Vt., and in Corbeil-Essonnes, France.
To unravel manufacturing issues with the ferrite-core reminiscences, IBM set up a plant in Boulder, Colo., in 1965. nonetheless it took the craftsmanship of people in Japan to regain the creation of reminiscences as much as the necessary quantities and exceptional.
picture: badge Richards/computer history Museum The S/360’s ferrite-core recollection additionally proved extraordinarily intricate to manufacture. This aircraft incorporates 1,536 recollection cores.
As manufacturing grew to become a global effort, new problems arose in coordinating actions and fabricating machines. Arthur Watson had some journey managing IBM’s wee factories backyard the united states but not one with resolving engineering complications, let alone great world problems in construction and manufacturing. He became out of his league, and his brother challenged him to unravel the issues. meanwhile, Learson and his earnings groups wanted extra advancements to the product line. family members between Learson and Arthur absolutely deteriorated. In October 1964, IBM introduced gigantic delays in transport items.
Tom eliminated Arthur from his job and turned over his tasks to Learson, who in whirl introduced in 4 engineering managers to punch throughout the complications. Nicknamed the “four horsemen,” they had plenary authority worldwide for getting the S/360 manufactured and dropped at purchasers. Their assortment of complications, one of the crucial managers cited later, become “an absolute nightmare,” “a gray blur of 24-hour days, seven days a week—certainly not being home.” And yet, in 5 months, they'd labored out ample of the problems to start meeting birth dates. In January 1966, Learson grew to live president of IBM.
photos: IBM dealing with unacceptable production delays, Learson introduced in [left to right] Henry E. Cooley, Clarence E. Frizzell, John W. Gibson, and John Haanstra, who sorted out manufacturing complications worldwide and got the S/360 back on the perquisite track.
software problems besides slowed construction of the 360. The application construction workforce became described as being in “disarray” as early as 1963. The working system, referred to as OS/360, struggled to flee more than one job at a time, which become fundamental to creating the S/360 quick and productive. other problems surfaced with telecommunications and with application programs. Programming steer grew to become a further contentious situation.
Fred Brooks volunteered to aid, and IBM delivered 1,000 individuals to the operating equipment undertaking, costing the enterprise greater for application in 12 months than had been planned for the complete development of the S/360 device. but throwing greater programmers at the assignment did not support. based on the S/360 journey, Brooks would later expand on that theme within the legendary Man-Month (Addison-Wesley, 1975), quiet some of the most generally read books on computing. The application would purchase years to comprehensive, however in the finish it worked neatly enough to hold the transport extend to 1 month.
image: IBM A device/360 arrives at Tokai monetary institution in Japan. exact for computing grew tremendously within the years following the S/360’s launch.
regardless of the prices and nervousness, in 1965—the 12 months IBM had dedicated to shipping the first units to consumers—it managed “through some miracle” (Watson’s phrases) to deliver hundreds of medium-dimension S/360s. Their excellent didn't every unique the time hardy the fashioned design specifications. Shortages of ingredients, other elements that didn't work, and software crammed with bugs unfold to many international locations. essentially each initial consumer encountered problems.
department places of work had been hiring systems engineers to assist. SEs accommodate been faculty graduates, usually with technical degrees, who knew how to debug application and assisted the sales drive in selling and assisting computers. The SEs heroically tackled S/360’s software complications, whereas realm engineers, who installed machine, fastened hardware complications. Salesmen calmed their consumers, while branch managers worked to retain their staffs encouraged and concentrated.
And despite the various complications, “consumers had been nevertheless ordering 360s faster than they may build them,” Watson recalled, forcing delivery dates out as a righteous deal as three years. by using the conclusion of 1966, shoppers had taken nascence of 9 fashions of the S/360, for a complete of seven,seven-hundred.
IBM’s opponents answered. Burroughs, GE, Honeywell, NCR, and Sperry Rand, operating generally in the u.s., CII in France, and ICT (later ICI) in brilliant Britain delivered programs suitable with one another’s machines, however no longer usurp with IBM’s. A 2nd, smaller neighborhood selected to manufacture machines that had been compatible with IBM’s, together with RCA and others in Europe and Japan, relying on RCA’s licenses.
picture: IBM NASA purchased a couple of S/360s, together with this one at Goddard house Flight middle. a couple of others at mission control in Houston had been used to display screen Apollo eleven.
five years later, the global stock of spot in IBM computer systems had grown to $24 billion, whereas that of opponents had reached $9 billion. In different words, IBM’s S/360 elevated unprejudiced exact for computing so hugely that it raised every unique boats. The trade’s annual boom within the second half of the Sixties become in double digits yr over 12 months, as many heaps of groups expanded their exhaust of computer systems. exact for computing grew because of the technological innovations brought forth by passage of IBM, however additionally because users accommodate been gathering enough tang to recall a pc’s charge in riding down charges and performing new capabilities.
IBM additionally grew, greater than doubling from 127,000 personnel global in 1962 to 265,000 by using the finish of 1971. income rose from $3.2 billion in 1964 to $eight.2 billion in 1971.
since the S/360 was the heart of a righteous deal computing through the conclusion of the Sixties, its users constituted a world of their own. hundreds of programmers only knew the passage to exhaust utility that ran on S/360s. further heaps of statistics-processing personnel had labored most effective with IBM equipment, together with keypunch machines, printers, tape drives, disk drives, and utility, which in many cases took years to master. via the early Nineteen Seventies the computing space changed into largely an IBM world on either side of the Atlantic, in the emerging markets in Latin the united states, and in Japan.
The technology that brought out the S/360 remained unique in the business, a discrete clan bonded ferociously to IBM. Careers had been made and broken, personal lives and marriages upended. IBMers did not comprehend on the time how considerably their items would change the world, however they do.
this text is in accordance with excerpts from IBM: the upward push and drop and Reinvention of a worldwide Icon (MIT Press, 2019).
James W. Cortada is a senior analysis fellow on the institution of Minnesota’s Charles Babbage Institute. He worked at IBM for 38 years in revenue, consulting, managerial, and analysis positions.
Whilst it is very arduous stint to select dependable exam questions / answers resources regarding review, reputation and validity because people regain ripoff due to choosing incorrect service. Killexams. com manufacture it inevitable to provide its clients far better to their resources with respect to exam dumps update and validity. Most of other peoples ripoff report complaint clients forward to us for the brain dumps and pass their exams enjoyably and easily. They never compromise on their review, reputation and attribute because killexams review, killexams reputation and killexams client self confidence is Important to every unique of us. Specially they manage killexams.com review, killexams.com reputation, killexams.com ripoff report complaint, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. If perhaps you behold any bogus report posted by their competitor with the designation killexams ripoff report complaint internet, killexams.com ripoff report, killexams.com scam, killexams.com complaint or something relish this, just keep in intelligence that there are always noxious people damaging reputation of righteous services due to their benefits. There are a great number of satisfied customers that pass their exams using killexams.com brain dumps, killexams PDF questions, killexams rehearse questions, killexams exam simulator. Visit Killexams.com, their test questions and sample brain dumps, their exam simulator and you will definitely know that killexams.com is the best brain dumps site.
Exactly identical 00M-651 questions as in real test, WTF!
Are you looking for IBM 00M-651 Dumps of real questions for the IBM PureApplication System Sales MasteryTest v1 Exam prep? They provide recently updated and remarkable 00M-651 Dumps. Detail is at http://killexams.com/pass4sure/exam-detail/00M-651. They accommodate compiled a database of 00M-651 Dumps from real exams if you want to can assist you spot together and pass 00M-651 exam on the first attempt. Just spot together their and relax. You will pass the exam.
killexams.com helps millions of candidates pass the exams and regain their certifications. They accommodate thousands of successful reviews. Their dumps are reliable, affordable, updated and of really best attribute to overcome the difficulties of any IT certifications. killexams.com exam dumps are latest updated in highly outclass manner on regular basis and material is released periodically. Latest killexams.com dumps are available in testing centers with whom they are maintaining their relationship to regain latest material.
killexams.com IBM Certification study guides are setup by IT professionals. Lots of students accommodate been complaining that there are too many questions in so many rehearse exams and study guides, and they are just tired to afford any more. Seeing killexams.com experts work out this comprehensive version while quiet guarantee that every unique the information is covered after abysmal research and analysis. Everything is to manufacture convenience for candidates on their road to certification.
We accommodate Tested and Approved 00M-651 Exams. killexams.com provides the most accurate and latest IT exam materials which almost accommodate every unique information points. With the aid of their 00M-651 study materials, you dont exigency to blow your time on reading bulk of reference books and just exigency to disburse 10-20 hours to master their 00M-651 real questions and answers. And they provide you with PDF Version & Software Version exam questions and answers. For Software Version materials, Its offered to give the candidates simulate the IBM 00M-651 exam in a real environment.
We provide free update. Within validity period, if 00M-651 exam materials that you accommodate purchased updated, they will inform you by email to download latest version of . If you dont pass your IBM IBM PureApplication System Sales MasteryTest v1 exam, They will give you plenary refund. You exigency to forward the scanned copy of your 00M-651 exam report card to us. After confirming, they will quickly give you plenary REFUND.
If you prepare for the IBM 00M-651 exam using their testing engine. It is smooth to succeed for every unique certifications in the first attempt. You dont accommodate to deal with every unique dumps or any free torrent / rapidshare every unique stuff. They present free demo of each IT Certification Dumps. You can check out the interface, question attribute and usability of their rehearse exams before you resolve to buy.
"Our enterprise X-Architecture for x86-based servers and solutions delivers towering performance and the highest customer satisfaction in the industry, making us number one in high-end x86 systems," said Adalio Sanchez, common manager for IBM x-86 and PureSystems Solutions. "We continue to innovate and deliver leadership performance, reliability and investment protection for mission-critical workloads with X6."
Resilient, with features that can assist extend cloud delivery models to mission-critical applications. recollection and storage extend virtual machine capacity to allow SaaS delivery of applications. Autonomous self-healing CPU and recollection systems maximize application uptime by proactively identifying potential failures and taking action to amend them. In addition, Upward Integration Modules can assist reduce the cost and complexity of system administration by allowing operators to effect management tasks through virtualization tools.
New Solutions for X6Clients poignant enterprise applications to cloud models and adopting analytics for quick traffic insights require integrated solutions for relish a flash deployment, efficiency and performance. To assist clients achieve these results, IBM is announcing new solutions for its X6 architecture for analytics, database and cloud deployment, including IBM System x Solution for DB2 with BLU Acceleration on X6 for accelerating analytics, IBM System x Solution for SAP HANA on X6 for analytics, and System x Solution for VMware vCloud Suite on X6 for infrastructure-as-a-service capabilities.
New Storage for cloud, analyticsIBM has announced the common availability of the new IBM FlashSystem 840. The new system provides nearly double the bandwidth and double the performance -- 1.1M IOPS -- of its predecessor, the FlashSystem 820 -- making it ideally suited for analytical databases, virtualization infrastructures, and public and private clouds. Supporting up to 48 terabytes of usable capacity in a 2U unit, the all-Flash array besides features IBM MicroLatency technology that significantly speeds data access times from milliseconds to microseconds (less than 135 microseconds) giving organizations faster actionable insights from real-time data analytics. In addition, a new management GUI - as well as datacenter-optimized features such as hot-swap components and concurrent code load - enable relish a flash installation and smooth management.
IBM besides is introducing the FlashSystem Enterprise Performance Solution, which bundles the FlashSystem 840 and IBM System Storage SAN Volume Controller (SVC) technology. The solution includes a suite of advanced data management features ranging from Real-time Compression, snapshots, thin provisioning, VAAI, and application sensible copies, to FlashCopy, and storage virtualization with IBM smooth Tier.
New SDE capabilities for cloudIBM is strengthening its software defined environment (SDE) portfolio with the introduction of IBM Platform Resource Scheduler for private and hybrid IBM SmartCloud clients who want to accelerate time-to-results, better infrastructure flexibility and reduce operating costs. IBM Platform Resource Scheduler provides a fully virtualized, open and programmable architecture that ensures enterprises are taking odds of every unique available IT resources -- from application software licenses to available network bandwidth.
Integrated with OpenStack, this dynamic resource management appliance provides a comprehensive set of intelligent, policy-driven scheduling features that automatically designate the perquisite resources to the perquisite job, balances workload exact with infrastructure supply and ensures adherence to service flush agreements, improving overall application performance and efficiency. The open and extensible architecture besides allows enterprises to easily reconfigure and add customized policies to meet their specific sharing and scheduling needs.
Financing for cloud and analyticsIBM Global Financing has announced new financing offerings today to assist clients quickly adopt new cloud and analytics solutions by helping reduce upfront costs and hurry revert on investment. Credit-qualified clients can obtain unprejudiced Market Value leasing when acquiring X6 architecture solutions. Other offerings announced comprise 0-percent financing and deferred payments for 90 days when they acquire IBM PureSystems, SDE and Storage technology.
Also, IBM's new mobile financing application can assist IBM traffic Partners close more traffic with their clients, allowing credit-qualified clients to acquire financing to deploy solutions for analytics, mobile computing, companionable traffic and Smarter Planet technologies quickly.
IBM Systems and Technology Group offers a plenary scope of offerings supporting public, private and hybrid cloud implementations that integrate with IBM's cloud software and services. This Systems portfolio includes IBM System x racks and BladeCenter, NeXtScale, PureFlex, Power Systems and System z servers, and IBM Storage solutions. For more information on IBM Global Financing, delight evaporate here.
Images supporting today's announcements can live create at this link.
All other company, product or service names may live trademarks or registered trademarks of others. Statements concerning IBM's future development plans and schedules are made for planning purposes only, and are subject to change or withdrawal without notice. Reseller prices may vary.
Triple the recollection capacity (Up to 6TB in 4S system; up to 12TB in 8S system) and support up to 24 DDR3 DIMMs per socket and up to 64GB LRDIMM density, based on published Intel specifications, compared with x86 competitors with offerings based on Intel's current processors.
Using internal eXFlash storage reduces or eliminates the exigency for external SAN/NAS storage. Less SAN hardware means fewer software licenses.
28 percent acquisition cost savings based on pricing of x3850 X6 at announcement on 2/18 vs. current pricing of a comparable x86 based system that includes 2 x Intel Xeon E7-4820 (v1) processors, 1TB of recollection (16GB RDIMMs) 3.6TB of HDD storage, and Dual Port 10GBe SFP+ controller. x3850 X6 includes 2 Compute Books, 2 x Intel Xeon E7 processors, 1TB of recollection (16GB RDIMMs), 3.6TB of HDD storage, and Dual Port 10GBe SFP+ controller.
46-percent device based on Intel Internal Test Report #1310, using SPECjbb*2013 benchmark, July 2013. | 2019-04-21T18:29:52Z | http://tractaricurteadearges.ro/pass4sure-cert.php?exam=00M-651 |
In a market where buyers are scarce, sellers need to look at all the options to snag a sale. Owner financing is one option available to sellers, but many expats are scared to death of the courts and shy away from carrying a mortgage.
The judicial debt collection law, Ley 8624, changed collection processes significantly upon its enactment in May 2008. Before the extensive revisions made by the law to collection actions, carrying a mortgage was scary. There were so many ways a dishonest debtor could hoodwink an honest creditor. Trying to collect a debt took years in many cases, and in some, creditors just gave up because of the inefficiency of the system.
The new law is better than the old one but still has its share of problems. The old scheme allocated collection cases into the regular courts, overwhelming them in many jurisdictions. The newer law created special collection courts and put many cases in few places to process them, thus bottlenecking the system.
To this day, from the enactment of the law back in 2008, the special courts are still jammed and slow. However, even though they move like molasses, they do move and have not come to a complete standstill as with some courts under the original, outdated law.
Because of these facts, lending institutions and private individuals used guarantee trusts in lieu of mortgages.
This structure was extremely convenient for sellers because a notary transferred assets into a special trust and registered it at the Registro Nacional. There was no transfer tax on this kind of a transaction until laws 9068 and 9069, law for the enforcement of fiscal transparency and law for strengthening tax enforcement, made some major changes to Costa Rica’s code of commerce. Article 662 eliminated the tax exemption of property transfer taxes when transferring property between trustor and trustee.
If a debtor did not pay, assets were returned without too much hoopla. This changed when debtors started to complain the structures were pacto comisorio and not legal in Costa Rica. A pacto comisorio, known in English as a termination or rescission agreement, is illegal in many Latin American countries because Roman law is the foundation to most legal systems here.
Is it a good idea to carry a mortgage? The answer depends on the borrower. They are not all created equally. Some are deadbeats waiting for the right person to bamboozle, while most are honest buyers looking for an investment, second home, or simply to retire to this beautiful country.
Seth Derish of Costa Rica Investigations, an international private investigation firm, says good due diligence is key to lending money. Costa Rica has several credit reporting agencies that provide in-depth information on Costa Ricans and foreign residents alike. However, the information available on non-Costa Ricans is sketchy at best.
Derish explained that when lending to a foreigner a creditor should do a study about them in their home country. Many services to do so are available today. Paying someone to prepare a due diligence workup on a borrower is just good business and a great investment, he said. Good, credit worthy borrowers rarely default on a debt unless there are extenuating circumstances. In those cases, they usually are up front about any problems and try to work out a compromise.
Taking a mortgage on a property in Costa Rica is not the only option available for property sold here, Derish added. Taking a first deed of trust on a foreign property, perhaps in the States where there is a good legal system, is a good alternative, he said.
Offering financing to sell a home or property definitely helps to market it. It can also be profitable since interest is higher here than in other countries like the United States or Canada.
Even though the collection system in Costa Rica is not perfect and slow, it does work. The slowest part is at the beginning, waiting for the auction dates. Yes, dates, usually three, are set. The first one is for the full amount, the second for 25 percent less and the third 50 percent of the original amount.
Lenders who are collecting can bid at the auction or take back the asset if there are no bidders. One very important thing for lenders to remember is that interest in this country expires after one year. If a borrower is in default, it is important to go to collection immediately because then interest is protected.
Also, crucial, is to never make a deal with a debtor without legal counsel. Deals, deferred payments, returning of assets without a court case, or just trying to be a nice person usually backfires due to restrictions on pactos comisorio and out-of-court settlements.
Carrying a mortgage or other financial instrument when trying to sell a property can be the difference between selling or waiting forever for a buyer. There is no shortcut for using a good attorney with years of financing experience. However, most of them do not know much about international due diligence, so potential creditors must know the borrower and investigate. Good bankable advice.
The state insurance company said Friday that the holidays are the time when a lot of employers duck payment of obligatory insurance on their temporary employees.
The company, the Insituto Nacional de Seguros, offers a workman's compensation policy called riesgos del trabajo. The policy pays for work-related injuries.
The state company maintains its own hospital and recovery facilities for such injuries.
During November, December and the first part of January, the company noted, there are a lot of holiday jobs. These include temporary work in retail outlets and even work at the various fairs and festivals that are traditional.
This also is the beginning of the dry season when a homeowner may bring in persons to work on a roof or other parts of the dwelling that might be damaged by opening it to rain.
There are a lot of agricultural activities now, too.
Last year, the Instituto Nacional de Seguros said it handled 1,743 cases of employees working without the required insurance protection. The holidays seem to generate about 45 percent of such cases, it said.
As A.M. Costa Rica reported Sept. 2, hiring workers without the correct insurance can become a nightmare for an expat.
The national insurance institute is ready to sell the required policy, and it also is promoting its RT Hogar, which covers homeowners for domestic employees and for persons who do work at the residence up to three days a month.
The institute noted that this may cover gardeners or others involved in maintenance.
As Garland Baker reported in the Sept. 2 article far too many expats are playing with fire when managing their household staffs and contract workers trying to save money by not purchasing insurance.
Ministry poster at Tica Bus office.
Although the new land exit tax has been suspended, the government does not appear to want anyone to know.
In fact, there has been no official announcement of the suspension from the Dirección General de Migración or from the Ministerio de Hacienda. Even Casa Presidencial with its army of public relations writers has been mum.
The ministry, which contains the tax collecting agency, still has an announcement on its Web site that the tax has been put in force. Tica Bus continues to display a ministry poster that tells travelers to pay the tax at Bancrédito. The poster also mentions a $2 charge being levied for inspecting baggage. Travelers pay this charge even if they have no luggage.
Although the tax won legislative approval in September, the ministry did not report that it was going into effect until Nov. 29. The effective date was the following Monday, Dec. 2. The ministry announcement admitted that there was no way for travelers to pay the tax at the land borders. Payment had to be made in advance at a bank. However, the ministry did promise that soon the bank would be putting in machines to collect the tax at the major border crossing points.
Predictably, not having a way to collect the tax at the border created chaos, and officials had to suspended the tax late Dec. 2.
But they seem to be keeping this fact a secret. Those who continue to pay the tax find out that this was unnecessary when they reach the land crossing points. John Koger, an agent for Tica Bus in Alajuela, said that the bus firm is not collecting the tax and that he was told that those who have paid in the past and the tax was not collected can use the proof of payment in the future.
"My best recombination is for people to call Migración, through the call center, for the best information," he said. Except for the bus company and Koger, the bulk of the information about whether the tax is being enforced comes from travelers who made the border crossing.
Officials rushed the tax into effect to take advantage of the heavy flow of travelers over the holidays.
Some 225,000 vehicle owners have paid the 2014 road circulation tax, the marchamo, as of Friday, said the Instituto Nacional de Seguros. That figure is 14,000 vehicles higher than the same period in 2012, it noted. More than a million motorists have yet to pay.
The tax is due by the end of the year, but finding a place to make the payment after Christmas can be difficult.
The fine for driving Jan. 1 and thereafter without the 2014 window sticker is 47,000 colons, about $94, noted the insurance firm.
Vehicle owners do not need a lot of paperwork to make the payment, as has been the case in the past. A cédula and the plate number allows the cashier to look up the vehicle online. Of course, motorists also have to pay for any traffic fines they have accumulated and not paid.
I am not surprised that no one claimed responsibility for or was brave enough to add a byline to the above. Reminds me an anecdote when Mark Twain criticized an article, and the author asked him "Then how would you have written it?" "Under an assumed name," Twain retorted.
This is pretty bad stuff. Proper journalism it ain’t! More comment and speculation than fact. There is not one direct reference to or specific quote from anyone who actually voiced the sentiment stated in the head and alluded to in the story itself. Nor does it cite any specific policy statement from Villalta – the ONLY principled viable candidate in the field - which would elicit the above claim or assumption.
But assuming that such might be the case, I’m not surprised that many expat entrepreneurs would be quaking in their boots, so to speak, at the prospects of a Villalta presidency. They might be forced to pay their fair share of taxes on their profits. Such villainy and unfairness!
EDITOR'S NOTE: For clarification, the news story was written by the editor, Jay Brodell.
Retirement feeds are disabled on arcvhied pages.
and tankers with foam and water. The four-wheel driver forest trucks will be going to Turrialba, Santa Cruz, Parrita, Atenas and Poás. The tankers will go to Tres Ríos, Santo Domingo, Belén, Santa Ana and Pavas. The 11th vehicle, an ambulance, remains in the Central Valley.
A non-profit organization is not too impressed by the latest ranking of Costa Rica on a worldwide corruption index.
The country has not improved, said the organization, the Asociación Costa Rica Íntegra. It called upon official and presidential candidates to reinforce mechanisms to fight corruption.
The organization said that there is a lack of education that would reduce tolerance to corrupt practices and that the penalties and enforcement are imposed irregularly, if at all.
The index, produced by Transparency International, gave Costa Rica 53 points out of a possible 100 based on the perception of corruption gathered by five surveys.
That put the country in 49th place, up from 54th place in 2012. By contrast, the top scorers, New Zealand and Denmark have 91 points each.
America. But the country was a distant third from the top two Latin countries, Uruguay and Chile, by about 20 points, said the organization.
Judicial workers collected what was called Friday a sea of gifts for under privileged children.
The occasion was the delivery of the gifts to the Asociación de Obras del Espíritu Santo, for distribution around the country.
association's children and a tribute to the late Luis Paulino Mora Mora, the former president of the court, who was a strong proponent of the holiday gift program.
The gifts came from donations by judicial workers, ranging from prosecutors, judges, investigators and office workers. This is the seventh year of the program. Also speaking was the current president of the Corte Suprema de Justicia, Zarela Villanueva Monge.
Some former Paragon Properties buyers are trying to organize to retain ownership of the land they purchased.
Paragon was the heavily marketed real estate venture that collapsed in the face of the economic downturn.
The company purchased large tracts and sold them as retirement lots to mostly a North American clientele. The project was fueled by telephone pitchmen in Florida offering free trips to Costa Rica.
Paragon sold property in several ways as owners became more familiar with Costa Rican law. William Gale, Paragon chairman, said in early 2009 that his firms had sold 2,509 lots in some 17 projects along the Pacific coast. Many of those purchasers put down an initial deposit, perhaps 40 percent. According to a typical purchase agreement, the buyers said they would pay the balance and build a home, perhaps in as little as two years. Paragon agreed to put in roads, water systems in some projects and other infrastructure.
The owners who are trying to organize have purchased their property in the Paragon development Heights of Pacifica. Each property was a separate Costa Rican corporation and each owner was supposed to receive corporate books after the property was filed in the Registro Nacional.
held a conference call last week and "it was amazing how few knew anything about having to pay taxes, where their books were, if they even owned the property they thought. We are trying to organize and share information."
The property owners may be facing an uphill battle. A realty firm here is trying to enlist property owners as management clients to look after their land. The email fro m the firm mentioned the usual property perils, including squatters and herds of grazing cows.
Gale at one time showed a reporter documents that had been presented to the Registro. He also said he planned to make the bulk of his money building homes for his land purchasers.
A.M. Costa Rica criticized the firm for a skimpy sales contract, and a reporter took a tour of the first project at Parrita. The company did not seem much different than others during the real estate boom years, but it was clear that Paragon had high overhead with sale commissions to telephone pitchmen and free air tickets.
After the real estate bubble burst, Paragon was known to have sold substantial land in settlement of some debts. There has been no effort by the company executives to keep in contact with buyers, in part because they were facing a flurry of civil actions in Florida, where Gale was a licensed real estate broker.
Vast reservoirs of fresh water found beneath the ocean floors could potentially be tapped to provide drinking water to parts of the world that face shortages, according to researchers in Australia.
They think the reservoirs, which have been located off Australia, China, North America and South Africa, could hold up to half a million cubic kilometers of low-salinity water.
“The volume of this water resource is a hundred times greater than the amount we’ve extracted from the Earth’s subsurface in the past century since 1900,” says lead author Vincent Post of the National Centre for Groundwater Research and Training and the School of the Environment at Flinders University.
They say the amounts could sustain some regions of the world for decades and stave off, at least temporarily, a global water crisis.
These reserves formed over the past hundreds of thousands of years when on average the sea level was much lower than it is today, and when the coastline was further out, said Post.
“So when it rained, the water would infiltrate into the ground and fill up the water table in areas that are nowadays under the sea,” he said. “It happened all around the world, and when the sea level rose when ice caps started melting some 20,000 years ago, these areas were covered by the ocean.
He added that many of the aquifers are protected from seawater by layers of clay and sediment that sit on top of them.
The aquifers are similar to those below land, which much of the world relies on for drinking water. Their salinity is low enough for them to be turned into potable water, Post said.
Getting to the water could be expensive, however.
“There are two ways to access this water – build a platform out at sea and drill into the seabed, or drill from the mainland or islands close to the aquifers,” said Post.
While offshore drilling can be very costly, he said this source of freshwater should be assessed and considered in terms of cost, sustainability and environmental impact against other water sources such as desalination, or even building large new dams on land.
Post also warns that these newly discovered aquifers are non-renewable.
Winter storms hit a vast region of the United States this weekend, bringing snow, wind and ice.
An area stretching from northern Texas to the Mid-Atlantic saw snow-covered roads, car accidents and travel delays Saturday and continuing Sunday.
Another wintry snowstorm hit California, dumping 5 to 10 centimeters (two to four inches) of snow in the city of Auburn. This storm was on the move, bringing harsh conditions eastward.
In Texas, near freezing temperatures and heavy snowfall created an icy nightmare on the roads and stranded passengers in Dallas-Fort Worth International Airport. Airport officials say more than 400 flights were canceled Saturday.
As heavy snow and freezing rain continued to lash the central U.S., utility crews in Texas and Arkansas tried to restore power to the more than 100,000 households affected by the storm.
With the storms having moved east Sunday, most of the central and western part of the country face some of the coldest temperatures in years, the weather service predicted in an online forecast.
U.S. President Barack Obama has urged Congress to extend unemployment benefits.
Obama said in his weekly address Saturday 1.3 million Americans will lose their unemployment benefits if Congress does not act before it leaves for the Christmas recess.
The president said the economic lifeline is in jeopardy because "Republicans in this Congress - which is on track to be the most unproductive in history - have, so far, refused to extend it."
The non-partisan Congressional Budget Office has predicted that allowing benefits to expire will stunt economic growth next year.
President Obama said extending unemployment benefits "isn't just the right thing to do for our families -- it's the smart thing to do for our economy."
Rep. Renee Ellmers delivered the Republican weekly address. She criticized Obama's healthcare law that has resulted in some Americans losing their health insurance plans, despite a promise from the president that would not happen.
The Affordable Health Care Act was designed to make health insurance affordable for the millions of people who have no coverage.
An American Korean War veteran has returned to the United States after being detained for more than a month in North Korea.
Merrill Newman, 85, arrived at San Francisco International Airport Saturday accompanied by his wife and son.
He told reporters he is tired, but that he has experienced a great homecoming. He thanked U.S. and Swedish diplomats for helping secure his release.
Newman flew to San Francisco from Beijing, after being deported early Saturday by North Korean authorities.
He had been visiting North Korea with a tour group when he was removed from an airplane Oct. 26 as he prepared to leave the country.
Last month, the North's official Korean Central News Agency posted a video of Newman reading an apology aloud, confessing to alleged crimes during the Korean War and so-called hostile acts.
North Korea's news agency said Saturday Newman was released on humanitarian grounds because he had admitted wrongdoing and apologized.
State Department spokeswoman Marie Harf called Newman's release a positive decision, but urged Pyongyang to also release another American, Kenneth Bae, who has been held there for more than a year. Bae is a Korean-American missionary and tour operator. He is being held for alleged subversion.
Harf thanked the government of Sweden, which represents U.S. interests in North Korea because the U.S. does not have an embassy there.
Newman's release came as U.S. Vice President Joe Biden visited South Korea. Biden said he had spoken with Newman by phone after his release.
The world’s largest economy continued to build momentum with better than expected job growth in November. The U.S. government says American companies hired more workers than expected last month, cutting the unemployment rate to 7 percent, which is the lowest level in five years. Despite a steadily improving job picture, though, some doubts remain about the sustainability of the U.S. recovery.
American businesses added 203,000 jobs in November. That works out to a four-month average of more than 200,000 hires per month.
The last time unemployment was this low was five years ago. Bankrate.com’s Mark Hamrick said this month's drop in unemployment was different.
That means gains in higher paying industries. Manufacturing added 27,000 jobs, construction gained 17,000. The average work week expanded, and hourly wages grew.
And despite a weak start to the holiday shopping season, hiring at shopping malls and department stores has been steady, according to the National Retail Federation's Kathy Grannis.
“Retailers are expected to hire anywhere from 702,000 to 750,000. Very much on pace with last year, so of course, with expected growth comes the opportunity for more hires,“ said Grannis.
Although there are worries that an improving U.S. outlook might hasten a pull-back of the central bank’s easy-money policies, the strong job growth was welcome news on Wall Street.
Whether the U.S. recovery has staying power, however, remains in doubt.
Congress faces a new budget deadline Friday. Without a bipartisan agreement on spending, the government could run out of money by January.
The wealthy around the world are always looking for ways to invest their money, and for some people that means buying homes in the United States. While foreign buyers make up just more than 6 percent of overall home sales in the United States, certain cities are disproportionately affected by foreign buyers, and that includes neighborhoods in southern California.
Skeptics may call the belief in feng shui a superstition, but many Chinese consider it an art, and essential for good luck and health in a home. When Chinese native Cathay Wicks searched for a home in the United States, she looked for feng shui elements.
She said she looks for a home that has a lot of light. She said it does not have to be big, but it needs to feel bright.
Wicks is a part of a growing number of people from overseas who are interested in buying homes in major U.S. cities.
Jed Kolko is chief economist for the real estate site Trulia.com. “There are some parts of the United States that see very strong foreign demand and that helps keep prices high in lots of areas. The places where we see this impact the most is in parts of Los Angeles, Miami and New York,” he said.
The number of buyers from China has been increasing, according to Los Angeles-based real estate expert Angela Wong. In the past year, her clients from China have increased by 30 percent.
She said the first reason her clients buy homes in the United States is so their children can attend school here. The second reason: to immigrate here just like Cathay Wicks, who bought a home in a Los Angeles suburb.
Wicks said the weather in Los Angeles is good, and it also is convenient because there are more Chinese here so it does not feel like a foreign country.
More than half of the buyers from China come to California.
In Irvine, California, a new housing development is attracting the attention of potential Chinese buyers with feng shui elements inside the homes and throughout the neighborhood. Developer Emile Haddad came up with the idea. “So we have done feng shui on everything we have. We also have a consultant who looked even at street names when we named the streets. We want to make sure the names of the streets are appropriate in terms of either superstition or in terms of simple pronunciation,” said Haddad.
It is not just people from China, however, who are buying homes in the United States. People from nearly 70 countries are investing their money in U.S. homes. Realtor Shannon Miller said most foreign buyers pay cash, making housing markets such as Los Angeles extremely competitive for domestic buyers who do not have the cash.
“Most of the buyers are trying to buy their homes the traditional way through a loan, and the cash buyers are coming in and they are beating them out. They appeared when the market was full of foreclosure properties. Now their interest is in everything,” said Miller.
Another reason for buying a home in the United States: the EB-5 visa. It requires a foreigner to not only invest a certain amount of money in commercial enterprises here, but also have a U.S. home. Economists expect home prices to keep rising, so to make a profit they do not expect foreign investors to sell their homes anytime soon.
Air Canada appears close to deciding whether to buy up to 60 new narrowbody jets from Airbus or Boeing Co., a decision that could settle which of the giant plane makers wins their annual order race, industry sources said.
The Canadian flag carrier has said it is looking to renew its fleet of single-aisle aircraft, which currently includes more than 50 Airbus A320 and A321 jets, as well as 45 Embraer 190 planes.
Chief Executive Calin Rovinescu had previously said he hopes a decision will be made by the end of the year, noting the decision would involve more than 100 airplanes.
A spokesman for Air Canada said no decision had been made, but two people familiar with the matter said a decision could come as early as next week when the airline's board meets.
The airline spokesman declined to comment on the timing of any board discussions.
Industry sources said Air Canada was expected to address its fleet renewal needs in two phases, starting with a decision on whether to stick with Airbus for medium-haul jets, and pick its revamped A320neo version, or switch to the Boeing 737 MAX.
Both plane makers claim their latest medium-haul offerings provide better fuel savings and easier maintenance.
The airline is expected to opt for 30 or more jets immediately by placing firm orders and place options for up to another 30 as insurance against a faster than expected upturn in the economy, the sources said, asking not to be identified.
Such a deal would be worth up to $6 billion if all the options were exercised.
Airbus and Boeing both declined to comment.
The decision is subject to delay or changes in volume but if approved, would mark the climax to a bruising and widely watched campaign between the world's dominant plane makers.
Airbus was ahead of its U.S. rival in the number of orders in the first 11 months of the year, but the race for the 2013 order crown looks finely balanced once recent deals that have yet to make it into the order books are added to the tally.
The sources denied an industry report that Airbus had already been selected for the deal.
Boeing, which dominates Air Canada's fleet of wide-body jets, is trying to overturn Airbus as incumbent operator for medium-haul planes at Air Canada.
A win for Boeing in its home region would mark a rebound in the region after Airbus displaced it at Mexican low-cost airline VivaAerobus in a fierce contest earlier this year.
As ice at the North Pole declines, some researchers are finding a link between that phenomenon and recent bouts of extreme weather. A new study suggests rapid warming in the Arctic may be altering weather patterns across the Northern Hemisphere, but skeptics say the case is far from proven.
In the past three decades, ice around the North Pole has declined by half, according to Rutgers University climate scientist Jennifer Francis.
“If you take into account the thickness as well, we’ve lost almost three-quarters of the volume of the sea ice. So, it’s just an unbelievable amount of change that’s going on in the Arctic,” said Ms. Francis.
At the same time, the Northern Hemisphere has seen some unbelievable weather in the last decade, including record-breaking heat waves and droughts in North America and Europe, and devastating floods in East Asia, to name a few.
The question is: are they connected?
Ms. Francis and colleagues went back through 30 years of weather data and measurements of Arctic ice and snow cover in northern latitudes. Their findings did show a correlation between the two.
“What we found was, when there was less ice or less snow in any given year during the summertime, that that was more likely to occur at the same time as the occurrences of heat waves,” said Ms. Francis.
They published their findings in the journal Nature Climate Change. Ms. Francis said the loss of ice and snow is affecting the high-altitude winds called the jet stream, which push weather patterns around the Northern Hemisphere.
The jet stream is driven by the difference in temperature between the Arctic and the temperate zones. The bigger the difference, the faster the jet stream flows.
However, Ms. Francis notes that the Arctic is warming twice as fast as the rest of the planet, which will lessen the effect of the jet stream.
“If we warm the arctic faster, then it’s decreasing the temperature difference and causing the jet stream to get weaker,” explained Francis.
A weaker jet stream is wavier, she said. Think of a stream flowing down a mountain; the steeper the height difference, the faster and straighter it runs. On level ground, that stream can meander.
As the jet stream meanders, it pulls hot weather up from the tropics or cold weather down from the Arctic.
“As these waves get larger, they tend to move more slowly from west to east. So, as they do that, whatever weather they’re causing down at the surface also changes more slowly,” said Ms. Francis.
The result is that heat waves, cold snaps and rainstorms last longer. However, Ms. Francis is quick to warn against drawing conclusions too hastily.
“It could be true, but at the moment I don’t think the evidence is there to really strongly argue the case,” cautioned Ms. Francis.
University of Exeter climate scientist James Screen is one of those not convinced.
Screen says the new study only shows a few scattered areas of the globe where the link between sea ice loss and heat waves are significant, according to mathematical tests.
“Which implies either that the relationship is quite weak, or actually, it could be interpreted that the relationship doesn’t exist at all,” said Screen.
Screen also pointed out that researchers have just begun to study the impact of Arctic melting on global weather.
“It’s a hot topic, but there’s a lot of work to be done. The jury’s still out on whether Arctic ice is influencing weather extremes,” said Screen.
Located on the Pan American Highway, Jacó Beach, Costa Rica, Central America. This property is 45,000 square feet or 18,000 meters. Liquor and convenience store is optional. Room to add an automotive service, car wash, restaurant, pharmacy, lotto sales, tour sales, ATM's, etc, for a real money maker. Also future plans for a 80-unit auto motel and casino. See on Youtube at: http://youtu.be/iDXurhJ4fCk Asking price $3.9 million. Email costaricapropertysales@gmail.com or call: 8899-9870.
The Guanacaste English speaking community figures that one is worth plenty and is trying to raise funds for five or six defibrillators for rescue agencies and clinics there.
A resident, Hara Maderich, said a young man of 30 came very close to dying of a heart attack and there was no portable defibrillator anywhere in the area to prevent it.
The Guanacaste Veterans Association spearheaded by Linda Gray of Coldwell Banker in Hermosa has joined forces with a Papagayo ladies group, area merchants and a Playa Cocos physician to raise funds for portable defibrillators to be given to the local first responders, trained volunteers and local clinics.
Ms. Gray said a fund raiser will be Sunday with wine tasting, food, live music, a raffle, silent auction, vendor sales special items, baked goods.
Prizes will be raffled off including cases of wine, restaurant meals, auto care items, fishing trips and original art pieces. Painting by Carlos Hillier will be featured. All sales and raffle donations will contribute to the goal of purchasing the life-saving defibrillators, supplies and training. said an announcement.
Each device is said to cost from $1,000 to $1,200. The group already raised $450 at an earlier fund raiser.
A biodigester was the star attraction when the Universidad Técnica Nacional in Atenas showed 39 visitors how the gas produced by the device can be used for heating and other ways to reduce the utility bill.
Fundación Red de Energía organized the event with support form the Programa de Recursos Digitales para el Desarrollo Económico Sostenible and the Dutch Fundación HIVOS.
The biodigester, an 85-cubic meter bag, takes the waste from some 90 milk cows and converts the material into methane gas for cooking and heating. The firm Viogaz installed the system. The device is about 3,000 cubic feet.
The emphasis was on the applications in rural areas where there is a sufficient amount of material for the biodigester.
Runoff from cows is a big pollution problem, and one of the goals of the project is to eliminate that, said Diego Argüello, director of extension for the school.
Residents around Ojochal on the Pacific Coast are having a party Wednesday to celebrate the appearance of a local property in the television show House Hunters International.
Scott Dinsmore, owner and general manager of the Alma Hotel Group, is hosting the party. The hotel's restaurant, the Castillo, appeared in the show.
House Hunters has taped shows in Costa Rica in the past, including one in the Central Valley and one in Tamarindo.
The minister of commerce is praising the Bali accord as a cost-saving measure that will promote international trade.
The minster, Anabel González, represented Costa Rica at the World Trade Organization in Indonesia where the pact was approved. She had spoken in favor of the agreement earlier in the week.
"We are very pleased by the agreement reached in the ministerial conference in Bali, in particular the accord over the facilitation of commerce because it will speed up such exchanges, reduce costs and improve the competitivity and the climate of business in the country," said the minster.
The so-called Bali Pact is the first agreement that the world body has approved since the organization was founded in 1995.
Roberto Azevedo, World Trade Organization director-general, actually shed tears during the summit's closing ceremony Saturday, saying, "for the first time in history, the WTO has finally delivered."
The centerpiece of the agreement eases barriers to trade by simplifying customs procedures and making them more transparent. The deal still must be approved by all 159 member governments.
The four days of talks had been threatened when Cuba said it would not accept a deal that would not help end the U.S. embargo of the Communist nation. Cuba later dropped its threat of a veto.
Analysts estimate that the deal will add $1 trillion to the world economy and say it preserved the future of the World Trade Organization. | 2019-04-23T00:05:58Z | http://www.amcostarica.com/120913.htm |
Resistance to stress is often heterogeneous among individuals within a population, which helps protect against intermittent stress (bet hedging). This is also the case for heat shock resistance in the budding yeast Saccharomyces cerevisiae. Interestingly, the resistance appears to be continuously distributed (vs. binary, switch-like) and correlated with replicative age (vs. random). Older, slower-growing cells are more resistant than younger, faster-growing ones. Is there a fitness benefit to age-correlated stress resistance?
Here this hypothesis is explored using a simple agent-based model, which simulates a population of individual cells that grow and replicate. Cells age by accumulating damage, which lowers their growth rate. They synthesize trehalose at a metabolic cost, which helps protect against heat shock. Proteins Tsl1 and Tps3 (trehalose synthase complex regulatory subunit TSL1 and TPS3) represent the trehalose synthesis complex and they are expressed using constant, age-dependent and stochastic terms. The model was constrained by calibration and comparison to data from the literature, including individual-based observations obtained using high-throughput microscopy and flow cytometry. A heterogeneity network was developed, which highlights the predominant sources and pathways of resistance heterogeneity. To determine the best trehalose synthesis strategy, model strains with different Tsl1/Tps3 expression parameters were placed in competition in an environment with intermittent heat shocks.
For high severities and low frequencies of heat shock, the winning strain used an age-dependent bet hedging strategy, which shows that there can be a benefit to age-correlated stress resistance. The study also illustrates the utility of combining individual-based observations and modeling to understand mechanisms underlying population heterogeneity, and the effect on fitness.
There is increasing appreciation for individuality of microbes [1, 2]. Even populations grown up from a single cell, in a constant environment can exhibit significant phenotypic heterogeneity in gene expression, protein content and physiology. Individual heterogeneity can be important to population fitness by allowing different functions (e.g. C and N fixation in filamentous cyanobacteria) and survival in a fluctuating environment. One prominent example is bacterial persistence, where a typical population contains a small fraction of slow- or non-growing “persister” cells that are not killed by antibiotics [3, 4]. Cells switch between normal and persister states in a random, binary (switch-like) manner. The ability to resist stress comes at a cost (typically reduced rates of growth or reproduction). For intermittent stress, there is an advantage to maintaining heterogeneity among individuals in a population in terms of tradeoffs between performance and survival (i.e. an insurance mechanism referred to as bet hedging [3, 5]).
For eukaryotic microbes, the budding yeast Saccharomyces cerevisiae (S. cervisiae) is a model organism for studying individual heterogeneity and aging and longevity [1, 6]. Various mechanisms, including stochastic variability in regulatory pathways and production/destruction of mRNAs, and deterministic asynchronicity in cell cycle or replicative age, lead to heterogeneity in protein content and stress resistance in clonal populations [1, 7–12]. For example, copper resistance is heterogeneous and related to cell cycle and replicative age . Intrinsic and induced expression of heat shock proteins and resistance is heterogeneous [11, 14]. Expression of Tsl1, used in the synthesis of trehalose (an alpha-linked disaccharide of glucose that enhances thermotolerance, reduces aggregation of denatured proteins and protects against oxidative damage), and heat shock resistance are heterogeneous and correlated with replicative age . Natural yeast (i.e. not S. cervisiae) populations were found to have heterogeneous resistance to copper, lead and sulfur dioxide, and this phenotypic heterogeneity is a beneficial and evolvable trait . Unlike in bacteria, heat shock resistance in yeast is graded, continuous (vs. binary) and correlated with replicative age (vs. random).
The benefit of random heterogeneous expression of a stress-response factor has been demonstrated experimentally and computationally for S. cervisiae. Levy et al. hypothesized that correlating heat shock resistance with age provides an added benefit. The idea is that older, slower-growing cells are better candidates for being stress resistant because they contribute relatively less to the population growth. Is there a fitness benefit to age-correlated (vs. random) stress resistance?
This hypothesis is explored here using modeling, an approach that has been applied previously to explore the role of heterogeneity [5, 17]. The general strategy is to develop a mathematical model that includes the relevant mechanisms, and then perform numerical competition experiments to see if the age-correlated resistance trait is beneficial. Such competition and/or evolutionary optimization simulations have been used previously to determine optimal traits/parameters [18–20]. There are many potential model formulations and associated parameter sets for simulating replication, aging, resistance, etc. (reviewed below). To ensure some degree of realism, we constrain the model by calibration and comparison to relevant observations from the literature. We use agent-based modeling (ABM, aka individual-based modeling, IBM), rather than the more common population-level modeling approach [18–22]. An ABM is appropriate in this case, because it can resolve the continuous/graded distribution of various individual properties (e.g., protein levels, growth rate, resistance), and model outputs can be compared directly to the individual-based observations that are used to constrain the model [15, 23]. The model simulates intracellular mechanisms and the cell behavior emerges (systems biology). Then, it simulates many such cells and the population behavior emerges (systems ecology). This multi-level approach has been referred to as 'systems bioecology’ [19–21].
We describe the model and compare it to data from the literature, which shows that it is generally consistent with the observed patterns. A heterogeneity network is developed, which highlights the predominant sources and pathways of resistance heterogeneity. Then we perform competition experiments with strains that have different Tsl1/Tps3 expression strategies in an environment with intermittent heat shocks. For conditions with high severity and low frequency of heat shocks, an age-dependent bet hedging strategy is most beneficial, which supports the hypothesis of a fitness benefit of age-correlated stress resistance.
The model is relatively simple and resolves only those mechanisms necessary for exploring the hypothesis and comparison to the relevant data. Yeast cells take up glucose (G, g L-1) and convert it to biomass (Figure 1). Three forms of biomass are considered, including structural (m X , g dry cell-1), damaged (m D , g dry cell-1) and trehalose (m T , g dry cell-1). The total biomass (m, g dry cell-1) is the sum of these components (m = m X + m D + m T ). Structural biomass becomes damaged. A fraction of biomass is synthesized as trehalose. The model tracks the age or number of divisions in terms of bud scars (n B ). A population of individual cells is simulated using an agent-based approach.
Model schematic. Symbols: G = glucose, m X = structural mass, m D = damaged mass, m T = trehalose mass and n B = number of bud scars.
A number of metabolism models for S. cervisiae have been developed ranging from simple Monod-type growth equations to more detailed kinetic models that resolve intracellular mechanisms up to dynamic/kinetic implementations genome-scale network reconstructions [24–28].
where μ m,g (day-1) is the maximum growth rate, K g (g L-1) is the half-saturation constant for glucose, K d is the half-saturation constant and n d is the exponent for damage. The model dynamically simulates the extracellular glucose concentration considering inflow and washout (for continuous culture simulations) and uptake by the cells (see Additional file 1: SI text for details).
Cell division in S. cervisiae is via the asymmetrical budding process, where a larger mother cell gives birth to a smaller daughter cell. With subsequent births, the mother’s size increases and it accumulates bud scars and damage (see below). A number of cell cycle and replication models for S. cervisiae have been developed [29, 30].
Here, the model of Vanoni et al. is adopted. Briefly, two cell cycle phases are simulated, unbudded and budding. Budding starts at a threshold budding size (m b ), which increases from a specified daughter cell value (m b,0 ) by a factor ( a m b m n B - 1 ) with each generation. Division occurs at a threshold replication size (m r ), which is proportional to the budding size (m r = f m,r m b ). The daughter gets the mass synthesized during the budding phase. The mother gains a bud scar and preferentially retains the damage (see below). Individual phenotypic heterogeneity is introduced by randomizing the budding size. At birth, the daughter’s budding size is drawn from a global truncated normal distribution with specified mean and coefficient of variation (CV) . A truncated distribution is used to prevent unrealistic values (e.g., m b,0 < 0). This process introduces non-heritable phenotypic heterogeneity, so values are drawn from a global distribution (vs. one with the mean based on the mother).
Aging in S. cervisiae is due to a number of mechanisms, including accumulation of extrachromosomal DNA circles (ERCs) and oxidative damage (e.g., carbonylation) to proteins . At division, this damage is preferentially retained by the mother cell, although the ability to do so diminishes with replicative age [33, 34]. In addition, the mother cell has higher reactive oxygen species (ROS) and protein damage rates and lower damaged protein degradation rates [35, 36]. Trehalose protects against ROS damage to proteins . Several generic models of aging have been presented [18, 34]. Specifically for S. cervisiae, Hirsch developed a model where cells accumulate a senescence factor at a constant rate and partitions it asymmetrically at division. The growth rate decreases with increasing amount of this senescence factor. More mechanistic models that explicitly represent ROS, the damage reaction with a protein (citrate synthase) and repair reaction with a heat shock protein (Hsp90) have been presented .
The present model considers the production of damaged mass (m D ) from structural mass (m X ) in a first-order manner, at a damage rate that increases with age ( k d = a d n B b d ). At division, the damage mass is preferentially retained by the mother, based on a split fraction (s d ).
Trehalose serves as storage carbohydrate and stress protectant [40–42]. Synthesis is highest during the stationary phase and in response to stress (incl. heat), but trehalose also accumulates under normal, non-stressed conditions [42–44]. Trehalose is synthesized by a trimeric protein complex made up of Tps1 and Tps2, and interchangeable Tps3 or Tsl1 [45, 46]. Genes involved in trehalose synthesis are induced by heat shock [46, 47]. In addition, the expression is negatively correlated with growth rate and has a stochastic component [15, 47]. Tsl1 and Tps3 promoters share a common regulatory element (stress-responsive element, STRE), but their expression can differ [9, 10, 46]. Trehalose (or more generally carbohydrate storage) has been included in metabolic models of S. cervisiae[24, 25, 48].
where f m,s is the maximum fraction, K s (mmol L-1) is the half-saturation constant and n s is the exponent for trehalose synthesis.
where e c,Tsl1 (mol L-1) is the magnitude of constant expression, e a,Tsl1 (mol L-1) is the magnitude of damage or age-dependent expression, K Tsl1 is a half-saturation constant and f r,Tsl1 is a randomization factor. Note that expression is a function of the combined effect of constant, age-dependent and stochastic terms, with their relative contribution depending on the assigned parameter values. The randomization factor (f r,Tsl1 ) is varied by drawing from a global truncated normal distribution with mean of 1.0 and specified CV, following the same approach used for m b,0 (see above). An equivalent formulation is used for Tps3.
Heat causes denaturation of proteins and there are a number of mechanisms that can prevent this. Trehalose stabilizes proteins during heat shock . Other factors include various heat shock proteins, whose intrinsic (i.e. without heat shock) expression is also heterogeneous and correlated with heat shock resistance [11, 14].
where K h is the half-saturation constant for heat shock tolerance. K h is the fraction of trehalose required to achieve a tolerance of 0.5. When a heat shock is applied, all cells with H t < H a die. H a can be adjusted to reflect different experimental conditions.
The model includes a number of deterministic sources of heterogeneity, like the uneven split of damage among mother and daughter at replication. Also, the budding mass threshold (m b,0 ) and Tsl1 and Tps3 expression factors (f r,Tsl1 and f r,Tps3 ) are varied stochastically, as described above. However, in reality there are numerous other mechanisms (e.g., stochastic expression of all genes) that contribute to heterogeneity in cellular processes [1, 7–12]. To account for this, the maximum growth rate (μ m,g ) and damage exponent (n d ) parameters are also randomized (following the same approach used for m b,0 ).
The model simulates individual yeast cells using an agent-based approach [18–22]. Each agent stores the cell state variables (e.g., m X , see Figure 1) and those parameters that are varied at the individual level (e.g., m b,0 ). For continuous culture simulations, the model includes stochastic washout of cells from the reactor (see Additional file 1: SI text for details). Differential equations (e.g., Eq. 1) are solved using an explicit numerical integration method. The model is implemented in the IAM framework [19, 20], and the source code is available from the corresponding author.
For some experiments the model explicitly simulates each individual cell. This includes the microcolony experiments that have ~105 colonies of up to ~100 cells for a total of 107 cells (e.g. Additional file 1: Figure S1B). However, for liquid cultures with larger populations, including the competition experiments, this is not feasible. For example, a 300-mL culture with a cell density of 2.6 × 108 cells mL-1 contains 7.9 × 1010 cells. Using the present model, simulating that many cells for 20 days would take approximately 15 years of CPU time and 18 PB of RAM memory. As is common in microbe ABMs, for liquid culture, the model simulates super-individuals, which are representative of a number of real individuals . Minimum/maximum numbers of agents are specified, and when the number of agents drop/rises below/above this, agents are split/combined (see Additional file 1: SI text for details). The number of agents, or the computational resolution, is set sufficiently high so that the model produces robust and reproducible results over multiple runs with different seed values for the random number generator.
This application is especially challenging from a computational perspective, because of the focus on small fractions of the population. For example, in one experiment by Levy et al. , 0.1% of the population was sorted out using flow cytometry and the growth rate distribution of that fraction was computed (Additional file 1: Figure S1I). In order for the model to adequately resolve the heterogeneity of such a small fraction of the population, it needs to have a very large number of agents.
The model was constrained by calibration and comparison to relevant observations from the literature. Several parameters were calibrated within the available literature range with the help of an automated optimization routine (see Additional file 1: SI text, Table S1, Figures S1&2). Model simulations followed the actual experimental protocols as described in the respective literature references, which could be quite involved. For example, one experiment by Levy et al. included growing cells in liquid suspension, sub-sampling based on Tsl1 expression, growing again in liquid suspension, randomly sub-sampling, growing as microcolonies, and estimating the growth rate of each microcolony based on the change in colony area (Additional file 1: Figure S1J). The resulting calibrated model is then used without any further changes to explore the underlying mechanisms and fitness effect of heterogeneous, age-correlated heat shock resistance.
To understand how heterogeneity is produced and how it propagates through the population, we developed a heterogeneity network (Figure 2F). The nodes in the network represent individual state variables (e.g. m D ), calculated variables (e.g. μ) and processes (e.g. unequal split of damage, node DAM), and the links represent causal relationships. For example, DAM causes heterogeneity in m D , which in turn causes heterogeneity in m (via mass summation, node m), μ (via Eq. 2), and e Tsl1 and e Tps3 (via Eq. 4). By turning off the heterogeneity at a node or link in the network and examining the resulting reduction in heterogeneity at a downstream node, the heterogeneity can be mapped onto the network (see Results section).
Model-data comparison and heterogeneity source and pathway analysis. (A) Damage (m D /m) vs. age (n B ). Data from . (B) Tsl1 expression (e Tsl1 ) distribution of cells. (C) Age (n B ) vs. Tsl1 expression (e Tsl1 ). (D) Heat shock survival of various Tsl1-sorted fractions. Data from . “a.u.” is arbitrary units. (E) Distribution of heat shock tolerance for base case and various diagnostic simulations (e.g. “dam” has equal damage partitioning, s d = 0.5). (F) Heterogeneity network. Line weight indicates contribution of node or link to overall heterogeneity in heat shock tolerance (based on variance of normalized H t , e.g., panel E). For details of experiments used to generate the data the reader is referred to the source publications.
To explore the role of the age-correlated resistance trait on the fitness of the yeast, numerical (i.e. simulations) competition experiments were performed. Cells were grown in a glucose-limited chemostat with constant dilution rate (D = 0.15 h-1), a set-up similar to the one used in a previous experimental study that examined the effect of mild heat shock (28 > 36°C) on S. cervisiae growth rate and gene expression . The culture was subjected to heat shocks at specified heat shock severity (H a ) and frequency (F h , h-1). A number of model strains with different Tsl1/Tps3 expression parameters were developed. For Tsl1, e c,Tsl1 controls constant expression, e a,Tsl1 controls age-dependent expression, and f r,Tsl1,CV controls stochasticity. Tsl1 and Tps3 are considered separately in the model to allow for comparison to data (Figure 2), but their effect on trehalose synthesis is identical (Eq. 3) and a strain with a high Tsl1 parameter (e.g., e c,Tsl1 ) behaves the same as a strain with an equivalently high Tps3 parameter (i.e., e c,Tps3 ). Therefore, the Tsl1 and Tps3 parameters were varied together (e.g., the ratio e c,Tps3 / e c,Tsl1 is held constant). We created 1,000 model strains, with 10 variants for each Tsl1 parameter. Doing a single simulation with all strains was not feasible. Therefore, a tournament-style competition was used. In each round, 10 strains were randomly selected and placed in competition. The winner of each match advanced to the next round and the process was repeated until one strain was left. For each condition (H a , F h ), the optimal bet hedging strategy/parameters emerged as the winner. The experiment is implicitly constrained by the metabolic cost of trehalose synthesis (reduced synthesis of structural biomass, Eq. 1a), which is traded off against the benefit of higher heat shock survival.
The model was calibrated to observations from the literature with the help of an automatic calibration routine. The database is comprised of 15 datasets [9, 10, 15, 33, 41, 43–45, 49]. The reader is referred to the original publications for experimental protocols and details. This database characterizes the relevant features of the system, including the distribution of growth rates, damage accumulation with age, Tsl1 and Tps3 expression levels, distribution of Tsl1 expression, age vs. Tsl1 expression, age distribution for all and top 1% of Tsl1 expressing cells, Tsl1 expression vs. growth rate, growth rate distributions for all, top 1% and 0.1% of Tsl1 expressing cells, trehalose content, trehalose in wild type vs. Tsl1 knockout, survival vs. Tsl1 expression, and survival vs. growth rate for wild type and Tsl1 knockout strains. Discussion of all datasets is provided in the SI and a selected subset are discussed here.
Oxidative protein damage (carbonyl levels) was observed to increase with age (bud scars), and the model reproduces this general pattern (Figure 2A). The observations suggest a step-wise increase whereas the model exhibits a more linear shape. The reason for the discrepancy is unclear. The observations are from a single study and it would be useful to obtain additional observations to confirm the shape. Damage mass increases with age due to preferential inheritance by the mother and an increase of damage rate with age. The expression of Tsl1, observed with flow cytometry and green fluorescent protein (GFP) fused to Tsl1, was quite heterogeneous (Figure 2B). The modeled Tsl1 distribution was not as spread out as the observations, for example, the data extended into the negative range (presumably a measurement error at low Tsl1 levels), whereas the model restricted Tsl1 to the positive values. The heterogeneity in Tsl1 is a function of the stochastic component and the amount of Tsl1 expression that is damage correlated (Eq. 4). Applying the bud scar stain WGA-TRITC and passing cells through the flow cytometer showed that Tsl1 expression increased with age (Figure 2C). The model also shows an increase. However, for an unknown reason it over-predicts the age in the 0.03 Tsl1 bin. When Tsl1-sorted sub-populations were heat shocked, survival correlated positively with Tsl1 expression (Figure 2D). Again, the model reproduces the general increase, but it differs in the 0–0.1% Tsl1 bin. This narrow bin includes the fewest cells and is most susceptible to stochastic variability (observations and model). Overall, the model does not capture all features of the data, but it reproduced the main patterns, including an increase of damage with age, heterogeneous Tsl1 expression, and correlation of age and survival with Tsl1 expression.
We constructed a heterogeneity network (Figure 2F), which defines how heterogeneity can be produced and propagate through the population. In the present model, all heterogeneity originates at replication. The model does not consider other sources of heterogeneity, like stochastic differentiation at other times (i.e. in between replication events) or heterogeneity in the environment. There are a number of deterministic and stochastic sources of heterogeneity associated with replication (grey nodes in Figure 2F). For example, the scarring process produces heterogeneity in bud scars (n B ) in a deterministic manner, while the expression of Tsl1 is varied randomly (f r,Tsl1 ). Despite the numerous sources of heterogeneity, replication does not completely randomize or “reset” the cells, and the model allows for inter-generation memory. For example, bud scars and damage – and thus also the growth rate – are heritable (Additional file 1: Figures S1A&S3).
Where does the heterogeneity in survival originate? Sequentially removing sources and examining the resulting reduction of heterogeneity in heat shock tolerance showed that the scarring and unequal division of damage processes are the predominant sources (Figure 2E). But there are many ways the heterogeneity can go from these sources to heat shock tolerance. How does it propagate through the network? Systematically eliminating heterogeneity at links and nodes in the network (e.g., use population-average e S in Eq. 3) allowed us to map the heterogeneity onto the network. This showed that heterogeneity travels along multiple pathways, but predominantly from scarring to damage to Tps3 expression to trehalose and heat shock tolerance, a deterministic pathway that leads to age-correlated stress resistance.
The model did not capture all features of the data, but it reproduced the major patterns observed in the relevant datasets. It was then used as an experimental system to explore the hypothesis outlined in the introduction. To determine the best Tsl1/Tps3 expression strategy we performed tournament-style competition experiments between 1,000 strains with different expression parameters (e c,Tsl1 , e a,Tsl1 , f r,Tsl1,CV ) in continuous culture with intermittent heat shocks. Figure 3A shows the results from one simulation at intermediate heat shock severity and frequency. One strain clearly outcompeted the others over the course of the experiment.
Numerical competition experiments. (A) Example of one simulation at intermediate heat shock severity and frequency (H a = 0.7, F h = 0.14 d-1). Cell density of 10 competitors. Abrupt drops in concentrations correspond to heat shocks. (B) Summary of tournament-style competitions. Optimal Tsl1/Tps3 expression parameters for a number of (B1) heat shock severities (H a varies, F h = 0.14 d-1) and (B2) frequencies (H a = 0.7, F h varies). Constant: e c,Tsl1 in μM, Age-dependent: e a,Tsl1 in μM, Stochastic: f r,Tsl1 / 10. Symbols are mean +/- one standard deviation of ten replicate experiments.
We performed a number of experiments at various heat shock severities (H a ) and frequencies (F h ), ranging from no heat stress (H a = F h = 0) to the maximum heat stress the yeast can survive (Figure 3B). When no heat shocks were applied, the winning strain had no constant or age-dependent terms. It did have a stochastic term, but this is simply due to the neutrality of the parameter when constant and age-dependent terms are zero (i.e., then the stochastic parameter does not affect the expression, Eq. 4). At lower heat shock severities, the winning strategy was to express Tsl1/Tps3 in a constant manner without heterogeneity (Figure 3B1). It only takes a small amount of trehalose to survive these heat shocks and it is best to have all cells synthesize this amount. Adding heterogenity would result in some cells being killed by heat shock, which would not be beneficial, a finding consistent with previous studies . Since heterogeneity cannot be avoided with age-dependent expression, constant expression is the better strategy in this case. At higher severities, the amount of trehalose required to survive the heat shocks becomes larger and a bet hedging strategy becomes beneficial. That is, the average amount of trehalose is below what is required to survive the heat shocks, but it is heterogeneous and some cells have sufficient trehalose to survive the heat shocks, and this prevents the population from being wiped out. Under such conditions, the model predicted that age-dependent expression is better. This can be explained, as suggested in the Introduction, by the fact that the older cells contribute less to the population growth, and eliminating them is less detrimental to population growth (Additional file 1: Figure S11). If age-dependent expression is excluded (e a,Tsl1 = 0), the winning strain has constant and stochastic expression terms (Additional file 1: Figure S10). The heterogeneity introduced through the deterministic aging process is sub-optimal and it is beneficial to add more via the stochastic term. At lower heat shock frequencies, the winning strategy was age-dependent bet hedging, whereas at higher frequencies constant expression without heterogeneity was better (Figure 3B2). At lower frequencies, the growth period in between the heat shocks is relatively long and reducing the average trehalose production (as is achieved using a bet hedging strategy) is beneficial. At higher frequencies, a bet hedging strategy is not advantageous, because too many cells are lost through the frequent heat shocks.
These experiments were performed with a model designed with equations based on our current understanding of the underlying mechanisms, a parameter set that is generally consistent with the literature and main patterns consistent with observations. However, we cannot rule out that there is not another model formulation (i.e. different equations) or parameter set that produces an equal-quality calibration but a different result or conclusion about the fitness effect of age-correlated heat shock resistance. This is a common problem in model prediction and has been referred to as “equifinality” , and it can be addressed to some extent by varying model formulations [18, 34] and/or parameters . The present model is computationally very demanding. Nonetheless, we used an automated optimization routine that allows for alternate parameter values, and two runs produced essentially the same parameter set, which provides some additional support for the robustness of our conclusions.
This study explored the ecological role of heterogeneous, age-correlated heat shock resistance in S. cervisiae. A simple model was constructed based on our current understanding of the underlying mechanisms, and comparison to relevant data shows it is consistent with observed patterns. Competition experiments with strains that have different stress protectant synthesis strategies shows that, for high severities and low frequencies of heat shock, an age-dependent bet hedging strategy is best. This supports the hypothesis that age-correlated resistance is more beneficial than random resistance. Although the model is specific to heat shock resistance in S. cervisiae, trehalose is produced by many different organisms and also protects against other forms of stress (e.g., ethanol, ), so our results have broader relevance. However, there are also cases where resistance is negatively correlated with age (i.e., younger cells are more resistant), like Sod1p-mediated copper resistance , so these results cannot be generalized to all types of stress.
The finding that it is advantageous for older cells to invest in increasing stress tolerance has implication for understanding aging and longevity- two very different things, with different selective forces acting . Longevity is a highly adaptive trait and it is generally considered that genes promoting longer lifespan do so by improving somatic resistance in unfavorable conditions . Our results provide a clear example of how such a mechanism could operate.
Our model was designed specifically for exploring the role of age-correlated heat shock resistance in S. cervisiae. For that purpose it was kept as simple as possible, while still including the relevant mechanisms. This naturally limits the model’s applicability to other questions, although it should be useful for exploring other features related to aging, heterogeneity and stress resistance. For example, with minimal changes (i.e. Eq. 4), the present model could be used to predict expression of other proteins. The model can also serve as a stepping stone for further model development. A lot more is known about the various mechanisms involved in the problem and this knowledge is sufficient to support the development of a more detailed model. It would be interesting to bring in more mechanistically-detailed models of gene transcription and expression noise [7, 8, 12], more detailed and/or genome-scale metabolism [24, 26–28] and cell cycle control . Sub-genome scale combined signaling, gene expression and metabolism models have been developed . It seems that several pieces are in place to support the development of such a model, which would require a large community effort (as was done for the latest metabolic network reconstruction, ), but it would be worth it.
This study combined individual-based observations (IBO) and modeling (IBM) to understand mechanisms underlying population heterogeneity, and the effect on fitness . Individual-based observation and experimental technologies are advancing rapidly and are generating large amount of novel data [15, 52]. These data are different from traditional population-level observations, which were amenable to analysis using traditional population-level models, and they require new methods and models. Our study illustrates the utility of combining IBM and IBO. The IBOs of Levy et al. were used to constrain the individual-level processes in the IBM. The IBM, in turn, put the IBOs into ecological context.
This paper presents the use of a multi-scale modeling approach to investigate the role of an intracellular mechanism in the ecological fitness of an organism. Covering multiple levels of organization is a general problem in the biological sciences. Several systems approaches have been developed to address this challenge [53, 54]. The approach used here, “systems bioecology”, combines systems biology and systems ecology [19–21]. The idea is conceptually quite simple. First, the intracellular states and mechanisms of microorganisms are explicitly simulated (systems biology). Then, whole populations of these individual microbes are simulated directly using agent-based modeling (ABM), including their interaction with the environment (systems ecology). This general approach may be applicable to other questions involving the role of intracellular mechanisms at the ecosystem scale.
Thanks to Sasha Levy for help interpreting his data and Kieran Smallbone for helpful advice on yeast metabolism modeling. Two anonymous reviewers provided constructive criticism. Funding is provided by NSF IOS-1121233.
FLH and JAB designed the experiment. FLH and NDF performed the research. FLH and JAB wrote the paper. All authors read and approved the final manuscript. | 2019-04-20T22:51:17Z | https://bmcsystbiol.biomedcentral.com/articles/10.1186/1752-0509-8-18 |
The H.P. Lovecraft Historical Society presents its all new motion picture The Whisperer in Darkness. Folklore professor Albert Wilmarth investigates legends of strange creatures in the most remote hills of Vermont. His inquiry reveals a terrifying glimpse of the truth that lurks behind the legends. H.P. Lovecraft's classic tale of suspense and alien horrors is brought to life in the style of the classic horror films of the 1930s like Dracula, Frankenstein and King Kong. Using the Mythoscope™ process — a mix of modern and vintage techniques — the HPLHS filmed on location in New England to create the most authentic and faithful screen adaptation of a Lovecraft story yet attempted.
This award-winning motion picture has screened at festivals worldwide. You can now screen it from the comfort of your own home, as it's available on DVD and on BluRay disc.
Below are samples of what some critics had to say about the film.
[The Whisperer in Darkness] it’s the most compelling proof to date that there is a way to bring H.P. Lovecraft to cinematic life. Whisperer pretends to be an artifact of the 1950s sci-fi/horror boom—it’s black and white, melodramatic, and the pacing is more of a long, slow burn than anything you’ve seen in the past year at the multiplex. But, man does it pay off; the needle on the creep-meter goes through the roof at certain climactic moments. It’s great fun.
Ultimately, however, Branney nails the spirit of Lovecraft. Through voice-over narratives and frightened faces, “The Whisperer in Darkness” conveys a sense of human sanity being unraveled by too much forbidden fruit. By film’s end, Foyer has the Thousand Yard Stare down to a science. His once-doubting Wilmarth has picked from the Tree of Knowledge, and become a reluctant believer.
You are about to encounter what very well may be the single most successful H.P. Lovecraft adaptation ever to lick fear across a screen. Shot with an aesthetic, production design and performance style angled to emulate the feel of a '30s/'40s Universal horror film - without falling into camp - WHISPERER arrives like shadows out of time, a discovered relic from another dimension. A genuinely scary film and a hellishly great time.
Those looking for Lovecraft done right should look no further than Sean Branney’s THE WHISPERER IN DARKNESS. I’ve read the story quite a few times, and though this story of otherworldly portals and demon bugs from other dimensions is not the most literal of Lovecraft’s work, I still don’t think that it’s been adapted perfectly. Until now. The filmmakers seem to not only possess the uncanny ability to translate Lovecraft’s words and themes with ease, but they also punch up the story with modern effects while giving it a timeless quality of the matinee serials. Though this film is heavy on the talk, the strong performances and full embrace of the monster movies of the fifties make every second of this film intriguing and unblinkable. Filmed in stark blacks, faded whites, and amorphous greys, THE WHISPERER IN DARKNESS is a monster movie for folks who miss going to monster movie matinees. Branney adapts this tale of science proved wrong sharply with quick line exchanges and every eerie trick in the book made to amp up the old timey thrills.
THE WHISPERER IN DARKNESS is the best adaptation that I have ever seen of an H.P. Lovecraft tale! The H.P. Lovecraft Historical Society has put together a very worthy 2-Disc Special Edition that covers all the bases, and then some. Disc 1 is where you’ll find the movie, Chapters selection, and a plethora of Subtitles to choose from (Catalan, Croatian Czech, Danish, Dutch, English, Romanian, Spanish, Italian, Japanese, Norwegian, Polish, Portuguese (PT), Portuguese (BR), Swedish, Euseka, Finish, French, German, Greek, Hungarian, Russian and Turkish). Disc 2 is comprised of the “Making-Of” Featurettes, Extended/Deleted Scenes and Trailers; all of which can be accessed on the main menu.
The Whisperer in Darkness is a hell of a fine film, one of the best adaptations of a Lovecraft story ever made, and it’s far superior to the vast majority of bigger-budgeted films that have “H.P. Lovecraft’s” before their titles. Whisperer is faithful to a fault to the source material. What changes it does make are very welcome and actually enhance the story, as opposed to just padding things out, like so many other movies based on Lovecraft’s short stories do. It is an obvious labour of love and, when movie makers care this much, it shows in every frame of the film. If you’re a fan of H.P. Lovecraft, then this is mandatory viewing. If you’ve never read anything by HPL and always wanted to see what all the hoopla was about, this is a great place to start to get a handle on his unique and genre-changing brand of horror.
Re-recording Mixer... Erin Michael Rettig, C.A.S.
Legal... Sherry D. Spees, Esq.
These people and organizations went above and beyond the call of duty in helping us make this movie. We thank them for their generosity and support.
We know a great many people have been eagerly looking forward to the release of our next film since we debuted the trailer in October of 2007. You've clamored for the movie and for information about when it will be released. We've told you, "We're working on it". So now, at last, we're ready to tell you the strange and terrible tale of what's been going on with our movie of The Whisperer in Darkness.
For starters, it's not really that strange nor terrible. Shortly after we finished The Call of Cthulhu in late 2005, we settled on the notion of adapting HPL's "The Whisperer in Darkness" and shooting it as a feature length film, shot in the style of the early 1930s. This story -- with its strange whisperings and buzzings -- demanded sound, so we planned to shoot it as a talkie. But it would still be shot in Mythoscope® and would endeavor to capture the visual tone of the early Universal Pictures horror films like Dracula and Frankenstein. The plan was in place, all we needed was a script.
So, one of us dove in on writing an adaptation, fleshing out Lovecraft's story, tweaking its structure and reshaping it into something that would be satisfying as a movie. In the meantime, the HPL Film Festival was approaching (this is back in 2007). Early that year, we promised our pal, Andrew Migliore -- the creator of the festival -- that we'd have something for him to show. We knew the scene where Wilmarth listens to the recording of the creatures would be in the movie, so it seemed like a good place to start filming a teaser. We gathered our friends Matt Foyer (The Man in The Call of Cthulhu) and David Robertson (our Cinematographer extraordinaire) and a few other helpful friends and we shot a teaser for the movie. It came out pretty good, so we gave it to Andrew to show at the festival and we put it online. We thought it would tide people over as we finished up the shooting script and got ready for production of the actual movie.
If you've never written a feature-length screenplay, it's an arduous process, and it took the better part of a year to get the first draft completed. So the guy who wrote the screenplay gave it to the other guy to read, and he hated it. He didn't want to shoot the script. He decided what he needed to do was to write his own adaptation. So he took the better part of another year and wrote the script the way he wanted it to be. Then he gave his script to the first guy. The first guy didn't like the second script (see, we don't always agree on everything) and knew it wasn't the movie he wanted to make. So, the two fellows then sat down together to hash out a third version of the movie which was negotiated, reworked and jointly beaten into submission. And after a few months of this, and more than 20 full drafts, in April of this year HPLHS Executive Screenwriting Committee had a script they were both happy with. They tested it out with a group of actors and fellow filmmakers, made a couple of last minute changes, and in late April the shooting script was finalized.
A screenplay is the blueprint for a movie, and once it was done, we knew exactly what would be needed in terms of locations, actors, props, special effects, etc... Things needed to be made, found, acquired, borrowed, designed, and rented. And that's what we're doing now. We've got 58 scenes being shot at 14 different physical locations, some in Los Angeles, some in New England. We're working on the designs of Wilmarth's costumes, Akeley's house, and Mi-Go's anatomy. We're lining up our crew, period vehicles, rain machines, and our hellishly bizarre list of props. Friends and artists around the world are working on the movie even now. We're on track to start actually shooting footage at the end of summer. By the end of September, all work with actors should be done and we'll move onto special effects and editing. We're not sure when the movie will be done, but hopefully sometime in this winter.
We haven't told people much about what we're doing. We needed to hash out our internal differences on the story and come up with something that everyone at the HPLHS liked and stood behind. Now that we've got that, we're plunging forward with our typical reckless aplomb. We're still keeping lots of secrets from you as we're hoping to surprise you with some elements of the film. TWiD is a more liberal adaptation of the original story than The Call of Cthulhu was. We needed to make the story longer to make it suitable for a film, and let's face it, unless there's some adaptation, "The Whisperer in Darkness" would largely be a movie about a college professor reading his mail. So, we have some surprises in store for you, but we hope you'll find them in keeping with the source material and our previous Lovecraft adaptations.
So, it's getting serious now. The lawyers are involved. And the bankers. We went and got ourselves a Line Producer. And several boxes of guns.
Making a movie is complicated, and for every cool thing you see onscreen, somewhere there is paperwork that describes it, secures permission to film it, releases it, etc... As we move closer and closer to principal photography, we have are dealing with more and more pieces of paper. We had to drag our lawyer into it all to make sure that we're doing everything right: protecting ourselves and the film from any legal issues which can be avoided.
In order to keep the process of getting ready under control, we hired John Younger, a line producer. Basically his job is to really study the script and how we're planning to shoot the movie. He then figures out everything we'll need in order to do that, and from there he figures out a schedule. Once there's a schedule, we start figuring out how much everything will cost. Once we know what it will cost, then we start securing, making, fabricating, building, painting, borrowing, etc... the 10,000 things we will need to make Whisperer. It's John's job to keep us in line and let us know when we're spending too much time or money. He says, "No, you can't have Cthulhu leaping out of the sea to take down the zeppelin". He knows the zeppelin is borrowed from the National Museum of Lithuania and must be returned in pristine shape for us to get our deposit back.
Now that the legal and financial aspects are coming into focus, we're about to hire on some of the rest of the crew. Those of you who have seen the Call of Cthulhu special features may recognize some faces. And there's plenty of new faces too. Our quest for props continues to grow and we're making friends with lots of people who sell items from the 1930s on eBay. So boxes filled with strange things regularly show up at HPLHS World Headquarters these days.
Pre-production is boldly striding forward. We've hired our second member of the production team. Chris Lackey (whom those of you who have seen the Special Features on The Call of Cthulhu DVD may remember as the guy who fell through the non-euclidean angle into the pit with the cougar) has joined our team once again. He's working with our own Andrew Leman on the very long list of strange and complicated items which need to be created for the production. There's brain cylinders, the black stone of the Mi-Go and things we dare not even tell you about, and our Art Department is hard at work trying to ensure they're all made in time for the cameras to start rolling. We've pulled in extra assistance for a few special items from craftsmen in various corners of the world to help us out with some specialty items. The things they are making look great and it's nice to have the HPLHS studio once again littered with alien technologies and body parts. Well, we often have that kind of stuff around our studio, but there's even more of it now.
We've continued to flesh out the production team. David Robertson, our Director of Photography for The Call of Cthulhu is back and will be providing his keen eye for shooting in black and white to Whisperer. We'll be shooting in HiDef on the Sony F900 camera. It's the same camera we used for shooting the Whisperer teaser. The most recent Star Wars films were shot on the same camera. We've also managed to talk Troy Sterling Nies into joining the Whisperer team. He'll be on-set capturing production sound and then he'll switch to composer mode, creating another lush period symphonic score. We're busy wrangling many more members to join our crew.
We'll start shooting in New England September 22nd. We'll be there a little less than a week and then we return to Los Angeles and shoot through October 17. At that point, we'll be all done with actors and full-sized sets. We'll move on to work with our Miniatures Unit and will film miniature and stop motion sequences through the fall. We'll start editing the movie at this point too, and hopefully sometime around the end of the year we'll have a rough cut of the movie. Then we move into adding music, some special effects and putting polish on it. If all goes well, we'll have Whisperer done in early 2010.
The movie is now cast. The core cast of Whisperer features 19 actors. In the end, well over 5,000 actors submitted for roles. We sifted through all the submissions and called in roughly 100 actors to meet us in person and read from the script. Out of that group of actors, we chose the most experienced and those best suited to the roles. HPLHS fans may recognize a few faces, though there's plenty of new actors on board for the production.
Veteran film, TV and stage actor Barry Lynch will be playing the role of Henry Akeley. Barry's no stranger to HPLHS projects, having performed in The Call of Cthulhu and several episodes of Dark Adventure Radio Theatre. Special effects in the movie required that we make a life cast of Barry's head. Our special effects makeup artist, Dave Snyder, did a full cast of his head and teeth. Dave is a highly experienced professional makeup artist whose work includes (among other things) many of the corpses from HBO's Six Feet Under. From the life cast, Dave then makes a separate positive version of Barry's face which he then sculpts. After he sculpts it... well, we wont tell you exactly what we're up to, but we'll have a version of Henry Akeley that'll look really great and can do things that even Barry Lynch cannot do.
And while the makeup team is toiling away, other teams are hard at work too. We have a scenic designer drawing up the floorplans for the sets. We have our costume designer figuring out what all these people will wear. We have our in-house prop team making all kinds of weird stuff. We have talented friends near and far contributing additional props and artwork to help get everything ready. Leman and Lackey are toiling around the clock, inventing new ways to make things that mankind should not make. The things they are making or so secret, we dare not depict them here. At this point, there are nearly 50 people working on various aspects of the film.
In late August Sean and David Robertson completed the final scouting trip to New England. We looked at all the locations where we'll be shooting, met with everyone we needed to meet, and generally did our best to ensure that everything's ready on the New England side of things when we arrive. We were once again hosted by Mat & Susan Jacobson, who receive the highest HPLHS praise for their hospitality. Mat also earned our admiration for his uncanny ability to remember rural dirt roads which he visited with Sean and Andrew two years ago.
Overall, we were delighted by how friendly and cooperative everyone we met was. We would come up to people and ask if we could film their house. Most people said, "Sure! Would you like to film our barn too?". This is a pleasant change from filming in Los Angeles where such requests are often met by a crusty look, thousands of dollars in location fees, and a demand for a multi-million dollar insurance policy. People were nice to us. We were glad to be there. We're renting to houses to accommodate our cast and crew, and both are situated on lovely properties brimming with rural New England scenery.
One of our key locations is Miskatonic University. We've found a lovely and cooperative New England college where we'll be filming. We think it's got the Miskatonic vibe and its period architecture will look great on-camera. Most of our other New England locations are outdoors, several of which are the actual locations Lovecraft describes in the story. While it's expensive for us to haul all our gear and crew back east, we think it's well worth it to be able to shoot in the legend haunted mountains of Vermont and among the ivy-clad walls of a prestigious New England college.
And while Sean and Dave were traipsing around New England, Andrew, Chris and others were toiling away 100+ degree heat as fires raged not far from our studio. The prop list is daunting for Whisperer and Chris and Andrew continue to work like maniacs to get everything done before the gear truck departs for New England in the middle of September. We've commissioned certain props from several specialists around the globe, and all are hard at work to ensure we make the deadline.
The cast is now fully in place and our Costume Designer, Jessica Dalager, is working on getting everyone fitted. Our makeup artist, Glenn Alfonso, is studying everyone's faces and cutting hair as needed. Andrew Hildner is drafting construction drawings for the Akeley house set - the most complicated of the sets which will be built for the production. Line Producer, John Younger, is working on logistics for vehicles and rented equipment, all while relocating his home from Tennessee to Los Angeles. Sound man, Troy Sterling Nies, is preparing to drive from North Dakota to LA, where he will get out of his car and get into our gear truck and drive it to New England with Production Assistant Amanda Deibert.
1 October 2009 - Location!
OK, we're back from our adventure to New England. In the end, 17 of us made the trip to shoot footage in Massachussetts, Vermont and New Hampshire. Over the course of six days, we shot at numerous outdoor locations to take advantage of access the story's real locations. Where we're not on the story's actual locations, we found first-rate local substitutes. Our hearty cast and crew endured long hours, long car rides, long shoots, and fleeting moments of sleep to capture the exterior footage we shot for Whisperer. We thank them for their suffering. We hope you will too.
As foretold, we shot at Mount Holyoke College in South Hadley, Mass. We thought the college would prove an excellent casting choice for Miskatonic and being there proved us right. We grabbed some great establishing shots of the campus and then shot a scene outside a ladies' dormitory, under the watchful eye of the dorm's residents and a drizzle of rain. We returned later in the week to shoot Miskatonic's main gates and an interior scene in one of the campus' beautifully appointed vintage classrooms.
A couple of the New England shots required background players. We put out the call through various channels and were delighted to find terrific people who heeded our call. We shot with background players at Mount Holyoke College and at the Bellows Falls, VT train station. A group of talented and enthusiastic folks dressed up, turned up and played a great role in the film.
Shooting in New England also involved plenty of work out in the field. And by that, we mean in the rivers, in the woods, and quite literally in the fields. Local folks told us plenty about the wet summer they'd had and how we should expect rain everywhere we went, but in the end we had to resort to making our own rain most of the time. In case any of you have forgotten, our crew can quickly point out that a barrel of water is very heavy. Many cast and crew members will also point out that the temperature of our our artificial rain water was unnaturally cold, especially if you've been drenched in it all night long. And after we're done, the rain rig has to be put away, the actors dried, the costumes packed up and a few scant hours later we have to pull up to the next location.
Most of the crew got back very late on Sunday. Our intrepid road warriors, Troy and Amanda, drove the FungiMobile back across the nation, logging over six thousand miles. We're now set up in Los Angeles, where most of us live, and filming began here today. We shot two indoor scenes today.
After the wilds of New England we were able to set up shop in our rented "sound" studio in Los Angeles. Our schedule has us filming three weeks in Los Angeles before we complete the portion of the film involving actors. Of that three weeks, two days were on locations in Pasadena, but the rest of it was slated to take place in the studio. As of now, we're in the middle of the second week and are bracing ourselves for a final push to the principal photography finish line.
Our very first day of shooting in LA involved a group of background players. These stalwart volunteers came down to the set and met up with our lovely and talented cast members and we shot our first scenes in the studio. All was well, although a very vocal cricket decided to cast itself as an extra. Fortunately our background team seemed to have a knack for frightening it into silence as we shot our takes on the set.
We had an even bigger herd of background players join us for a shoot at Pasadena City College, where we booked a period-appropriate lecture hall. Another group of lovely volunteers donned their period attire and joined us for a fairly long scene in which they got to be an audience attending an event at Miskatonic. They did a super job and spurred our actors on to terrific performances that we hope you will enjoy.
After dealing with the challenges of recording sound on location in New England, we were rather looking forward to the relative ease of recording sound in our own sound stage. Apparently though, where we're shooting, the term sound stage is used to denote extra sound being added to our recording process. Between neighbors who sound like they're running some kind of blacksmith competition, a semi truck repair yard across the way and the fact that the studio sounds like it's on a flight path for the Burbank airport, our sound stage has been anything but quiet. Still, we slog onward through the noise to capture every nuance of sound for our first talkie.
In general, production has gone pretty smoothly for us. Naturally there have been a few minor incidents here and there, but generally, we've had nothing to complain about. Well, that was until we get back from New England. The plan was that our set crew would build out the numerous sets we'd be shooting on in the sound stage, including one particuarly complicated one which we would use for several days of filming. We returned to find that our very complicated set was about a third of the way done. It was over budget and our builders had to leave town. So, we sent them on their way, addressed the fundamental structural flaws in the plans made by our scenic architect and dispatched a new crew to make the place shootable. They've done a bang-up job for us and while we've had to reschedule the sequence of somethings, we're on target to shoot on the big set as intended. Unfortunately, a key prop for the show was also not completed on time. This week we find ourselves having to try and create an important and complicated prop at the last minute. We've rescheduled to buy as much time as we could, but in the end, some serious last-minute prop work will be required by the lovely and tireless (don't get me wrong here, they're tired) Art Dept. crew.
This year we had to miss a favorite annual event: the HP Lovecraft Film Festival in Portland, Oregon. We were shooting and could not go. However, we were able to participate in a call-in discussion held at the festival where people in the audience could ask us questions about the production while we were actually on set shooting the movie. We were glad to be involved in the festival and appreciated the enthusiasm of the Lovecraft community for Whisperer.
So, another chapter in the making of The Whisperer in Darkness is now complete. We have finished shooting in studio. Don't start bouncing up and down just yet though, we still have two sequences involving actors to shoot, plus plenty of miniatures, models and effects shots. We're not done by any stretch of the imagination. But we have surpassed another major milestone in finishing up our studio work.
Shooting in the studio proved every bit as challenging as shooting on location. We had plenty of noise issues, but we also had the constant need to prep (design, build, paint, dress) every location in the studio, which meant wrangling plants, furniture, hay, rain (lots and lots of rain), animals, fog, actors and much more. Our stalwart crew was tough and resilient and we somehow managed to work our way through our most challenging difficulties and get the footage we needed. Hours were long, but no one cracked under the pressure.
We did have to shuffle our schedule some, we did run hideously over budget to get things done in time, but we now find ourselves quite close to being done with principal photography. The screenplay is 94 pages long. Out of that, about six pages remain to be shot. So we are indeed getting there.
We felt bad for our star, Matt Foyer, as we sprayed water at him for a week in New England. None of us - particularly not Matt - quite realized how much water would be flying indoors though as we returned to the studio. We setup our rain making equipment and day after day, it rained on Professor Wilmarth. Some days we dumped other things on his head too, but mostly it was lots of cold water. We really appreciate how tough Matt was in putting up with all of our precipitation. We also applaud many of the other performers in the film who endured extensive man-made precipitation. We really need to find the guys to wrote this and dunk them in a tank of very cold water.
5 March 2010 - No, Seriously, What Are You People Doing?
In the middle of shooting the movie we also had to find a new home for the HPLHS. We very happily shared space with Nick Offerman at his wood shop here in Los Angeles ever since we built sets there for The Call of Cthulhu, but after a few years everyone realized that both operations had grown too big to continue to be roommates. At Nick's gentle suggestion we looked for a new place, and HPLHS took up residence in a former rivet factory a couple of miles down the road. It's taken us a while to get the new HPLHS world headquarters up and running and fully functional. But we've done that now and the HPLHS is better than ever. And we're driving forward with everyone's favorite mi-go movie. So, what's going on, you ask?
The backbone of the project is now the rough cut of the movie. It shows us what we've got, what we don't have and what we need to work on. It shows us pretty clearly the things we need to do in order to get from where we are to completion of the movie. Sound is another key element that requires our attention. Our composer, Troy Sterling Nies, has his copy of the rough cut and he's batting around ideas for how to approach the picture in terms of music. In addition to the score, we also will need to do some audio work in terms of foley and looping. We have some scenes which we shot without sound for a variety of reasons. So now we need to go back and add footsteps and other sound effects to the soundless scenes. We also have a couple of scenes where the audio we captured isn't quite up to snuff. This happened most frequently in scenes in the rain where raindrops on the microphones wreak havoc with the audio. So, we'll bring the actors back in and have them try and match their original performances as we re-record a few bits of the film. Oh for the days when we were making silent movies....The last key missing ingredient is visual effects. In order to get these done, we have to look at the live action footage and use it as a template for shots where we'll integrate special effects, models or miniatures. Right now the big push is to get things ready for the live action shots in late March, but April will be all about miniatures and models. Fortunately, the new HPLHS studio space has room dedicated for exactly these purposes and we'll be able to build and shoot right here in our own digs.
28 March 2010 - And...Action!
So we shot again this weekend. We wrangled some cast members, background players, crew, locations, gear, and vehicles and shot some of the scenes we still need coverage for. Friday was a fairly easy night of shooting elements for composite shots at the new HPLHS studio. Saturday was a little more involved, as we shot at night at an outdoor location in the Hollywood hills with several large vehicles and a total group of around 30 people. We had a good shoot and got some beautiful footage of key moments in the film. Our cast members continued to endure exterior rain shots and our background team were excellent sports about letting us dump water on them too. We were very pleased that the representative for Los Angeles County who was on set to supervise the shoot turned out to be a big Lovecraft fan and was really excited we were shooting Whisperer while on his watch.
It looks like we'll still have two more days of shooting - one night of exteriors and one day of interiors - which we'll try to knock off in late April. Once we get those, we'll be done with shooting the cast and will be working on visual effects, sound effects, mixing, editing and the musical score.
At this point, we're prepping for shooting this weekend what should be the final scenes involving cast members. We have a few setups we weren't able to get to due to time constraints on our March filming session. So, we'll be doing one night of exterior pickup shots and one night of interior pickup shots. Once we have those, Wilmarth and Walter Brown can retire their costumes as their shooting will be done. No more makeup, no more wardrobe. This will be our last chance to make it rain copiously on Matt Foyer.
What else has been going on? Dave edited the footage we shot in March into the rough cut. We've started work on a few of the visual effects. Troy's started working on the score and we're cataloging all of the sound effects and foley work that will be needed, plus the few lines of dialogue that will need to be re-recorded for various reasons. Completion of the live action shooting will allow Andrew to move forward with construction of some of the miniatures that will be incorporated into the picture. As suggested in the trailer, we're gunning for having the film complete by October.
20 June 2010 - What's up?
Our miniature crew of Jason, Fred and Andrew have been working away building a variety of beautiful and small things which you'll see in various places throughout the film. Super-sculptor Dave Snyder is back with us again, creating another very special scary prop. Troy had some serious computer hardware problems, but he's back up and running and composing away on the score. Sean's sound effect work is mostly done and he's adding some polish to the sound design (after all, our fungi need to sound just right). Speaking of fungi, we've added some team members who are working specifically on some of the more fungoid parts of the film. In the spirit of keeping surprises, we won't say much more on that topic now. Dan Novy has signed on to help us with a couple of small but very tricky visual effects shots. Dave's been polishing some of the visual effects and we're getting ready to make our last round of decisions about the edit of the picture. So, you see, we have been hard at work and expect to remain so throughout the summer. But we are getting closer to being done and are happy with the progress we're making.
Yesterday we decided to try out a new camera and lens provided to us by the fine folks at Moviola (the Hollywood production equipment company from which we rent things like our camera, lenses, jibs, etc...). We were shooting some of our miniatures and the small form factor and excellent lenses of this new camera seemed like a perfect fit. But alas, our experiments yielded images which showed that our miniatures were going to work well, but this camera would not. Its image fidelity was not good enough, particularly when cut in with the existing footage from our beloved Sony F900. So, we'll toss this test footage, rent the Sony again, and re-shoot the miniatures. We knew this would be an experiment and we were glad to discover this solution was not the right one for us after only a few hours of shooting.
One of the interesting developments in making this movie is that we started running low on funds. Several aspects of production went horrifically over budget, but we were able to limp by for a while. But making it to the end of production was looking like it would be difficult without the infusion of more capital. To our tremendous delight and gratitude, Sandy Petersen decided to put up some capital to help us finish the picture. We were thrilled to get an investment of funds, but we were especially thrilled that they should come from a person of key import in the modern day Cthulhu Mythos and someone whose work proved to be a big inspiration to the HPLHS. For those of you who don't know, Sandy was the original author of Chaosium's role playing game Call of Cthulhu® some 25 years ago. It was through playing that most execellent game that we eventually found ourselves staging Cthulhu Lives! games which in turn gave birth to the HPLHS. So, if you see Sandy, thank him for his key role in helping to complete Whisperer.
See, we told you we'd be better about web updates. At the moment, one of our priorities is to lock down the edit. Troy is trying to compose a score to match the picture, and if we add a few seconds here, take out a few seconds there, and move this scene over here, it makes his life a nightmare. So, we watched the movie last week, hoping to make a few final determinations about how some scenes will be cut. We're evaluating options, negotiating and filibustering, but we should have the picture's edit locked down within a week or so. We don't actually watch the movie in sequence very often - instead we're usually working on a scene on sequence at a time. Everyone took notes (including line producer, John Younger - welcome back, John), about the current edit and things that still need attention. There's plenty of those.
Among the miniatures being built by Andrew and our modelers is the Round Mountain miniature. In one sense, it is the smallest miniature being built for the movie, at roughly 1:30 scale. But in terms of actual size, it's pretty damned big (roughly 12x16 feet). It features thousands of tiny handmade trees, individually placed by Fred Manchento, Jason Voss, and Andrew. Surviving fragments of the miniature are now at the Main Street Museum in White River Junction, Vermont.
There's many other miniatures, not the least of which is Andrew's barn. It is a scale replica of an actual barn at a property where we shot footage in southern New Hampshire. The outside of the barn had to be built to match footage of the existing property, but the inside of the barn was built to so that we could photograph it from within. What you see in the photo is the barn before it was finished, but it now has a nice roof and cupola, and on the inside there's ladders and scale hay bales.
We continue to move forward on all aspects of production. While Andrew and Fred and Jason continue to build miniatures in anticipation of the last round of shooting, Dave and Sean are concentrating on other kinds of visual effects and details, adding sound effects, compositing some miniatures into live-action plates, and basically hand-tweaking virtually every frame of the movie.
Wow, what a month it's been here at HPLHS World Headquarters. We shot again on August 27 and 28 and finally wrapped all photography on the film. No more cameras, no more lights. No more renting a deck to digitize footage. Farewell to the jib and the kinos. This round of photography was all about miniatures. We shot the Round Mountain miniature and returned to a few other setups where the footage we shot the first time around wasn't quite perfect. But this time around we got the footage we were after and were finally able to put the camera away for good.
So why aren't we done, you ask? The new footage had to be captured and cut into the picture. We also have some very special special effects shots which are being done by some of our colleagues. They're not quite done with their work yet, and the movie wouldn't be complete without it. But as they finish up each shot, they send it to us and we cut it on. These effects shots are looking great and we'll be able to tell you more about them soon. So we're finishing off the last work we have on the visuals, doing a preliminary audio mix. When that's done, we'll test the movie on a few close friends, see what they have to say, make any last minute changes, and then burn a couple of DVD screeners.
We're under deadlines to send the first screeners of the film off to some film festivals in late September. The version of the movie we send them wont be in its final state, but hopefully it'll be in good enough shape to warrant the possible inclusion of Whisperer in these important film festivals. The version of the movie we'll send on these screeners won't have our final score (it's still in the process of being composed) and the audio won't be mixed. We may continue to polish the visuals this fall until they are just right. But the movie will be pretty darned done.
Post. That's where we are. We're adding chunks of music as Troy finishes them and sends them to us. He's forecasting completing the score in late November and that gives us then December to make final adjustments and to have the full professional audio mix of the movie done. Then we'll be ready to show it to someone. Once we get a final version of the film completed, we'll finally have a screening for the cast and crew - virtually no one from the production has seen the current version of the film.
We've submitted a cut of the movie to about half a dozen film festivals. We made a screener with a temporary score made mostly from music Troy composed for us on other projects. We send it off to them and then wait and hope for the best. We should start to hear back from the first of them in December.
The glamours bits of filmmaking with lights and actors are well behind us now. At this point it our work is divided into two main categories: work to complete the movie itself and work on the movie's future.
In terms of the picture, we've been tidying up a few details - and we added one additional rotoscoped shot. We looked at the picture again and tried an alternative edit in two scenes which we were all happy with. It cut about a minute out of the film, but we think it's the better for the trim. Just before Thanksgiving we finally locked the picture's timing. That means we will not add any extra time in nor take any out. This is important as Troy is scoring the movie and it's a real headache for him when he writes a sequence of music to match the picture then we suddenly make the picture longer or shorter. Speaking of Troy, he's about 90% done with composition and we've been delighted with what he's done. We've engaged the services of Erin Rettig as our Re-Recording Mixer. He'll be blending all of the audio, setting the volumes of the many tracks of sound and then outputting it for 5.1 surround and stereo mixes. His work should be done around the end of the year. And when he's done, the movie's done.
OK, folks, we're getting pretty close. Completion of Whisperer is now scheduled for February 16. Woohoo! We're closer than ever to figuring out how the movie will be distributed and are doing our utmost to help make it so as many of you as possible will be able to see it before long.
We've talked here some about the process of mixing. Last night we met with our Production Audio Mixer, Erin Rettig, in a mixing room on the Fox studios lot here in LA. If you've ever seen pictures of this kind of work being done, the film is projected up on a large screen, and the mixer uses a board with 10,000 knobs on it to tell a computer what to do with each and every bit of sound in the movie. We're pleased to tell you that Whisperer has never sounded better than it did while being played through this fantasically high-end audio system.
We're making a couple of last minute adjustments and changes to the picture. One fun detail is that the camera we used on a few days of shooting had a dead pixel on the CCD. What that means is that each frame of the movie consists of exactly 2,073,600 pixels of information. And exactly one pixel in every frame shot on those days is dead. So we have to go back to every frame (and there's 23.97 frames in every second) and repair the dead pixel. This is why we are so glad there are powerful computers and great pieces of software to do this kind of thing.
Now that completion of the movie is nigh, we'll be back in touch with our team of translators to do some final adjustments to the translations to ensure they match the picture. Production of the DVD and BluRay is next on the agenda.
At last - 2011 - the year The Whisperer in Darkness finally comes out. At the moment, all that really remains is audio work. Troy is revising some of the sound cues and adding in a few we never had in the first place. Erin has all of the audio tracks and is working away on the final production mix. When we get the last of the audio files, we'll whisk them over to him. He'll mix those down and then output the final version of the audio.
Yes, that remains the big question. We submitted Whisperer to a few film festivals last fall and those are starting to come around. At the moment, TWID is slated to screen in March and April at SFF-Rated in Athens Greece, the Belfast Film Festival in Northern Ireland, the Imagine Film Festival in the Netherlands. There's a number of additional fests that we haven't heard back from, so we keep a watch on it day to day. We haven't yet scheduled a US premiere - which is not at all surprising as we don't yet have a final version of the movie - even the cast and crew haven't seen it yet. But we anticipate holding a screening for our gang in February. We have committed to screening it at the HP Lovecraft Film Festival. Historically, this festival has been held in Portland, Oregon. This year though, it's in San Pedro, California mid-September. As that's in the Los Angeles area, we're thinking we'll get as many of our team members involved as possible and make the event quite a Lovecraftian to-do!
As the movie is finally completed, we'll begin work on prepping the DVD and BluRay version of the film for release later in the year. As we learned with The Call of Cthulhu, making a DVD is quite a labor intensive process. We'll edit the behind-the-scenes footage, shoot some interviews, design menus and dive in on all the prep that goes into making a DVD. We don't know when it will become commercially available, but it's unlikely that would be before this summer. The good news is that it's equally unlikely that it will be later than this summer. We'll keep you posted.
And it's done. Really. Finished.
What does that mean? It means the final audio has been completed, screeners have been made of the movie in its final form. It means tomorrow we'll be having a screening for the cast and crew. It mean's we're not reworking the content of the movie in a significant way. Now we're putting it on different media - we burned our first BluRay this week - and testing it on different audio and video systems. So far the results have been pleasing. The HD image holds up very well on BluRay, and the Dolby Surround Sound sounds great when you play a DVD or BluRay back in an environment with the right hardware.
Now that we're done making the movie, we begin nursing it through the next phase of its life. We have begun screening at festivals and are working hard to line up additional screenings worldwide throughout the year. We're working on the other items that go on the DVD or BluRay in addition to the movie: special features and subtitled translations. And we're working on some poster designs to help promote the film.
In March the movie finally had its public premiere at the SFF-Rated Film Festival in Athens, Greece. The folks there were incredibly hospitable and Whisperer screened at a pair of sold-out showings. The film was very well received and they even sent us home with their Audience Award for Best Director. We thank Alecos Papadopolous and his team for providing an outstanding premiere. Click for photo of a real Mythos sighting in Athens.
April 1 we screened at the Belfast Int'l Film Festival in Northern Ireland (click for photo of venue). A good crowd turned out at Belfast's Waterfront Hall to see Whisperer along with AM1200 and Die Farbe - a new German adaptation of The Colour Out of Space. We had a lively Q&A following the screening - we offer our gratitude to Andy Thomas, the crew at the Waterfront and the rest of the Belfast FF team.
Many translations of the film are now complete and the final translations then need to be matched up with timecoded subtitles that will match the actors performance. There are 904 subtitles in the movie. There's about 25 languages. There's a lot of work in managing subtitles, especially when we can't read Hungarian.
In addition to the festivals where we've been screening, we've got more lined up across the globe. This weekend Whisperer will also screen at the Berkshire International Film Festival in Pittsfield, Massachusetts (Mi-Go country!), and mid June we'll screen at the Southside Film Festival in Pennsylvania. Things turn international again in July with screenings at Fantasia in Montreál, Canada; Fantaspoa in Porto Alegre, Brazil; PiFan in Puchon, Korea; and RioFan in Rio de Janero, Brazil. We have more festivals later in the year in Warsaw, Reno, Buffalo, and of course the HP Lovecraft Film Festival. We anticipate adding more festivals to the lineup; most of them dont notify films until roughly 8 weeks before the festival, so if you're wondering if we're coming to your neighborhood, our answer at the moment is we really don't know.
Beyond festival life though, we continue to work on the assets for the DVD. Prepping a DVD is actually a pretty involved process. For the special features, we have to find, digitize and organize all of our Behind the Scenes footage and photos (and there are several thousand photographs from the making of this film). The we have to to schedule interviews, shoot them and edit the whole mess in an effort to make something that should be fun to watch. So we're working on that.
The DVD also has its many languages. The HPLHS Volunteer Translator Corps has done a great job of rendering the final text of the film into a translation. We then take that translation and break it into timecoded phrases which we then synchronize to the actors' performances. As some sentences require many more words when translated (I'm talking to you, Finnish), each language is a sort of a jigsaw puzzle with 1,100 or so pieces. We are getting there though.
Onward, ever onward. Whisperer finally had its US Premiere at the Seattle Int'l Film Festival. David Robertson, Andrew Leman and Sean Branney were there and had a great time at the festival. The crowds were big and enthusiastic and the SIFF team did a great job organizing the event. We followed the SIFF screening others in Massachusetts and Pennsylvania. July has several more and we continue to line up screenings all over the world for the rest of the year. | 2019-04-22T22:25:09Z | http://hplhs.org/mptwid.php |
本发明涉及包含嵌入相和基质相的复合非织造纤维网,嵌入相具有形成基本上连续的三维网的一组颗粒,基质相包含围绕颗粒形成三维网的一组纤维。 The present invention relates to a composite comprising a nonwoven fibrous web embedded phase and the matrix phase, embedded in a substantially continuous phase is formed having a set of three-dimensional network of particles, the matrix phase comprising a group of fibers is formed around a three-dimensional network of particles. 本发明也涉及制备复合非织造纤维网的方法,该方法包括:形成嵌入相,嵌入相具有基本上连续的三维网中的一组颗粒;和形成基质相,基质相包含围绕颗粒形成三维网的一组纤维。 The present invention also relates to a method of making a composite nonwoven fibrous web, the method comprising: forming an embedded phase, fitted with a set of particles having a substantially continuous three-dimensional network; and a matrix phase is formed, the matrix phase comprising a three-dimensional network is formed around the particles a group of fibers. 本发明也公开了由根据上述方法制备的复合非织造纤维网制成的制品。 The present invention also discloses an article of composite nonwoven fibrous web prepared according to the method described above is made. 在示例性实施例中,该制品可以包括气体过滤制品、液体过滤制品、吸声制品、表面清洁制品、细胞生长支承制品、药物递送制品、个人卫生制品和伤口敷料制品。 In an exemplary embodiment, the article may include a gas filtration article, a liquid filtration article, a sound absorption article, a surface cleaning article, a cellular growth support article, a drug delivery article, a personal hygiene article, and a wound dressing article.
本申请要求于2007年12月31日提交的美国临时专利申请No. 61/017,842的优先权,该专利的公开内容全文以引用方式并入本文。 This application claims priority to US provisional patent on December 31, 2007 filed Application No. 61 / 017,842, the disclosure of which is incorporated by reference herein.
本发明涉及具有至少一种连续颗粒相的非织造纤维网以及制备和使用这种网的方法。 The present invention relates to a nonwoven fibrous web, and methods of making and using such a continuous web of at least one particulate phase. 本发明还涉及可用在吸收制品中的复合非织造纤维网,该复合非织造纤维网包含亚微米纤维和/或微纤维。 The present invention further relates to composite nonwoven fibrous web can be used in the absorbent article, the composite nonwoven fibrous web comprises sub-micrometer fibers and / or microfibers.
非织造纤维网已用于制备吸收制品,这些吸收制品可用作例如用于表面清洁的吸收擦拭物、用于过滤介质的气体和/或液体吸收剂和用于吸声和/或吸热的屏蔽材料。 The nonwoven webs have been used to prepare absorbent articles, such absorbent articles useful, for example for cleaning the surface of the absorbent wipes, filter media for gas and / or liquid absorbent for absorbing and / or absorbing heat shielding material. 在要求吸收性高的一些应用中,可能有利的是使用由表面积大的细小纤维形成的孔隙度高的非织造料片。 In some applications of high absorbency requirements, it may be advantageous to use a nonwoven web formed by a high porosity high surface area fines. 对于某些气体或液体过滤应用,也可能有利的是将细小吸附剂颗粒掺入由细小非织造纤维形成的料片中。 For certain gas or liquid filtration applications, it may be advantageous for the fine sorbent particles in the tablet is formed by the incorporation of fine nonwoven. 然而,细小纤维在处理时具有伸缩或压碎的趋势,从而减小可用于吸收的孔隙度和/或表面积,同时增加液体穿过非织造制品的压降。 However, the fine fibers have a tendency to flex or crush in handling, thereby decreasing the porosity and / or surface area available for absorption, while increasing the fluid pressure drop across the nonwoven article. 特别是对于气体和液体过滤应用,可能有利的是甚至在保持高吸收性的同时保持穿过非织造制品的低压降。 Particularly for gas and liquid filtration applications, it may be advantageous even while maintaining high absorbency holding a low pressure drop through the nonwoven article.
仍然存在提供紧凑型液体过滤系统(例如家用滤水系统)的需求。 still exists to provide a compact liquid filtration system (e.g. home water treatment systems) requirements. 也希望使在形成液体过滤制品的处理期间可用作过滤介质的非织造纤维网的劣化或对其造成的损坏最小化。 Also desirable to deterioration of the nonwoven web during the process of forming a liquid filtration article may be used as a filter medium or causing damage thereto is minimized. 也需要提供这样的液体过滤制品,这种制品具有主动吸收和/或吸附颗粒的高负载,而不增加整个水过滤系统上的压降。 Also a need to provide a liquid filtration article, which absorbent article has active and / or highly loaded adsorbent particles, without increasing the overall pressure drop across the water filtration system. 也有利的是,提供这样的颗粒加载的非织造纤维网,这种非织造纤维网有效地将颗粒保持在纤维基质内,从而预防颗粒释放到渗透液体中。 It is also advantageous to provide such a nonwoven web loaded particles, which nonwoven web is effective to keep the particles within the fiber matrix, thereby preventing release of particles into the liquid permeate. 另外,一直需要提供使用寿命和过滤有效性得到改进的液体过滤制品。 In addition, a continuing need to provide improved service life and filtration effectiveness of liquid filtration products.
在一个方面,本发明涉及包含嵌入相和基质相的复合非织造纤维网,所述嵌入相还包含形成基本上连续的三维网的一组颗粒,所述基质相包含围绕颗粒形成三维网的一组纤维。 In one aspect, the present invention relates to a composite comprising a nonwoven fibrous web embedded phase and the matrix phase, the embedded phase further comprises a set of forming a substantially continuous three-dimensional network of particles, comprising a matrix phase surrounding the particles form a three dimensional a group of the web.
在另一方面,本发明涉及制备包含嵌入相和基质相的复合非织造纤维网的方法,所述嵌入相具有基本上连续的三维网中的一组颗粒,所述基质相包含围绕颗粒形成三维网的一组纤维。 In another aspect, the present invention relates to a method of making a composite nonwoven fibrous web embedded phase and the matrix phase, said set of embedded phase of particles having a substantially continuous three-dimensional network in said matrix phase comprising about particles form three-dimensional network of a group of fibers.
在额外的方面,本发明涉及由根据上述方法制备的复合非织造纤维网制备的制品。 In an additional aspect, the present invention relates to articles made from a composite nonwoven fibrous web prepared according to the method described above. 在示例性实施例中,所述制品选自气体过滤制品、液体过滤制品、吸声制品、表面清洁制品、细胞生长支承制品、药物递送制品、个人卫生制品和伤口敷料制品。 In an exemplary embodiment, the article is selected from a gas filtration article, a liquid filtration article, a sound absorption article, a surface cleaning article, a cellular growth support article, a drug delivery article, a personal hygiene article, and a wound dressing article.
根据本发明的复合非织造纤维网的示例性实施例可以具有使其能够在多种应用中使用的结构特征;可以具有优越的吸收性和/或吸附性;当用作液体过滤介质时,可以显示具有高孔隙度、高流体渗透性和/或低压降;并且可以以高性价比和有效的方式进行制备。 it may have a variety of applications can be used in the structural characteristics according to an exemplary embodiment of the present invention, the composite nonwoven fibrous web; may have superior absorbency and / or adsorbent; when used as a liquid filter medium It may be displayed with a high porosity, high fluid permeability and / or low pressure drop; and may be prepared in a cost effective and efficient manner.
对本发明的示例性实施例的各个方面和优点进行了汇总。 Various aspects and advantages of the exemplary embodiments of the present invention are summarized. 上述发明内容并非意图描述本发明呈现的某些示例性实施例的每一个图示实施例或每种实施方式。 The above summary is not intended to describe each illustrated embodiment of the certain exemplary embodiments of the present invention is presented embodiment or every implementation of the embodiment. 附图和具体实施方式更具体地举例说明了使用本文所公开的原理的某些优选实施例。 The drawings and the detailed description more particularly exemplify some of the principles disclosed herein using preferred embodiments.
图4为用于形成根据本发明的另外的示例性实施例的包含基本上连续颗粒相的复合非织造纤维网的示例性设备的整体示意图。 FIG. 4 is a schematic diagram of an exemplary apparatus integrally comprising a composite nonwoven fibrous web substantially continuous particulate phase of a further exemplary embodiment of the present invention is formed.
“微纤维”意指中值直径为至少一微米的纤维。 "microfibers" means a median diameter of at least one micron.
“亚微米纤维”意指中值直径小于一微米的纤维。 "Sub-micrometer fibers" is meant a median fiber diameter of less than one micron.
当本文中提及某一特定种类的微纤维批、组、阵列时,如“亚微米微纤维阵列”时,其意指该阵列中的微纤维的完整组,或单个的微纤维批的完整组,而不仅仅是指属于亚微米尺寸的阵列或批中的一部分。 When When referred to herein microfibers batch of a particular kind of the group, when the array, such as "sub-micrometer fiber array," it means the complete population of microfibers in that array, or a single microfibrils batch is complete, and not only that portion of the array or batch belongs to the submicron size.
“连续取向的微纤维”意指从模具放出并通过处理工位移动的基本上连续的纤维,纤维在处理工位中被永久性地拉伸且纤维内聚合物分子的至少部分被永久性地取向成与纤维的纵向轴线准直(相对于纤维使用的“取向的”意指纤维聚合物分子的至少部分沿着纤维的纵向轴线准直)。 "Continuous oriented microfibers" means issuing from a die and substantially continuous fibers, the fibers are permanently stretched in the processing station by a mobile processing station and at least partially within the fiber polymer molecule is permanently oriented with the longitudinal axis of the collimated fibers (vs. "oriented" means fibers used fiber polymer molecules along the fiber at least a portion of the longitudinal axis of the collimator).
“熔喷纤维”意指通过将熔化的成纤材料穿过模具中的喷丝孔挤出进入高速气体流而制备的纤维,挤出的材料在该气体流中首先被拉细,然后硬化成一团纤维。 "meltblown fibers" means by molten fiber-forming material through orifices in a die into the extruded fiber prepared by the high velocity gas stream, the extruded material is first attenuated gas flow, then hardened into a ball fiber.
“单独制备的微纤维”意指从微微纤维成形设备(如模具)制备的微纤维流,该设备被布置为微纤维流初始与较大尺寸的微纤维流在空间上分隔(如在约I英寸(25mm)或更大的距离上),但在移动行程中与之合并以及分散到其中。 "separately prepared microfibers" means slightly from fiber forming apparatus (mold) prepared microfiber stream, the apparatus is initially arranged as a stream of microfibers and larger size of the microfiber stream separated (as in space about I inch on the (25mm) or greater distance), but the stroke movement combined therewith and dispersed therein.
“非织造网”意指以纤维缠结或点粘结为特征的纤维网。 "nonwoven web" means a fiber entanglement or point bonding characterized web.
“自支承”意指纤维网具有足够的抱合力和强度,以便在基本上不会被撕裂或破裂的情况下适于悬挂和可处理。 "self-supporting" means a web having sufficient coherency and strength to the suspension and may be adapted to process without substantial tearing or rupture.
根据IOcmX IOcm网样品的重量计算“网基重”。 Calculation "web basis weight" The weight IOcmX IOcm web sample.
在施加压力为150Pa的条件下,使用具有尺寸为5cmX 12. 5cm的测试仪管脚的厚度测试计在IOcmX IOcm的网样品上测量“网厚度”。 under conditions of applied pressure of 150Pa, having a size of tester pins 5cmX 12. 5cm thickness tester on the web sample measured IOcmX IOcm "thickness of the web."
“堆密度”是取自文献的构成网的聚合物或共混聚合物的堆密度。 "Bulk density" is taken from the bulk density of the polymer or polymer blend constituting the web document.
“分子相同聚合物”意指具有基本相同的重复分子单元的聚合物,但其在分子量、制备方法、商业形式等等方面可以不相同。 "same polymer molecule" is meant a polymer having essentially the same repeating molecular unit, but which may differ in molecular weight, method, etc., business forms.
“熔喷”和“熔喷工艺”意指通过下列方式形成非织造网的方法:将纤维形成材料穿过多个喷丝孔挤出以形成原丝,同时使原丝和空气或其他细化用流体接触以将原丝细化成纤维,随后收集细化纤维层。 "meltblown" and "meltblown process" is meant a nonwoven web formed by the following manner: The fiber-forming material is extruded through a spinneret orifice to form a plurality of filaments, while the filaments and air or other thinning fluid to attenuate the filaments into contact with the fiber, refined fiber layer subsequently collected.
“将原丝细化为纤维”意指将一段原丝转变成长度更长且直径更小的一段。 "attenuate the filaments into fibers" means a period of transition to a length of filaments longer and smaller diameter section.
“纺粘法”和“纺粘加工”意指通过下列方式形成非织造纤维网的方法:将粘度低的熔体穿过多个喷丝孔挤出以形成原丝,用空气或其他流体将原丝骤冷,以硬化至少原丝的表面,将至少部分硬化的原丝与空气或其他流体接触,以将原丝细化成纤维,并收集以及任选地压延细化纤维层。 "spunbonding" and "spun bond process" method means a nonwoven web formed by the following manner: a low viscosity melt through a plurality of spinneret holes to form filaments extruded, with air or other fluid quenching the filaments, at least at the surface hardening of the filaments, the filaments at least partially hardened with air or other fluid contact, in order to attenuate the filaments into fibers and collecting and optionally calendering layer of the attenuated fibers.
“纺粘纤维”意指利用纺粘方法制成的纤维。 "spunbond fibers" refers to fibers made using the spunbond process. 这种纤维一般是连续的且充分缠结或点粘结的,因此,通常不能从一团这种纤维中取出一根完整的纺粘纤维。 Such fibers are generally continuous and are entangled or point bonded sufficiently, thus, generally can not remove one complete spun bond fiber from a mass of such fibers.
“模具”意指在聚合物熔化处理和纤维挤出处理中使用的处理组件,包括(但不限于)熔喷和纺粘处理。 "mold" means melt processing and fiber extrusion processing components used in the process, including (but not limited to) polymer meltblown and spunbond process.
“粒子”和“颗粒”基本上可交换使用。 "particles" and "particulate" are used interchangeably substantially. 一般来讲,粒子或颗粒意指细碎形式的材料的不同小块或各个部分。 In general, different pieces or parts of the means in the form of finely divided particles or particulate material. 然而,颗粒也可以包括细碎形式的相关或群聚在一起的单独粒子的集合。 However, finely divided form may also include a collection of individual particles associated or clustered together particles. 因此,本发明的某些示例性实施例中所使用的单独粒子可以聚集、物理地互相结合、静电地相关或者说是相关以形成颗粒。 Thus, certain exemplary embodiments of single particles used in the present invention may be aggregated, physically intermesh, electro-statically associate or that associate to form particulates. 在某些实例中,可有意形成单独粒子团形式的颗粒,例如在美国专利No. 5,332,426 (Tang等人)中所述的那些。 In certain instances, the group may be intentionally formed in the form of particles of single particles, such as those described in U.S. Pat. No. 5,332,426 (Tang et al.) Those.
“粒子加载的熔喷介质”或“复合非织造纤维网”意指具有开放式结构的缠结的纤维整体的非织造网,例如亚微米纤维,任选地为微纤维,该非织造纤维网包含在纤维当中被结合的粒子,该粒子任选地为吸收剂和/或吸附剂。 The entire fiber nonwoven web "particle-loaded meltblown media" or "composite nonwoven fibrous web" means an open-structured entangled, for example, sub-micrometer fibers, optionally microfibers, the non nonwoven web comprises fibers which are incorporated in the particles, which particles optionally be absorbent and / or adsorbent.
“被结合”意指粒子分布且物理地保持在网的纤维中。 "incorporated" means that the particle distribution and physically held in the web. 一般来讲,沿着纤维和粒子存在点接触和线接触,从而粒子的几乎整个表面积可与流体交互。 Generally, there is point contact and line contact along the fibers and particles, so that substantially the entire surface area of the particles can interact with the fluid.
“自生粘结”意指在烘箱或通风粘结器中,在未施加例如点粘结或压延的固体接触压力的条件下而获得的高温下的纤维间的粘结。 The bonding between fibers at an elevated temperature "autogenous bonding" means bonding ventilated oven or vessel, at point-bonding or calendering of solid contact pressure is not applied, for example, obtained. “压延”意指使产品(例如聚合物吸收剂加载的网)穿过辊以获得压缩材料的工艺。 "calendering" means that the product (e.g., a polymer absorbent loaded web) to pass through the process to obtain a roll of compressed material. 可任选地是,可以对辊进行加热。 Optionally, the rolls may be heated.
“致密化”意指下述处理,通过该处理,在沉积之前或之后,对直接或间接沉积到过滤器卷绕心轴或轴柄上的纤维进行压缩,并通过设计或作为处理形成过滤器或形成的过滤器的一些方法的人为结果使得这些纤维整体或局部形成孔隙度低的区域。 "densified" means a process before or after deposition, deposited directly or indirectly to the filter winding arbor or fibers on the mandrel by the compression process, and by design or as a processing Some methods artifact of the filter or filters are formed such that the fibers formed totally or partially formed of a low porosity region. 致密化也包括压延网的处理。 Densifying calendering process also includes network.
“流体处理单元”或“流体过滤系统”意指包含过滤介质的系统和将原始流体(例如未处理过的水)与处理过的流体分离的方法。 "fluid treatment unit" or "fluid filtration system" means a system comprising a filter medium and the original fluid (e.g. water untreated) method of separating the treated fluid. 这通常包括用于过滤元件和出口的过滤器壳体,以使处理过的流体以合适的方式离开过滤器壳体。 This typically includes a filter element and the outlet of the filter housing, so that the treated fluid in a suitable manner away from the filter housing.
“空隙体积”意指多孔主体(例如过滤器)内未填充空间的百分比或分数值,该百分比或分数值通过测量过滤器的重量和体积、然后将过滤器重量与该相同体积的相同组分材料的实体的理论重量进行比较来计算。 "void volume" means a percentage or fractional value of the porous body unfilled space within (e.g., filter), the percentage or fraction value obtained by measuring the weight and volume of the filter, and the filter weight with the same volume theoretical weight of the same component material entity comparing calculated. “孔隙度”意指材料中的空隙空间的测量。 Measurement "porosity" means the void space in the material. 孔和空隙的尺寸、频率、数量和/或互连性影响材料的孔隙度。 Size of the holes and voids, the frequency, number, and / or affect the porosity of the material interconnectivity.
“层”意指两个主表面之间形成的单层。 "Layer" means a single stratum formed between two major surfaces. 层可以在单个网内以内部方式存在,如具有限定网厚度的第一主表面和第二主表面的单个网中形成有多层的单层。 Layer may exist internally within a single web, such as a single layer having a single web thickness of the web defining a first major surface and a second main surface formed with a plurality of layers. 层也可以存在于包含多个纤维网的复合制品中,如当具有限定网厚度的第一主表面和第二主表面的第一网被具有限定第二网厚度的第一主表面和第二主表面的第二网覆盖或垫起时(在这种情况下,第一网和第二网中的每一个均形成至少一层)第一网中的单层。 Layer may also exist in a composite article comprising a plurality of webs, such as when the first web first major surface and second major surface having a web thickness is defined having a first major surface defining a second thickness and a second web when the second web is overlaid or underlaid main surface (in this case, the first and second webs are formed in each of the at least one) of the single network. 另外,层可以同时存在于单个网内、该网和一个或多个其它网之间,每一个网形成一层。 In addition, layers may simultaneously exist within a single web and between that web and one or more other networks, each web forming a layer.
参照特定的第一层的“邻接”意指在下述位置与另一个第二层接合或附接,在所述位置,第一层和第二层彼此紧邻(即相邻)并且彼此直接接触,或彼此邻接但不直接接触(即在第一层和第二层之间居间存在一个或多个额外的层)。 with reference to specific "adjacent" is meant in the following the first layer the second layer is bonded to another position or attached in said position, the first and second layers adjacent to each other (i.e., adjacent) to each other and in direct contact with, or adjacent to, but not in direct contact (i.e. there are one or more additional layers intervening between the first and second layers) with each other.
“颗粒密度梯度”、“吸附剂密度梯度”和“纤维组密度梯度”意指特定纤维组内的颗粒、吸附剂或纤维材料的量(如网的整个限定面积上每单位体积的给定材料的数量、重量或体积)在整个复合非织造纤维网上不必均一,并且它可有差别,从而在某些区域中获得较多的材料,并且在其它区域中获得较少的材料。 "particle density gradient", "sorbent density gradient," and "fiber density gradient group" means a group of particles in a particular fiber, the amount of sorbent or fibrous material (e.g., the entire defined area per unit volume of the web to the number, weight or volume of a given material) throughout the composite nonwoven fibrous web not necessarily uniform, and it may be a difference, thereby obtaining more material in certain areas, and less material is obtained in the other regions.
现在将具体参照附图对本发明的多种示例性实施例进行描述。 Now with particular reference to the accompanying drawings various exemplary embodiments of the present invention will be described. 本发明的某些示例性实施例中的示例性实施例可以在不脱离本发明的精神和范围的情况下具有多种修改和更改。 Exemplary embodiments certain exemplary embodiments of the present invention may have various modifications and alterations without departing from the spirit and scope of the invention. 因此,应当理解,本发明的实施例不应限于以下所述的示例性实施例,但应受权利要求及其任何等同物中示出的限制的控制。 Thus, it should be understood that the embodiments of the present invention should not be limited to the exemplary embodiments described below, but the control of the claims and any equivalents thereof shall be shown by the restriction.
在一个方面,本发明提供包含嵌入相和基质相的复合非织造纤维网,所述嵌入相还包含形成基本上连续的三维网的一组颗粒,所述基质相包含围绕颗粒形成三维网的一组纤维。 In one aspect, the present invention provides a composite comprising a nonwoven fibrous web embedded phase and the matrix phase, said set of embedded particles of a substantially continuous three-dimensional network phase further comprises forming a matrix phase surrounding the particles comprising a three-dimensional a group of the web.
在本发明的一个示例性实施例中,将颗粒掺入包含微纤维和/或亚微米纤维的非织造纤维网中,使得颗粒形成基本上连续的第一相,第一相分布于包含微纤维和/或亚微米纤维的基本上连续的第二相中。 In one exemplary embodiment of the present invention, comprising the particles into microfibers and / or nonwoven webs of sub-micrometer fibers, such that the particles form a substantially continuous first phase, a first phase distributed in They comprise microfibers and / or sub-micrometer fibers substantially continuous second phase. 因此,第一相和第二相均基本上共同连续。 Therefore, the first and second phases are substantially co-continuous.
在本发明的另一个示例性实施例中,将亚微米纤维掺入包含微纤维的非织造纤维网中,使得亚微米纤维形成基本上连续的第一相,第一相分布于包含微纤维的基本上连续的第二相中。 In another exemplary embodiment of the present invention, the sub-micrometer fibers into a nonwoven web comprising microfibers, so that the sub-micrometer fibers form a substantially continuous first phase distributed in a first phase comprising a second phase of a substantially continuous microfibers. 因此,第一相和第二相均基本上共同连续。 Therefore, the first and second phases are substantially co-continuous.
在本发明的额外的示例性实施例中,将颗粒和不连续(例如短)微纤维掺入包含微纤维和/或亚微米纤维的非织造纤维网中,使得颗粒和短微纤维形成基本上连续的第一相,第一相分布于包含微纤维和/或亚微米纤维的基本上连续的第二相中。 In an additional exemplary embodiment of the present invention, the particles and a discontinuous (e.g., short) incorporating microfibers comprise microfibers and / or nonwoven webs of sub-micrometer fibers, such that the particles and short microfibers form a substantially continuous first phase distributed in a first phase comprising the microfibers and / or a substantially continuous phase of a second sub-micrometer fibers. 因此,第一相和第二相均基本上共同连续。 Therefore, the first and second phases are substantially co-continuous.
参见图1A,该图示出了示出根据本发明的复合非织造纤维网的一个示例性实施例的示意图。 Referring to Figure 1A, which illustrates a schematic view showing a composite nonwoven fibrous web according to the present invention exemplary embodiments. 单层复合非织造纤维网10由嵌入相和基质相形成,嵌入相包含细小粒子形式的一组颗粒14,该组颗粒14形成基本上连续的三维网,基质相包含形成围绕颗粒14的三维网的一组纤维12。 Single-layer composite nonwoven fibrous web 10 is formed by an embedded phase and the matrix phase, a set of particles embedded phase comprising a fine particle form 14, the set of particles 14 form a substantially continuous three-dimensional network matrix phase comprising a three-dimensional network is formed around the particles 14 12 is a set of fibers.
在图IA的图示实施例中,颗粒14显示为形成嵌入相的不同的单独粒子,在这些粒子中,每一个单独粒子与至少一个其它粒子以面到面的方式接触,所述嵌入相由单独粒子(如粒子链)的基本上连续的三维网形成。 In the illustrated embodiment of FIG IA, the particles 14 is shown as formed separately embedding a different phase particles, these particles, the individual particles are in contact with each of the at least one other manner to the surface of the particles to the surface of the fitted with a single particles (e.g. particle chains) are substantially continuous three-dimensional network is formed.
虽然图IA中的单独粒子显示为几何形状不均一的固态粒子,但应当理解,该组颗粒可以包括任何形状和/或构造的粒子。 While Figure IA single particles in display unevenness is a solid particle geometry, they should be understood that the group of particles may comprise any particle shape and / or configuration. 例如,粒子中的一些或所有粒子可以具有均一的规则几何形状(如球形、椭圆形、多边形、类似针形等等)或甚至不规则的形状。 For example, some or all of the particles in the particles may have a uniform regular geometric shape (e.g., spherical, elliptical, polygonal, needle-like, etc.) or even an irregular shape. 另外,可以使用中空粒子或多孔粒子。 In addition, hollow particles or porous particles.
在图IB中示出的另一个示例性实施例中,单层复合非织造纤维网20由嵌入相和基质相形成,所述嵌入相包含不连续纤维形式的一组颗粒24,该组颗粒24形成基本上连续的三维网,所述基质相包含一组纤维22,该组纤维22形成围绕颗粒24的三维网。 Another exemplary embodiment illustrated exemplary embodiment, the single-layer composite nonwoven fibrous web 20 in FIG. IB phase formed by phase embedded in the matrix and, embedded in the particulate phase comprises a set of discontinuous fibers in the form of 24, the group particles 24 form a substantially continuous three-dimensional network, the matrix phase comprises a set of fibers 22, the group of fibers 22 is formed around a three-dimensional network of particles 24. 在图IB的图示实施例中,颗粒24显示为形成嵌入相的各个不连续纤维,在这些纤维中,每一个单独不连续纤维与至少一个其它不连续纤维以面到面的方式接触,所述嵌入相由单独粒子(如单独不连续纤维链)的基本不连续三维网形成。 In the illustrated embodiment of FIG IB, the particles 24 shows the various fibers to form discontinuous phases embedded in these fibers, each individual discontinuous fibers with at least one other discontinuous fiber in a face to face contact manner, the embedding said particles from a separate phase (e.g., a single chain discontinuous fibers) in substantially continuous three-dimensional network is formed.
在图IC中示出的另一个示例性实施例中,单层复合非织造纤维网30由嵌入相和基质相形成,嵌入相包含与多个不连续纤维36粘结在一起的单独粒子形式的一组颗粒34,该颗粒形成基本上连续的三维网,基质相包含一组纤维32,该组纤维32形成围绕颗粒34的三维网。 Another exemplary embodiment illustrated exemplary embodiment, the single-layer composite nonwoven fibrous web 30 is formed by an embedded phase and the matrix phase in an IC, the insert comprising a single phase with a plurality of discontinuous fibers 36 bonded together a set of particles in the form of particles 34, the particles form a substantially continuous three-dimensional network matrix phase contains a set of fibers 32, the group of fibers 32 is formed around the three-dimensional network of particles 34.
在图IC的图示实施例中,颗粒34显示为形成嵌入相的不同的单独粒子,在这些粒子中,每一个单独粒子与至少一个其它粒子以面到面的方式接触,所述嵌入相由单独粒子(如粒子链)的基本上连续的三维网形成。 In the illustrated embodiment of FIG IC, the embedded particles 34 is shown as formed of single particles of different phases, these particles, the individual particles are in contact with each of the at least one other particle in surface-to-face manner, the fitted with a single particles (e.g. particle chains) are substantially continuous three-dimensional network is formed. 然而,单独颗粒34不必如所示那样以面到面的方式接触,因为单独颗粒34的至少一部分被多个不连续纤维36保持在一起,并且每一个单独不连续纤维与至少一个其它不连续纤维或另一个颗粒以面到面的方式接触,从而形成嵌入相,嵌入相由单独粒子(如单独不连续纤维链)的基本上连续的三维网形成。 However, not necessary that the individual particles 34 in the manner to the contact surface plane, as shown, since at least a portion of the individual particles 34 are a plurality of discontinuous fibers 36 held together, and each individual discontinuous fibers with at least one other discontinuous fiber or other particles to the surface of the surface contacting manner, thereby forming the embedded phase embedded phase formed of single particles (e.g., single chain discontinuous fibers) in a substantially continuous three-dimensional network.
此外,虽然图IC中的单独粒子显示为几何形状不均一的固态粒子,但应当理解,该组颗粒可以包括任何形状和/或构造的粒子。 Further, although in FIG IC single particles display unevenness of a solid particle geometry, they should be understood that the group of particles may comprise any particle shape and / or configuration. 例如,粒子中的一些或所有粒子可以具有均一的规则几何形状(如球形、椭圆形、多边形、类似针形等等)或甚至不规则形状。 For example, some or all of the particles in the particles may have a uniform regular geometric shape (e.g., spherical, elliptical, polygonal, needle-like, etc.), or even irregular shape. 另外,可以使用中空粒子或多孔粒子。 In addition, hollow particles or porous particles.
在图ID中示出的另一个示例性实施例中,形成多层复合非织造纤维网。 In FIG. ID another exemplary embodiment shown, is formed a multilayer composite nonwoven fibrous web. 多层复合纤维网40包含支承层50。 The multilayer composite web 40 comprising a support layer 50. 如图ID所示,支承层50可以支承图IC中示出的由嵌入相和基质相形成的单层复合非织造纤维网30,嵌入相包含与多个不连续纤维36粘结在一起的单独粒子形式的一组颗粒34,该颗粒形成基本上连续的三维网,基质相包含形成围绕颗粒34的三维网的一组纤维32。 FIG. ID, the support layer 50 may be supported in an IC layer composite nonwoven fibrous web by the embedded phase and the matrix phase formation 30 shown, fitted with a plurality of separate phase comprising discontinuous fibers bonded together with 36 in the form of particles of a set of particles 34, the particles form a substantially continuous three-dimensional network matrix phase comprising a group of fibers 32 is formed around the three-dimensional network of particles 34. 或者,任选支承层可以用于支承图IA的单层复合非织造纤维网10 (未示出),或图IB的单层复合非织造纤维网20 (未示出)。 Single-layer composite nonwoven fibrous web 10 (not shown), or IB of FIG layer composite nonwoven fibrous web or, optionally may be used for supporting the support layer 20 of FIG. IA (not shown).
虽然图ID中示出双层构造,但应当理解,其它多层复合非织造纤维网也在本发明的范围内。 Although FIG ID shows a double structure, it should be understood that, within the scope of other multi-layer composite nonwoven fibrous web according to the present invention also. 因此,例如包含3、4、5或任何数量层、具有任何结构和/或组成、按任何顺序排列的多层复合非织造纤维网构造都在本发明的范围内,前提条件是至少一层包含嵌入相和基质相,嵌入相还包含一组颗粒,该颗粒形成基本上连续的三维网,基质相包含一组纤维,该纤维形成围绕颗粒的三维网。 Thus, for example comprising five or any number of layers, having any structure and / or composition, multi-layer composite nonwoven fibrous web structure are arranged in any order within the scope of the present invention, with the proviso that at least one layer comprising embedded phase and the matrix phase, embedded phase further contains a set of particles, which particles form a substantially continuous three-dimensional network matrix phase contains a set of fibers which is formed around the three-dimensional network of particles.
已经发现的是,可以通过以下方式形成包含一组纤维的基质相:将亚微米纤维流与微纤维流结合,在一些示例性实施例中,微纤维流可以是中值直径为一微米或二微米或更小的非常细小的纤维流,然后,亚微米纤维被微纤维流捕集,并分散在微纤维当中。 It has been found that the matrix phase contains a set of fibers may be formed by the following ways: combining the sub-micrometer fiber stream with the microfiber stream, in some exemplary embodiments, the micro fiber stream may be a median diameter two microns or micrometers or less very fine fiber flow, then, sub-micrometer fiber stream is trapped microfibers, the microfibers and dispersing them. 当与美国临时专利申请No. 61/071,230的公开内容结合时,这种实施例在本发明的范围内。 When the disclosure U.S. Provisional Patent Application No. 61 / 071,230 in conjunction with such embodiments within the scope of the present invention. 因此,在以上结合的公开内容的范围内的某些示例性实施例(未示出)中,构成基质相的该组纤维的至少一部分可以包含亚微米纤维。 Thus, certain exemplary embodiment (not shown) within the scope of the disclosure of the above in combination, at least a part of the group of fibers constituting the matrix phase may comprise sub-micrometer fibers. 在其它示例性实施例中,构成基质相的该组纤维的至少一部分包含一组亚微米纤维,基质相还包含一组微纤维。 In other exemplary embodiments, constituting at least a portion of the set contains a set of sub-micrometer fibers of the fibrous matrix phase, the matrix phase further contains a set of micro fibers. 在额外的示例性实施例(未示出)中,该组亚微米纤维形成有该组微纤维。 In an additional exemplary embodiment (not shown), the set of sub-micrometer fibers is formed with the micro fibers. 在其它示例性实施例(未示出)中,该组亚微米纤维的至少一部分与该组微纤维分开形成。 (Not shown) formed in the other exemplary embodiment of the set of at least a portion of the microfibers separate sub-micrometer fibers. 在一些示例性实施例(未示出)中,该组微纤维在组成上与该组亚微米纤维相同。 In some exemplary embodiments (not shown), the set with the same microfibers sub-micrometer fibers in the composition.
在以上结合的公开内容的范围内的额外的示例性实施例(未示出)中,复合非织造纤维网具有厚度,亚微米纤维数与微纤维数的比率在复合非织造纤维网的整个厚度上有差别。 Additional exemplary embodiment (not shown) within the scope of the disclosure above in combination, the composite nonwoven fibrous web has a thickness, the ratio of sub-number-micrometer fibers to the number of microfibers in a composite nonwoven fibrous web the entire thickness difference. 在一些示例性实施例(未示出)中,亚微米纤维数与微纤维数的比率在复合非织造纤维网的整个厚度上递减。 , The ratio of the number of sub-micrometer fibers to the number of microfibers decreases in the entire thickness of the composite nonwoven fibrous web in some exemplary embodiments (not shown). 在其它示例性实施例(未示出)中,亚微米纤维数与微纤维数的比率从靠近由复合非织造纤维网的一半厚度限定的中心线的峰值变化到在复合非织造纤维网的表面处的较低值。 In other exemplary embodiments (not shown), the ratio of the number of sub-micrometer fibers to the number of microfibers varies from a peak defined by a thickness close to half of the composite nonwoven fibrous web to the center line of the surface of the composite nonwoven fibrous web at a lower value.
另外,通过使用上述结合的公开内容的某些示例性实施例,可以粘结收集的微纤维,优选通过自生热粘结步骤来粘结收集的微纤维,以形成自支承的连贯基质,在连贯基质中,微纤维被牢靠地支承和保护,所以,可以以微纤维的最小损失或压碎来处理和使用网。 Further, by using the above embodiments certain exemplary embodiments of the disclosure in combination, can be collected microfibers bonded, preferably thermally bonded by autogenous bonding step to collect the microfibers to form a coherent self-supporting matrix in coherent matrix, the microfibers being firmly supported and protected, it is possible to minimize the loss of microfibers or crushed to handle and use networks. 优选地,微纤维为由半结晶性聚合物材料构成的取向的纤维,从而增加了该网的机械特性或物理特性。 Preferably, microfibers by the orientation of the semicrystalline polymer material fibers, thus increasing the mechanical or physical property of the net.
此外,在以上结合的公开内容的范围内的额外的示例性实施例中,可以将颗粒的至少一部分粘结到该组纤维的至少一部分。 Furthermore, additional exemplary embodiments within the scope of the disclosure of the above in combination, at least a portion of the particles adhered to at least a portion of the group of fibers. 在某些额外的实施例中,可以将颗粒的至少一部分粘结到分开形成的该组纤维的至少一部分。 At least a portion of the additional group of fibers in certain embodiments, the particles may be bonded to at least a portion of the separately formed. 在某些目前优选的实施例中,可以将颗粒的至少一部分粘结到该组微纤维的至少一部分。 In certain presently preferred embodiments, at least a portion of the particles may be bonded to at least a portion of the microfibers.
就根据本发明的复合非织造纤维网的示例性实施例中的任何者而言,网将显示具有可以根据该网的特定的最终用途而有差别的基重。 According to an exemplary embodiment of a composite nonwoven fibrous web according to the present invention, any person concerned, the web may exhibit differential depending upon the particular end use of the web basis weight. 通常,纤维网的基重为小于约1000克/平方米(gsm)。 Typically, the basis weight of the web is less than about 1000 grams / square meter (gsm). 在一些实施例中,网的基重为从约I. Ogsm到约500gsm。 In some embodiments, the basis weight of the web is from about I. Ogsm to about 500gsm. 在其它实施例中,网的基重为从约IOgsm到约300gsm。 In other embodiments, the basis weight of the web is from about IOgsm to about 300gsm.
与基重一样,复合非织造纤维网将显示具有可以根据该网的特定的最终用途而有差别的厚度。 with the basis weight, the composite nonwoven fibrous web may exhibit a difference depending on the particular end use of the web thickness. 通常,网的厚度为小于约300毫米(_)。 Typically, the thickness of the web is less than about 300 mm (_). 在一些实施例中,网的厚度为从约O. 5mm到约150mm。 In some embodiments, the thickness of the web is from about O. 5mm to about 150mm. 在其它实施例中,网的厚度为从约I. Omm到约50mm。 In other embodiments, the thickness of the web is from about I. Omm to about 50mm.
在其它示例性实施例中,复合非织造纤维网可以具有厚度,并显示具有小于10%的密实度。 In other exemplary embodiments, the composite nonwoven fibrous web may have a thickness and exhibits a Solidity of less than 10%. 特别是,本申请人相信,迄今为止,还不知道,为了控制所得复合非织造纤维网的孔隙度和渗透性,通过控制复合非织造纤维网内的亚微米纤维数与微纤维数的比率来将密实度控制到小于10%。 In particular, the present applicants believe that, to date, do not know, in order to control porosity and permeability of the resulting composite nonwoven fibrous web, by controlling the ratio of the number of sub-micrometer fibers to the number of micro fibers within the composite nonwoven fibrous web to the control solidity to less than 10%.
现在将对根据本发明的示例性复合非织造纤维网的多种特性和组分进行描述。 will now be described in terms of various properties and components of exemplary composite nonwoven fibrous web according to the present invention.
如上所述,根据本发明的示例性复合非织造纤维网包括含有一组颗粒的嵌入相。 As described above, according to exemplary composite nonwoven fibrous web according to the present invention comprises a set of particles containing embedded phases. 可以选择任何合适的颗粒材料。 You may select any suitable particulate material. 合适的颗粒可以具有多种物理形式(如固态粒子、多孔粒子、中空泡、团块、不连续纤维、短纤维、薄片等等);形状(如球形、椭圆形、多边形、针形等等);形状均匀度(如单分散、基本上均一、不均一或不规则等等);组成(如无机颗粒、有机颗粒或它们的组合);和尺寸(如亚微米尺寸、微尺寸等等)。 Suitable particles may have a variety of physical forms (e.g., solid particles, porous particles, hollow bubbles, agglomerates, discontinuous fibers, staple fibers, flakes, etc.); a shape (such as spherical, elliptical, polygonal, needle-like) ; uniformity of shape (e.g., monodisperse, substantially uniform, non-uniform or irregular, etc.); composition (e.g., inorganic particles, organic particles, or a combination thereof); and size (e.g., sub-micron size, micro size, etc.).
在另外的示例性实施例中,颗粒包含一组中值直径至多为约2. 000 μ m、更优选地至多为约1,000 μ m、最优选地至多为约500 μ m的一组微尺寸的颗粒。 In further exemplary embodiments, the particle comprises a set of median diameter of up to about 2. 000 μ m, more preferably at most about 1,000 μ m, most preferably at most about 500 μ m of a group of micro-sized particles. 在其它示例性实施例中,颗粒包含一组中值直径最多为约10 μ m、更优选地至多为约5 μ m、甚至更优选地至多为约2 μ m的一组微尺寸的颗粒。 In other exemplary embodiments, the particle comprises a set of median diameter of up to about 10 μ m, more preferably up to about 5 μ m, and even more preferably at most a group of micro-sized particles of from about 2 μ m. 在某些示例性实施例中,颗粒可以包含具有上述中值直径的不连续纤维。 In certain exemplary embodiments, the particles may comprise discontinuous fibers having the above-described median diameter.
在单个成品网内,也可以使用多种类型的颗粒。 The finished within a single network, may be used various types of particles. 通过使用多种类型的颗粒,即使颗粒类型中的一种不与相同类型的其它粒子粘结,也可以生成连续的颗粒纤维网。 By using various types of particles, one particle type is even not bond with other particles of the same type, may generate a continuous particulate webs. 这种类型系统的实例将会是这样一种系统,在该系统中,使用两种类型粒子,一种类型的粒子将颗粒(如不连续聚合物纤维颗粒)粘结在一起,另一种类型的粒子起到用于网的所需用途的活性粒子(如吸附剂颗粒(例如活性炭))的作用。 Examples of this type of system would be one system, in the system, two types of particles, the particles of one type of particle (e.g., a discontinuous polymeric fiber particulate) bonded together, another type particles function as an active particles (e.g., particles of adsorbent (e.g. activated charcoal)) role for the desired use of the web. 这种示例性实施例对于流体过滤应用可能特别可用。 For this exemplary embodiment may be particularly useful in fluid filtration applications.
在某些这种示例性实施例中,可能有利的是,使用具有下述表面的至少一种颗粒,该表面可被制备为粘性的或“发粘的”,以便将颗粒粘结在一起,以形成用于纤维组分的网片或支承基质。 In some such exemplary embodiments, it may be advantageous to use at least one particle has a surface, the surface may be prepared as sticky or "tacky" so that the particles are bound together to form a mesh or support matrix for the fiber component. 就这一点而言,可用的颗粒可以包含聚合物,例如可以为不连续纤维形式的热塑性聚合物。 In this regard, useful particles may comprise a polymer, for example, may be a form of discontinuous fibers of a thermoplastic polymer. 合适的聚合物包括聚烯烃,特别是热塑性多烯键弹性体(TPE,如可得自Exxon-Mobil Chemical 公司(Houston,Texas)的VISTMAXX™)。 Suitable polymers include polyolefins, especially multi-ethylenically thermoplastic elastomer (TPE, such as available from Exxon-Mobil Chemical Company (Houston, Texas) is VISTMAXX ™). 在另外的不例性实施例中,由于TPE—般一定程度地发粘(这可以有助于在添加纤维以形成复合非织造纤维网之前将颗粒粘结在一起以形成三维网),所以包含TPE的颗粒(特别是作为表面层或表面涂层)可以是优选的。 In a further embodiment not embodiment, since a certain degree as TPE- tacky (which may facilitate the addition of fibers to form a composite nonwoven fibrous web before the particles bonded together to form a three dimensional network), it contains TPE particles (especially as a surface coating or surface layer) may be preferred. 在某些示例性实施例中,包含VISTMAXX™TPE的颗粒可以提供改善的抗苛刻化学环境的能力,特别是在PH低(如不大于约3的pH)和pH高(如为至少约9的pH)和在有机溶剂中的环境。 In certain exemplary embodiments, the particles comprise VISTMAXX ™ TPE may offer improved resistance capacity to harsh chemical environments, particularly at low PH (such as not greater than about pH 3) and high pH (eg at least about 9 pH) environment and in an organic solvent.
在额外的示例性实施例中,可能有利的是,使用至少一种吸附剂粒子,例如吸收齐U、吸附剂、活性炭、阴离子交换树脂、阳离子交换树脂、分子筛或它们的组合。 In an additional exemplary embodiment, it may be advantageous to use at least one sorbent particles, such as absorption Qi U, an adsorbent, activated carbon, an anion exchange resin, cation exchange resin, molecular sieves, or a combination thereof. 可采用多种吸附剂粒子。 Variety of sorbent particles can be employed. 有利地,吸附剂粒子能够吸收或吸附预计在拟定使用条件下存在的气体、气溶胶或液体。 Advantageously, the sorbent particles capable of absorbing or adsorbing the presence of expected conditions of use in the preparation of gases, aerosols or liquids.
吸附剂粒子可呈任何可使用的形式,包括小珠、薄片、颗粒剂或团块。 sorbent particles can be in any usable form including beads, flakes, granules or agglomerates. 优选的吸附剂粒子包括活性炭;氧化铝和其它金属氧化物;碳酸氢钠;可通过吸附、化学反应或汞齐化从流体移除组分的金属粒子(如银粒子);粒状催化剂,例如霍加拉特(其可催化一氧化碳的氧化);粘土和其他由酸性溶液(例如乙酸)或碱性溶液(例如氢氧化钠水溶液)处理过的矿物;离子交换树脂;分子筛和其他沸石;二氧化硅;杀生物剂;杀真菌剂和杀病毒剂。 Preferred sorbent particles include activated carbon; alumina and other metal oxides; sodium bicarbonate; a, chemical reaction or amalgamation remove the metal particle component (e.g., silver particles) from a fluid by adsorption; particulate catalyst, e.g. Huo Gallate (which can catalyze the oxidation of carbon monoxide); clay and other processing by the acidic solution (e.g. acetic acid) or basic solution (e.g. aqueous sodium hydroxide) through the mineral; ion exchange resin; molecular sieves and other zeolites; silica ; biocides; fungicide and virucide. 活性炭和氧化铝是特别优选的吸附剂粒子。 Activated carbon and alumina are particularly preferred sorbent particles. 尽管也可采用吸附剂粒子的混合物(如以吸收气体混合物),但在实践中,对于处理气体混合物来说,制造在各个层中采用单独的吸附剂粒子的多层薄片制品可能较好。 Although the mixture may also be employed (e.g., to absorb mixtures of gases), but in practice, for the process gas mixture, the individual sorbent particles employed for producing a multilayer sheet article may be preferably in the sorbent particles in the individual layers.
所需的吸附剂粒度可能有很大差别,且通常部分地根据拟定使用条件来选择。 The desired sorbent particle size can vary widely, and is generally selected in part on the intended service conditions. 作为一般指导,吸附剂粒子在尺寸方面可以有差别,中值直径为从约O. 001到约3000 μπι。 As a general guide, the sorbent particles may differ in size, the median diameter of from about O. 001 to about 3000 μπι. 优选地,吸附剂粒子的中值直径为从约O. 01到约1500 μ m、更优选地从约O. 02到约750 μ m、最优选地从约O. 05到约300 μ m。 Preferably, the median diameter of the sorbent particles is from about O. 01 to about 1500 μ m, more preferably from about O. 02 to about 750 μ m, most preferably from about O. 05 to about 300 μ m. 在某些示例性实施例中,吸附剂粒子可以包含一组中值直径小于I μ m的纳米粒子。 In certain exemplary embodiments, the sorbent particles may contain a group median diameter of less than I μ m nanoparticles. 多孔纳米粒子可以具有提供用于从流体介质吸附污染物(如吸收和/或吸附)的大表面积的优点。 The porous nanoparticles may have the advantage of providing for adsorbing contaminants from a fluid medium (e.g., absorption and / or adsorption) of large surface area.
也可采用由尺寸范围不同的吸附剂粒子的混合物(如双峰的混合物),但在实际中,制备在上游层采用较大的吸附剂粒子而在下游层采用较小的吸附剂粒子的多层薄片制品可能较好。 may also be a mixture of different size ranges (e.g., bimodal mixtures) of sorbent particles, but in practice, the upstream layer was prepared using a larger and a smaller sorbent particles in a downstream layer of the adsorbent the particles may be preferred multilayer sheet article. 将至少80重量%的吸附剂粒子、更优选为至少84重量%以及最优选为至少90重量%的吸附剂粒子在纤维网中结合。 At least 80 weight percent sorbent particles, more preferably at least 84 wt% and most preferably 90 weight percent sorbent particles are incorporated at least in the web. 以网基重表达,对于相对细小(如亚微米尺寸)的吸附剂粒子,吸附剂粒子装填量可以为例如至少约500gsm,对于相对粗糙(如微尺寸)的吸附剂粒子,吸附剂粒子装填量可以为例如至少约2,OOOgsm。 Expression in the web basis weight, for relatively fine (e.g. sub-micrometer-sized) sorbent particles, sorbent particle loading level may for example be at least about 500 gsm for relatively coarse (e.g., micro-sized) sorbent particles, sorbent particle loading level It may be, for example, at least about 2, OOOgsm.
如上所述,根据本发明的示例性复合非织造网包含基质相,基质相包含围绕颗粒形成三维网的一组纤维。 As described above, according to exemplary composite nonwoven web of the present invention comprises a matrix phase, the matrix phase comprising a population of fibers is formed around a three-dimensional network of particles. 合适的纤维组可以包含亚微米纤维、微纤维、超细微纤维或它们的组合。 Suitable fiber component may comprise sub-micrometer fibers, microfibers, ultrafine fibers, or combinations thereof.
在某些示例性实施例中,该组纤维可以为取向的。 In certain exemplary embodiments, the set of fibers may be oriented. 取向的纤维为在纤维内存在分子取向的纤维。 Oriented fibers are fibers where the fiber orientation of the molecules. 完全取向和部分取向的聚合物纤维是已知的,并且可商购获得。 Oriented completely and partially oriented polymeric fibers are known and commercially available. 可以以许多方式测量纤维取向,包括双折射率、热收缩量、X射线散射和弹性模量(参见如Principlesof PolymerProcessinR (聚合物处理原理),Zehev Tadmor and Costas Gogos, Johnffileyand Sons, New York,1979,pp.77-84)。 Can be measured in many ways fiber orientation, including birefringence, thermal shrinkage, X-ray scattering, and elastic modulus (see, e.g. Principlesof PolymerProcessinR (Polymer Processing principle), Zehev Tadmor and Costas Gogos, Johnffileyand Sons, New York, 1979, pp.77-84).
重要的是应当指出,由于结晶材料和非结晶材料两者均可显示具有与结晶无关的分子取向,所以分子取向与结晶度不同。 important to note that, since both the crystalline material and the amorphous material can exhibit molecular orientation independent of the crystal, the different molecular orientation and crystallinity. 因此,即使市售的已知的通过熔喷或静电纺纱制备的亚微米纤维不是取向的,但存在将分子取向赋予使用这些方法制备的纤维的已知方法。 Thus, the orientation of sub-micrometer fibers is not even known commercially available or prepared by an electrostatic melt-blown spinning, but there are known methods to impart molecular orientation preparation methods using these fibers. 然而,Torbin所述的工艺(参见如美国专利No. 4,536,361)没有显示制备分子取向的纤维。 However, Torbin the process (see, e.g., U.S. Pat. No. 4,536,361) fibers made of molecular orientation is not shown.
本发明的复合非织造纤维网可以包含一种或多种细小亚微米纤维组分。 The composite nonwoven fibrous webs of the present invention may comprise one or more fine sub-micrometer fiber component. 在一些实施例中,优选的细小亚微米纤维组分为包含中值纤维直径小于一微米(ym)的纤维的亚微米纤维组分。 In some embodiments, a preferred fine sub-micrometer fiber component is a sub-micrometer fiber component comprises fibers median fiber diameter of less than one micrometer (YM) of. 在一些示例性实施例中,亚微米纤维组分包含中值纤维直径在从约O. 2 μ m到约O. 9 μ m的范围内的纤维。 In some exemplary embodiments, the sub-micrometer fiber component comprises fibers having a median fiber diameter in the range of from about to about O. 2 μ m is O. 9 μ m. 在其它示例性实施例中,亚微米纤维组分包含中值纤维直径在从约O. 5 μ m到约O. 7 μ m的范围内的纤维。 In other exemplary embodiments, the sub-micrometer fiber component comprises fibers having a median fiber diameter of from about O. 5 μ m in the range of O. to about 7 μ m is.
在本发明中,通过以下方式确定给定的亚微米纤维组分中的纤维的“中值纤维直径”:例如通过使用扫描电镜来制备纤维结构的一副或多幅图像;测量所述一副或多幅图像中的清晰可见的纤维的纤维直径,从而得到总数为X的纤维直径;以及计算X个纤维直径的中值纤维直径。 In the present invention, it is determined "median fiber diameter" of a given sub-micrometer fiber component of the fiber in the following manner: for example, one or more images of preparing the fiber structure by using a scanning electron microscope; measurements said one or more images of the fiber diameter of clearly visible fibers, resulting in a total fiber diameter of X; and X is calculated median fiber diameter of a fiber diameter. 通常,X大于约50,并且范围从约50到约200是有利的。 Typically, X is greater than about 50, and ranges from about 50 to about 200 is advantageous.
在一些示例性实施例中,亚微米纤维组分可以包含一种或多种聚合物材料。 In some exemplary embodiments, the sub-micrometer fiber component may comprise one or more polymeric materials. 合适的聚合物材料包括(但不限于)聚烯烃,例如聚丙烯和聚乙烯;聚酯,例如聚对苯二甲酸乙二醇酯和聚对苯二甲酸丁二醇酯;聚酰胺(尼龙-6和尼龙_6,6);聚氨酯;聚丁烯;聚乳酸;聚乙烯醇;聚苯硫醚;聚砜;液晶聚合物;聚乙烯-共-乙酸乙烯酯;聚丙烯腈;环状聚烯烃;聚氧甲烯;多烯键热塑性弹性体;或它们的组合。 Suitable polymeric materials include (but are not limited to) a polyolefin, such as polypropylene and polyethylene; polyesters such as poly (ethylene terephthalate) and poly (butylene terephthalate); polyamides (nylons - 6 and nylon _6,6); polyurethanes; polybutene; polylactic acid; polyvinyl alcohols; polyphenylene sulfide; polysulfone; liquid crystal polymer; polyethylene - co - vinyl acetate; polyacrylonitrile; cyclic poly olefin; polyoxymethylene; multi-ethylenically thermoplastic elastomer; or a combination thereof.
亚微米纤维组分可以包括含有上述聚合物或共聚物中的任何一种的单组分纤维。 The sub-micrometer fiber component may comprise monocomponent fibers comprising any one of the above-described polymers or copolymers of. 在这个示例性实施例中,单组分纤维可以包含下述添加剂,但包含选自上述聚合物材料的单种纤维形成材料。 In this exemplary embodiment, the monocomponent fibers may contain additives as described below, but comprise a single fiber forming polymeric material selected from the above materials. 此外,在该示例性实施例中,如果存在,单组分纤维通常包括至少75重量%的上述聚合物材料中的任何一种以及高达25重量%的一种或多种添加剂。 Further, in the exemplary embodiment, if present, is typically monocomponent fibers comprising any one of at least 75 wt% of said polymeric material and one or more additives of up to 25% by weight. 有利地,单组分纤维包括至少80重量%、更有利地至少85重量%、至少90重量%、至少95重量%以及100重量%之多的上述聚合物材料中的任何一种,其中所有重量都是基于纤维的总重量。 Advantageously, monocomponent fibers comprising at least 80 wt%, more advantageously at least 85%, at least 90% by weight, as much as any of the above polymeric material and at least 95 wt% in 100 wt%, wherein all weight based on the total weight of the fiber.
亚微米纤维组分也可以包含由以下物质形成的多组分纤维:(I)上述聚合物材料中的两种或更多种,和(2)下述一种或多种添加剂。 sub-micrometer fiber component may also comprise multi-component fibers formed from the following materials: two of the above polymeric materials (I) or more, and (2) consists of one or more additives. 如本文所用,术语“多组分纤维”是用于指由两种或更多种聚合物材料形成的纤维。 As used herein, the term "multicomponent fiber" is used to refer to a fiber formed from two or more polymeric materials. 合适的多组分纤维构型包括(但不限于)皮芯构型、并列构型和“海岛”构型。 Suitable multi-component fiber configurations include (but are not limited to a) sheath-core configurations, parallel configurations, and "island" configuration.
对于由多组分纤维形成的亚微米纤维组分,有利地,基于纤维的总重量,多组分纤维包含:(1)从约75重量%到约99重量%的上述聚合物中的两种或更多种,和(2)从约25重量%到约I重量%的一种或多种额外的纤维形成材料。 For sub-micrometer fiber components formed from multi-component fibers, advantageously based on the total weight of the fibers, multicomponent fibers comprising: (1) from about 75 wt% to about 99 wt% of said polymer two or more, and (2) from about 25 wt% to about I weight percent of one or more additional fiber-forming material.
本发明的复合非织造纤维网可以包含一种或多种粗纤维组分,例如微纤维组分。 The present invention a composite nonwoven fibrous web may comprise one or more coarse fiber components such as the micro-fiber component. 在一些实施例中,优选的粗纤维组分为包含中值纤维直径为至少I ym的纤维的微纤维组分。 In some embodiments, a preferred coarse fiber component is a fiber microfiber component comprises at least I ym of the median fiber diameter. 在一些示例性实施例中,微纤维组分包含中值纤维直径为从约2 μ m到约100 μ m的范围内的纤维。 In some exemplary embodiments, the microfiber component comprises fibers median fiber diameter of from about 2 μ m to 100 μ m in a range of about. 在其它示例性实施例中,微纤维组分包含中值纤维直径为从约5 μ m到约50 μ m的范围内的纤维。 In other exemplary embodiments, the microfiber component comprises fibers median fiber diameter of from about 5 μ m in a range of about 50 μ m.
在本发明中,通过以下方式确定给定的微纤维组分中的纤维的“中值纤维直径”:例如通过使用扫描电镜来制备纤维结构的一副或多幅图像;测量所述一副或多幅图像中的清晰可见的纤维的纤维直径,从而得到总数为X的纤维直径;以及计算X个纤维直径的中值纤维直径。 Prepared, for example one or more images of the fiber structure by using a scanning electron microscope; the measurement: In the present invention, it determines a given fiber of the microfiber component "median fiber diameter" in the following manner one or more images fiber diameter of clearly visible fibers, resulting in a total fiber diameter of X; and X is calculated median fiber diameter of a fiber diameter. 通常,X大于约50,并且范围从约50到约200是有利的。 Typically, X is greater than about 50, and ranges from about 50 to about 200 is advantageous.
在一些示例性实施例中,微纤维组分可以包含一种或多种聚合物材料。 In some exemplary embodiments, the microfiber component may comprise one or more polymeric materials. 一般来讲,任何形成纤维的聚合物材料均可以用于制备微纤维,尽管通常且优选纤维成形材料是半结晶性的。 Generally, any fiber-forming polymeric material may be used in the preparation of microfiber, though usually and preferably the fiber-forming material is semi-crystalline. 特别可用的是通常用于纤维形成物的聚合物,例如聚乙烯、聚丙烯、聚对苯二甲酸乙二醇酯、尼龙和聚氨酯。 Particularly useful are polymers commonly used in fiber formation such as polyethylene, polypropylene, polyethylene terephthalate, nylon, and polyurethane. 也可以由非晶态聚合物(例如聚苯乙烯)来制备网。 Network may also be prepared from amorphous polymers (e.g., polystyrene). 这里所列的具体聚合物仅为示例,并且多种其它聚合物材料或纤维成形材料为可用的。 Specific polymers listed here are merely examples, and a variety of other polymeric or fiber-forming materials are useful.
合适的聚合物材料包括(但不限于)聚烯烃,例如聚丙烯和聚乙烯;聚酯,例如聚对苯二甲酸乙二醇酯和聚对苯二甲酸丁二醇酯;聚酰胺(尼龙-6和尼龙-6,6);聚氨酯;聚丁烯;聚乳酸;聚乙烯醇;聚苯硫醚;聚砜;液晶聚合物;聚乙烯-共-乙酸乙烯酯;聚丙烯腈;环状聚烯烃;聚氧甲烯;多烯键热塑性弹性体;或它们的组合。 Suitable polymeric materials include (but are not limited to) a polyolefin, such as polypropylene and polyethylene; polyesters such as poly (ethylene terephthalate) and poly (butylene terephthalate); polyamides (nylon-6 and nylon-6,6); polyurethanes; polybutene; polylactic acid; polyvinyl alcohols; polyphenylene sulfide; polysulfone; liquid crystal polymer; polyethylene - co - vinyl acetate; polyacrylonitrile; cyclic polyolefins; polyoxymethylene; multi-ethylenically thermoplastic elastomer; or a combination thereof. 可以利用多种合成纤维成形聚合物材料,包括热塑性塑料,尤其是可延展的热塑性塑料,例如线性低密度聚乙烯(如可以商标名D0WLEX™购自Dow Chemical公司(Midland, Michigan)的那些)、热塑性多烯键弹性体(TPE,如可以商标名ENGAGE™购自Dow Chemical公司(Midland, Michigan)的那些;和可以商标名VISTAMAXX™购自Exxon-Mobil Chemical公司(Houston, Texas)的那些)、乙烯-α -烯经共聚物(如可以商标名EXACT™购自Exxon-Mobil Chemical公司(Houston, Texas)和可以商标名ENGAGE™购自Dow Chemical公司(Midland, Michigan)的乙烯-丁烯、乙烯-己烯或乙烯-辛烯共聚物)、乙烯-醋酸乙烯聚合物(如可以商品名ELVAX™购自EI DuPont deNemours&Co. (Wilmington,Delaware)的那些)、聚丁烯弹性体(如可以商品名CRASTIN™购自EI DuPont de Nemours&Co. (Wilmington, Delaware)和可以商品名POLYBUTENE-l™ 购自Basell Polyolefins (Wilmington, Delaware)的 may utilize a variety of synthetic polymeric molding material comprises a thermoplastic, especially extensible thermoplastics such as linear low density polyethylene (e.g., trade name D0WLEX ™ available from Dow Chemical Co. (Midland, Michigan) of those), the thermoplastic multi-ethylenically elastomer (TPE, such as the trade name ENGAGE ™ available from Dow Chemical Co. (Midland, Michigan) those; and trade name VISTAMAXX ™ available from Exxon-Mobil Chemical company (Houston, Texas) of those), an ethylene [alpha - ene copolymers by (e.g., trade name EXACT ™, available from Exxon-Mobil Chemical company (Houston, Texas) and under the trade name ENGAGE ™ available from Dow Chemical Co. (Midland, Michigan) ethylene - butoxy , ethylene - hexene or ethylene - octene copolymers), ethylene - vinyl acetate polymers (such as available under the tradename ELVAX ™ available from EI DuPont deNemours & Co (Wilmington, Delaware), those), polybutylene elastomers (e.g. tradename CRASTIN ™ available from EI DuPont de Nemours & Co. (Wilmington, Delaware), and the trade name POLYBUTENE-l ™ purchased from Basell Polyolefins (Wilmington, Delaware) of 那些)、弹性体苯乙烯嵌段共聚物(如可以商品名KRAT0N™ 购自Kraton Polymers (Houston, Texas)和可以商品名S0LPRENE™ 购自Dynasol Elastomers (Houston, Texas)的那些)和聚醚嵌段共聚多酰胺弹性体材料(如可以商品名PEBAX™购自Arkema (Colombes, France)的那些)。 Those), elastomeric styrene block copolymer (e.g., trade name KRAT0N ™ available from Kraton Polymers (Houston, Texas) and those S0LPRENE ™ trade name available from Dynasol Elastomers (Houston, Texas)) of polyether block body and copolyamide elastomeric materials (e.g., commercially available under the tradename PEBAX ™ from those Arkema (Colombes, France) in). TPE是尤其优选的。 TPE is particularly preferred.
根据本发明的示例性实施例,也可以将多种天然纤维形成材料制备成非织造微纤维。 According to an exemplary embodiment of the present invention, it may be formed in a variety of natural fiber nonwoven microfiber material as prepared. 优选的天然材料可以包括柏油或浙青(如用于制备碳纤维)。 Preferred natural materials may include bitumen or Zhejiang cyan (such as for the preparation of carbon fibers). 纤维形成材料可以是熔化形式或承载于合适的溶剂中。 Fiber-forming material can be in molten form or carried in a suitable solvent. 也可利用反应性单体,当它们通过或穿过模具时,它们与彼此反应。 Reactive monomer may also be utilized, or when they pass through the die, they react with each other. 非织造纤维网可以将纤维混合物包含在单层(例如使用两个密集间隔的共享通用模具顶端的模具腔体来制备)、多个层(例如使用以叠堆布置的多个模具腔体来制备)或多组分纤维的一层或多层(例如在Krueger等人的美国专利No. 6,057, 256中所述的那些)中。 The nonwoven fibrous web may be in a single layer comprising a mixture of fibers (e.g. prepared using two mold cavities sharing a common die tip closely spaced), a plurality of layers (e.g., using a plurality of mold cavities arranged in a stack prepared ) or one or more component fibers (e.g., Krueger et al., U.S. Pat. No., those) in the 256 in 6,057.
也可以由材料的共混物形成纤维,包括已经某些添加剂已经共混到其中的材料,例如颜料或染料。 fibers may be formed from a blend of materials, including certain additives have been blended into the material therein, such as pigments or dyes. 可以制备例如皮芯型或并列型双组分纤维的双组分微纤维(本文的“双组分”包括具有两个或更多个组分的纤维,每一个组分占据纤维横截面积的一部分并且基本上在纤维的整个长度上延伸),如可以是双组分亚微米纤维。 Can be prepared, for example, sheath-core or side by side bicomponent fibers of bicomponent microfibers ( "bicomponent" herein includes fibers having two or more components, each component occupying a cross-sectional area of the fibers part and extends substantially over the entire length of the fiber), as may be bicomponent sub-micrometer fibers. 然而,本发明的示例性实施例利用单组分纤维可以是特别可用的和有利的(其中纤维在其整个横截面上具有基本相同的组成,但“单组分”包括共混物或包含添加剂的材料,其中基本上均一组成的连续相在整个横截面和纤维长度上延伸)。 However, exemplary embodiments of the present invention using a single-component fibers may be particularly useful and advantageous (wherein the fibers have essentially the same composition throughout its cross-section, but the "one-component" includes blends or additive comprising material, wherein the continuous phase of substantially uniform composition extends across the cross-section and fiber length). 在其它有益效果当中,能够使用单组分纤维降低了制备的复杂性,并且对网的使用限制较少。 Among other beneficial effects, to use a single-component fibers reduces complexity of manufacturing and places fewer restrictions on the use of the network. 除了以上提及的纤维形成材料之外,还可以将多种添加剂添加到熔化并挤出的纤维以将添加剂掺入纤维中。 In addition to the above-mentioned fiber-forming material, various additives may also be added to the fiber melt and extruded to incorporate the additive into the fiber. 通常,基于纤维的总重量,添加剂的量小于约25重量%,有利地高达约5. O重量%。 Typically, based on the total weight of the fiber, the amount of additive is less than about 25% by weight, advantageously up to about 5. O wt%. 合适的添加剂包括(但不限于)颗粒、填充剂、稳定剂、增塑剂、增粘齐IJ、流动控制剂、固化缓聚剂、粘合增进剂(例如硅烷和钛酸盐)、辅助剂、抗冲改性剂、可膨胀的微球体、导热颗粒、导电颗粒、二氧化硅、玻璃、粘土、滑石、颜料、着色剂、玻璃珠或泡、抗氧化剂、荧光增白剂、抗微生物剂、表面活性剂、阻燃剂和含氟化合物。 Suitable additives include (but are not limited to) particles, fillers, stabilizers, plasticizers, tackifying IJ Qi, flow control agents, cure rate retarders, adhesion promoters (e.g., silanes and titanates), adjuvants , impact modifiers, expandable microspheres, thermally conductive particles, electrically conductive particles, silica, glass, clay, talc, pigments, colorants, glass beads or bubbles, antioxidants, optical brighteners, antimicrobial agents , surfactants, flame retardants, and fluorochemicals.
上述添加剂中的一种或多种可以用于减少所得纤维和层的重量和/或成本、调节粘度、或改变纤维的热特性或使衍生自添加剂物理特性活性的物理特性具有一定的范围,包括电学特性、光学特性、与密度相关的特性、与液体阻隔或粘合剂粘着性相关的特性。 A or more of the above additives may be used to reduce the weight and the layer and / or cost, to adjust the viscosity or alter the thermal properties of the fiber or to the physical properties derived from the physical characteristics of the active additive has a certain range, including electrical properties, optical properties, density-related, liquid barrier or adhesive tack related properties.
本发明的复合非织造纤维网还可以包含支承层,例如图ID中示出的示例性多层复合非织造纤维制品40的支承层50。 The present invention a composite nonwoven fibrous web may further comprise a support layer, such as the exemplary multi-layer composite nonwoven fibrous article 40, the support layer 50 shown in FIG. ID. 当支承层存在时,支承层可以提供复合非织造纤维制品强度中的大部分。 When the support layer is present, the support layer may provide most of the strength of the composite nonwoven fiber article. 在一些实施例中,上述亚微米纤维组分往往会具有非常低的强度,并可在正常处理期间被损坏。 In some embodiments, the above-described sub-micrometer fiber component tends to have very low strength, and can be damaged during normal handling. 亚微米纤维组分附接到支承层为亚微米纤维组分增加强度,同时保持低密实度,因此,保持所需的亚微米纤维组分的吸收剂性质。 Sub-micrometer fiber component is attached to the support layer is a sub-micrometer fiber component to increase the strength, while maintaining low density, thus maintaining the desired absorbent properties of the sub-micrometer fiber component. 多层复合非织造纤维网结构也可以提供用于进一步加工的足够的强度,所述进一步加工可以包括(但不限于)将网卷绕成辊形式、从辊移除网、模铸、成褶、折叠、网装固定、织造等等。 Multi-layer composite nonwoven fibrous web structure may also provide sufficient strength for further processing, the further processing may include (but are not limited to) winding the web into roll form, removing the web roll, molding, pleating , folding, stapling, weaving, and the like.
在本发明中可以使用多种支承层。 variety of support layers may be used in the present invention. 合适的支承层包括(但不限于)非织造物、织造物、针织织物、泡沫层、膜、纸质层、背胶层、金属薄片、网片、弹性织物(即上述具有弹性性能的织造、针织或非织造物中的任何者)、开孔网、背胶层或它们的任意组合。 Suitable support layers include (but are not limited to) non-woven, woven, knitted fabric, a foam layer, a film, a paper layer, an adhesive layer, metal foil, mesh, an elastic fabric (i.e., having the above-described woven elastic properties, in any of the knitted or nonwoven), an apertured web, adhesive layer, or any combination thereof. 在一个示例性实施例中,支承层包含聚合物型非织造物。 In one exemplary embodiment, the support layer comprises a polymeric nonwoven fabric. 合适的非织造聚合物织物包括(但不限于)纺粘织物、熔喷织物、短长度纤维(即纤维长度小于约IOOmm的纤维)梳理成网、针刺织物、裂膜网、水刺网、气流短纤维网或它们的组合。 Suitable nonwoven polymeric fabrics include (but are not limited to) spunbond fabrics, meltblown fabrics, staple length fibers (i.e., a fiber length of less than about IOOmm fibers) carded, needled fabric, a split film web, a hydroentangled web, airlaid staple fiber web, or a combination thereof. 在某些示例性实施例中,支承层包含粘结的短纤维网。 In certain exemplary embodiments, the support layer comprises staple fibers bonded. 如下进一步所述,可以使用例如热粘结、粘合剂粘结、粉状粘结剂粘结、水刺法、针刺法、压延或它们的组合来进行粘结。 As described further below, bonding may be performed using, for example thermal bonding, adhesive bonding, powdered binder bonding, hydroentangling, needlepunching, calendering, or a combination thereof.
支承层的基重和厚度可以取决于复合非织造纤维制品的特定的最终用途。 basis weight and layer thickness of the support may depend on the particular end use of the composite nonwoven fibrous article. 在本发明的一些实施例中,理想的是,使复合非织造纤维制品的总基重和/或厚度保持在最小水平。 In some embodiments of the present invention, it is desirable that the total basis weight of the composite nonwoven fibrous article and / or kept to a minimum thickness. 在其它实施例中,给定的应用可能要求最小的总基重和/或厚度。 In other embodiments, a given application may require a minimum total basis weight and / or thickness. 通常,支承层的基重为小于约150gsm。 Typically, the base support layer weight of less than about 150gsm. 在一些实施例中,支承层的基重为从约5. Ogsm到约lOOgsm。 In some embodiments, the support layer basis weight is from about to about 5. Ogsm lOOgsm. 在其它实施例中,支承层的基重为从约IOgsm到约75gsm。 In other embodiments, the support layer basis weight is from about IOgsm to about 75gsm.
I. Omm到约35mm。 I. Omm to about 35mm. 在其它实施例中,支承层的厚度为从约2. Omm到约25mm。 In other embodiments, the thickness of the support layer is from about 2. Omm to about 25mm.
在某些示例性实施例中,支承层可以包含微纤维组分,例如多个微纤维。 In certain exemplary embodiments, the support layer may comprise a microfiber component, for example, a plurality of microfibers. 在这种实施例中,可能优选的是,将上述亚微米纤维组直接沉积到微纤维支承层上以形成多层复合非织造纤维网。 In such embodiments, it may be preferred that the above-described sub-micrometer fiber population directly deposited onto the microfiber support layer to form a multi-layer composite nonwoven fibrous web. 可任选地是,上述微纤维组可与亚微米纤维组一起沉积在微纤维支承层上或沉积在微纤维支承层上的亚微米纤维组的上方。 Optionally, the above-described microfiber population may be deposited with a sub-micrometer fibers above the sub-micrometer fibers on the microfiber support layer on the microfiber support layer or deposition. 在某些示例性实施例中,构成支承层的多个微纤维在组成上与形成覆盖层的该组微纤维相同。 The same set of microfibers In certain exemplary embodiments, a plurality of micro fibers constituting the support layer and the covering layer in composition.
亚微米纤维组分可以被永久性地或暂时性地粘结到给定的支承层。 sub-micrometer fiber component may be permanently or temporarily bonded to a given support layer. 在本发明的一些实施例中,亚微米纤维组分被永久性地粘结到支承层(即亚微米纤维组分被附接到支承层,旨在永久性地被粘结到支承层)。 In some embodiments of the present invention, the sub-micrometer fiber component is permanently bonded to the support layer (i.e. sub-micrometer fiber component is attached to the support layer, intended to be permanently adhered to the support layer).
在本发明的一些实施例中,上述亚微米纤维组分可以被暂时性地粘结到(如可从其移除)支承层(例如隔离衬垫)。 In some embodiments of the present invention, the above-described sub-micrometer fiber component may be temporarily bonded to (e.g., removable from) a support layer (e.g., release liner). 在这种实施例中,可以使亚微米纤维组分在暂时支承层上支承所需的时间长度,可任选地是,可以在暂时支承层上进一步对亚微米纤维组分进行处理,随后将亚微米纤维组分永久性地粘结到第二支承层。 In such embodiments, sub-micrometer fiber component may be supported so that the length of time required on a temporary support layer may optionally, be further sub-micrometer fiber component is processed on a temporary support layer, followed by sub-micrometer fiber component is permanently bonded to a second support layer.
在本发明的一个示例性实施例中,支承层包括含有聚丙烯纤维的纺粘织物。 In one exemplary embodiment of the present invention, the support layer comprises a spunbonded fabric comprising polypropylene fibers. 在本发明的另外的示例性实施例中,支承层包含短长度纤维梳理成网,其中短长度纤维包括:(i)低熔点或粘结纤维;和(ii)高熔点或结构纤维。 In a further exemplary embodiment of the present invention, the support layer comprises a carded web of staple length fibers wherein the staple length fibers comprise: (i) low-melting point or binder fibers; and (ii) a high melting point or structural fibers. 通常,虽然粘结纤维和结构纤维的熔点之差可以大于10°c,但粘结纤维的熔点小于结构纤维的熔点至少10°C。 Typically, although the difference between the melting point of the binder fibers and structural fibers may be greater than 10 ° c, but the melting point of the binder fibers than the melting point of the structural fibers of at least 10 ° C. 合适的粘结纤维包括(但不限于)上述聚合物纤维中的任何者。 Suitable binder fibers include (but are not limited to) any of the above-described polymer fiber's. 合适的结构纤维包括(但不限于)上述聚合物纤维以及无机纤维(例如陶瓷纤维、玻璃纤维和金属纤维)和有机纤维(例如纤维素纤维)中的任何者。 Suitable structural fibers include (but are not limited to) any of the above are inorganic fibers and polymeric fibers (such as ceramic fibers, glass fibers and metal fibers) and organic fibers (e.g. cellulose fiber) was added.
7. 62 cm)。 7. 62 cm).
如上所述,支承层可以包含彼此结合的一层或多层。 As described above, the support layer may comprise one or more layers bonded to each other. 在一个示例性实施例中,支承层包含第一层(例如非织造物或膜)和第一层上与亚微米纤维组分相背的粘合剂层。 In one exemplary embodiment, the support layer comprises a first layer (e.g., nonwoven or film) and the first layer opposite the sub-micrometer fiber component of the adhesive layer. 在这个实施例中,粘合剂层可覆盖第一层的一部分或整个外表面。 In this embodiment, the adhesive layer may cover a portion of or the entire outer surface of the first layer. 粘合剂可以包含任何已知的粘合剂,包括压敏粘合剂、可热激活粘合剂等。 The adhesive may comprise any known adhesive, including pressure sensitive adhesives, heat activatable adhesive or the like. 当粘合剂层包含压敏粘合剂时,复合非织造纤维制品还可以包含隔离衬垫,从而得到压敏粘合剂的暂时保护。 When the adhesive layer comprises a pressure sensitive adhesive, the composite nonwoven fibrous article may further comprise a release liner, to obtain a temporary protection of the pressure-sensitive adhesive.
本发明的复合非织造纤维网可以包含与颗粒加载的纤维层、任选支承层或上述两者结合的额外的层(图中未示出)。 The present invention a composite nonwoven fibrous web may comprise fibers of the layer and the particle loading, support layer optionally additional layers or both in combination (not shown).
合适的额外的层包括(但不限于)包含颜色的层(如印刷层);上述支承层中的任何者;具有明显不同的平均纤维直径和/或物理组成的一种或多种额外的亚微米纤维组分;用于额外的隔离性能的一种或多种次细小亚微米纤维层(例如熔喷网或玻璃纤维织物);泡沫;粒子层;金属薄片层;膜;装饰织物层;隔膜(即具有受控渗透性的膜,例如透析膜、反渗透膜等);结网;网片;布线网或管网(即用于传输电的线层或用于传输多种流体的管组,例如用于加热毯的布线网和使冷却剂流经冷却毯的管网);或它们的组合。 Suitable additional layers include (but are not limited to) a color layer (printed layer); and the support layer by any; one composition having a distinct average fiber diameter and / or physical or more additional sub-micrometer fiber component; for an additional barrier properties or more secondary fine sub-micrometer fiber layer (e.g., a meltblown web or a glass fiber fabric); foams; particle layer; a metal foil layer; film; decorative fabric layer; a separator (i.e., a film having a controlled permeability, such as dialysis membranes, reverse osmosis membrane); netting; mesh; wire mesh or network (i.e., a transmission line layer for transmitting electrical or more fluids tubing set, for example, wire mesh and a blanket for heating the coolant flowing through the cooling blanket network); or combinations thereof.
在某些示例性实施例中,本发明的复合非织造纤维网还可以包含一种或多种附接装置,以允许将复合非织造纤维制品能够附接到基底。 In certain exemplary embodiments, the composite nonwoven fibrous web of the present invention may further comprise one or more attachment means, to allow the composite nonwoven fibrous article to be attached to a substrate. 如上所述,粘合剂可以用于附接复合非织造纤维制品。 As described above, the adhesive may be used to attach the composite nonwoven fibrous article. 除了粘合剂外,还可以使用其他附接装置。 In addition to the binder, it may also be used other attachment means. 合适的附接装置包括(但不限于)任何机械紧固件,例如螺杆、钉子、夹片、U形钉、缝合针、螺纹、钩环材料等。 Suitable attachment means include (without limitation) any mechanical fasteners, such as screws, nails, clips, U-shaped staples, suture needle, thread, hook and loop materials.
一个或多个附接装置可以用来将复合非织造纤维制品附接到多个基底。 One or more attachment means may be used to attach the composite nonwoven fibrous article to a plurality of substrates. 示例性基板包括(但不限于)车辆部件;车辆内部(即客厢、发动机舱、行李箱等);建筑物壁(即内壁表面或外壁表面);建筑物天花板(即内天花板表面或外天花板表面);用于形成建筑物壁或天花板的建筑材料(如天花板贴片、木材部件、石膏板等);隔间;金属薄片;玻璃基板;门;窗;机械部件;器具元件(即器具内表面或器具外表面);管道或软管的表面;计算机或电子元件;声音记录或复制装置;用于器具、电脑等的外壳或箱体。 Exemplary substrates include (but are not limited to) members of the vehicle; a vehicle interior (i.e. the passenger compartment, engine compartment, trunk, etc.); building wall (i.e. the inner wall surface or exterior wall surface); ceiling of a building (i.e., interior ceiling surface or exterior ceiling surface); means for forming a wall or ceiling of a building construction materials (e.g., ceiling tile, wood component, gypsum board, etc.); compartment; metal foil; glass substrates; doors; windows; mechanical member; tool elements (i.e., within the appliance appliance surface or exterior surface); pipe or hose surface; a computer or electronic component; a sound recording or reproducing apparatus; for appliances, computers, housing or casing.
颗粒加载的复合非织造纤维网是已知的。 The composite particle loaded nonwoven webs are known. 用于生成颗粒加载的非织造纤维网的已知方法一般要求非织造纤维网自身具有用于支承结合非织造/颗粒系统的足够的强度和物理特性。 Nonwoven webs known method for generating a particle-loaded nonwoven web generally require itself has sufficient strength for supporting the binding and physical characteristics of the nonwoven / particles system. 如果对于特定应用,非织造网没有用于支承颗粒的足够的强度或硬度,则已知方法极不凑效。 If there is no sufficient strength for supporting the hardness of the particles, or for a particular application, the nonwoven web, the known method is not very ridiculous. 由于在形成颗粒系统之后将纤维掺杂在粘结颗粒系统内是非常困难的,所以制备粘结的颗粒加载的纤维网也有问题。 Since the system after formation of the particles within the doped fiber bonded particulate system is very difficult, so the particle loaded web of the bonded also a problem.
本发明的某些示例性实施例可以通过形成下述复合非织造纤维网来克服这个问题,在所述复合非织造纤维网中,在将非织造纤维与颗粒相互缠结以形成复合非织造纤维网之前,颗粒形成基本上连续的三维网。 Certain exemplary embodiments of the present invention can overcome this problem by forming a composite nonwoven fibrous web below, the composite nonwoven fibrous web, the fibrous nonwoven entangled with each other to form a composite particle before nonwoven web, the particles form a substantially continuous three-dimensional network. 在某些实施例中,这种复合非织造纤维网不依赖于非织造纤维网的物理特性来支承颗粒加载的非织造纤维网的结合结构。 In certain embodiments, the composite nonwoven fibrous web does not depend on the physical properties of the nonwoven web to support the binding nonwoven fibrous web particle loading.
通过首先将一组颗粒形成基本上连续的三维网,可以避免在将纤维自身粘结或粘结到颗粒时所产生的问题。 problems in the fibers themselves adhered or bonded to the particles produced by a first set of particles form a substantially continuous three-dimensional network, it can be avoided. 特别是,直径非常小的纤维(如亚微米纤维)或天然的脆弱或不连续的纤维通常生成强度非常小的粘结性差的网。 In particular, very small diameter fibers (e.g., sub-micrometer fibers) or natural fibers or discontinuous frangible typically generate very little strength poor adhesion network. 制备这种脆弱网的方法的实例包括熔喷、Torobin方法和一些商品形式的气流成网法。 Examples of methods for preparing such frangible webs include meltblown, Torobin methods, and some commercial forms of air-laying.
使用强度不是很高的颗粒纤维也可以提供优于使用强度较高的纤维的优点。 The particles used is not very high strength fibers may also provide advantages over the use of high strength fibers. 由于亚微米纤维和超细微纤维的本身的脆弱性质,所以它们提供非常高的比表面积,非常高的比表面积对例如过滤和隔离这样的应用有利。 Due to the fragile nature of the sub-micrometer fibers and ultrafine fibers themselves, they provide very high specific surface area, very high specific surface area of such advantageous applications such as filtration and isolation. 主要由于直径小的纤维(如亚微米纤维和超细微纤维)的脆弱性,所以它们也具有压碎成较高密度结构的较大趋势。 Mainly due to the vulnerability of small diameter fibers (e.g., sub-micrometer fibers and ultrafine fibers), they have a greater tendency to crush higher density structure. 通过形成分散在整个成品网中的连续颗粒嵌入相,可支承脆弱的纤维,并可以避免过度压紧。 By continuously forming the particles dispersed throughout the finished mat is embedded in the phase, may support the fragile fiber, and to avoid excessive compression. 与密度较高的网相比,密度较低的细小纤维网一般会显示具有较低的压降,同时由于直径不变而仍显示具有大的比表面积。 Compared to higher network density, low density fine webs typically exhibit lower pressure drop, and because a constant diameter and still exhibit a large specific surface area. 这种密度较低的结构也可以使被纤维或其它颗粒填塞的颗粒表面的量最小化。 Such low density structure may be that the amount of the particle surface is packed fibers or other particles is minimized.
因此,在另一方面,本发明提供制备复合非织造纤维网的方法,该方法包括:形成嵌入相,嵌入相具有基本上连续的三维网中的一组颗粒;和形成基质相,基质相包含围绕颗粒形成三维网的一组纤维。 Thus, in another aspect, the present invention provides a method of making a composite nonwoven fibrous web, the method comprising: forming an embedded phase, fitted with a set of particles having a substantially continuous three-dimensional network; and a matrix phase is formed, the matrix phase comprising a population of fibers forming a three-dimensional network around the particles.
在某些示例性实施例中,可以通过生成颗粒流并将该颗粒流与气载纤维流结合来进行用于形成根据本发明的复合非织造纤维网的处理。 In certain exemplary embodiments, and the particle stream may be airborne fiber stream and combination process for forming a nonwoven web in accordance with the present invention by generating a composite particle stream. 然后可以将结合的流收集到网中。 The combined stream may then be collected into the network. 在一些示例性实施例中,可以在混合或收集处理期间或在单独的处理步骤中将颗粒粘结到纤维。 In some exemplary embodiments, or it may be a separate process step in the particles adhered to the fibers during the mixing process or collection.
已知用于将颗粒流添加到非织造纤维流的多种方法。 known for adding a plurality of particle flow to a nonwoven fiber stream. 在美国专利No. 4,118,531 (Hauser)、No. 6,872,311 (Koslow)和No. 6,494,974 (Riddell)中以及在美国专利申请公布No. 2005/0266760 (Chhabra 和Isele)、No. 2005/0287891 (Park)和No. 2006/0096911 (Brey等人)中描述了合适的方法。 (Riddell) in US Patent No. 4,118,531 (Hauser), No. 6,872,311 (Koslow) and No. 6,494,974 and the publication No. 2005/0266760 (Chhabra and patent applications in the US Isele), No. 2005/0287891 (Park), and No. 2006/0096911 (Brey et al) describes a suitable method. 本申请人已经发现的是,通过首先在基本上连续的三维网中形成一组颗粒,可以避免当将颗粒流与纤维流结合时将纤维自身粘结或将纤维粘结到颗粒时所产生的问题。 The Applicant has found that when a group of particles by first forming a substantially continuous three-dimensional network of particles can be avoided when the combined flow stream with the fibers, the fibers bonded to itself or to bond the fibers to the granules produced when problem. 优选地,在将颗粒嵌入在非织造纤维流中以形成非织造纤维网之前,将颗粒粘结在一起以形成基本上连续的三维网。 Preferably, the particles are embedded prior to the nonwoven fiber stream to form a nonwoven web, the particles are bonded together to form a substantially continuous three-dimensional network.
在一些示例性实施例中,在将非织造纤维与颗粒相互缠结以形成复合非织造纤维网之前,将颗粒粘结在一起以形成基本上连续的三维网。 In some exemplary embodiments, before the nonwoven fibrous entangled with each other to form a composite particle nonwoven fibrous web, the particles are bonded together to form a substantially continuous three-dimensional network. 在某些示例性实施例中,可以利用热量、压力、溶剂、粘合剂、辐射(如通过颗粒的固化性组分的辐射固化)、缠结、振动等等实现颗粒粘结。 In certain exemplary embodiments, it is possible using heat, pressure, solvents, adhesives, radiation (e.g., curable by radiation curing of composite particles), entanglement, vibration or the like particles to achieve bonding.
在某些示例性实施例中,可以在网内(例如轴向或径向)形成颗粒密度梯度。 In certain exemplary embodiments, the particle density gradient can be formed in the network (e.g., axial or radial). 轴向形成颗粒密度梯度意指沿着与网厚度方向垂直的方向上的网长度,在网的一端处的每平方面积的颗粒量与在另一端处的量不同。 Mean particle density gradient is formed axially along the web length in the direction perpendicular to the direction of web thickness, the amount of particles per square at one end of the web with different amounts at the other end. 另一方面,径向的颗粒密度梯度(如当将网旋拧成基本圆柱形时)意指颗粒量沿着网的径向(如厚度)方向有差别。 On the other hand, the radial gradient of the particle density (e.g., when the spin-twisted substantially cylindrical mesh) means the amount of particles along a radial web (such as thickness) direction of the difference.
密度(如基于数量、重量或体积的颗粒、吸附剂或纤维组浓度)的变化不必是线性的,而是可根据需要而有差别。 Density (e.g., based on the number, weight or volume of particles, fibers, or groups adsorbent concentration) changes need not be linear, but may be differentiated according to need. 例如,密度可随着轴向或径向梯度、网的整个厚度上增加或减小数量浓度梯度、从靠近厚度方向上的网中心线的峰值减小为限定网厚度的一个或两个主表面附近的较低值的数量浓度梯度而以单阶跃变化、多阶跃变化、正弦的方式而有差别。 For example, with axial or radial density gradients, across the thickness of the web to increase or decrease the number of concentration gradient decreases from the peak in the network close to the centerline of the thickness direction or both major surfaces defining a thickness of the web number concentration gradient near the lower value of the change in a single step, multi-step change, a difference sinusoidal manner.
合适的纤维流(由其制备根据本发明的复合非织造纤维网)包括生成非织造纤维的已知方法以及提供将形成为基本上连续的三维网的颗粒与在纤维网形成处理期间形成的纤维流结合的机会的任何其它方法。 During the Suitable fiber flows (prepared therefrom The composite nonwoven fibrous webs of the invention) comprises generating a known method and to provide a nonwoven formation process of forming a substantially continuous three-dimensional network of particles in the web any other method of binding fibers chance stream. 在某些示例性实施例中,纤维流可以包含亚微米纤维、微纤维或亚微米纤维和微纤维的共混物。 In certain exemplary embodiments, the fiber stream may comprise sub-micrometer fibers, microfibers or blends of sub-micrometer fibers and microfibers.
许多处理可以用于制备亚微米纤维流,包括(但不限于)熔喷、熔体纺丝、静电纺纱、气体射流原纤化或它们的组合。 treatment may be used to prepare a number of sub-micrometer fiber stream, including (but not limited to) melt blowing, melt spinning, electrospinning, gas jet fibrillation, or combination thereof. 特别合适的方法包括(但不限于)在美国专利No. 3, 874, 886 (Levecque 等人)、No. 4, 363, 646 (Torobin)、No. 4, 536, 361 (Torobin)、No. 5,227,107 (Dickenson 等人)、No. 6,183,670 (Torobin)、No. 6,269,513 (Torobin)、No. 6,315,806 (Torobin)、No. 6,743,273 (Chung 等人)、No. 6,800,226 (Gerking)、德国专利DE 19929709C2 (Gerking)和PCT 申请公布No. WO 2007/001990A2 (Krause 等人)中所公开的方法。 Particularly suitable methods include (without limitation) in U.S. Patent No. 3, 874, 886 (Levecque et al.), No. 4, 363, 646 (Torobin), No. 4, 536, 361 (Torobin), No. 5,227,107 (Dickenson et al.), No. 6,183,670 (Torobin), No. 6,269,513 (Torobin), No. 6,315,806 (Torobin), No. 6,743, 273 (Chung et al), No. 6,800,226 (Gerking), German Patent DE 19929709C2 (Gerking) and the method of PCT application Publication No. WO 2007 / 001990A2 (Krause et al.) disclosed.
合适的用于形成亚微米纤维的方法也包括静电纺纱法,例如在美国专利No. I, 975, 504 (Formhals)中所述的那些方法。 Method suitable for forming sub-micrometer fibers also include electrospinning method, for example, in U.S. Pat. No. I, 975, those 504 (Formhals) in the. 在美国专利No. 6, 114, 017 (Fabbricante 等人)、No. 6,382,526B1 (Reneker 等人)和No. 6,861,025B2 (Erickson 等人)中描述了其它合适的用于形成亚微米纤维的方法。 In U.S. Patent No. 6, 114, 017 (Fabbricante et al.), No. 6,382,526B1 (Reneker et al.) And No. 6,861,025B2 (Erickson et al.) Describes other suitable for forming a method of sub-micrometer fibers.
许多方法也可以用于制备微纤维流,包括(但不限于)熔喷、熔体纺丝、原丝挤出、丛丝形成、纺粘法、湿纺丝、干纺丝或它们的组合。 Many methods may be used for preparing micro fiber stream, including (but not limited to) melt blowing, melt spinning, extruding filaments, plexifilament formation, spunbonding, wet spinning, dry spinning, or The combination. 在美国专利No. 6,315,806 (Torobin)、No.6, 114,017 (Fabbricante 等人)、No.6,382,526B I (Reneker 等人)和No. 6, 861, 025B2 (Erickson等人)中描述了合适的用于形成微纤维的方法。 In U.S. Pat. No. 6,315,806 (Torobin), No.6, 114,017 (Fabbricante et al.), No.6,382,526B I (Reneker et al.) And No. 6, 861, 025B2 (Erickson et al. ) describe a suitable method for forming microfibers. 或者,可以使用例如美国专利No. 4, 118, 531 (Hauser)中所述的方法,将一组微纤维形成或转变为短纤维,并将其与一组亚微米纤维结合。 Alternatively, for example, U.S. Pat. No. 4, 118, 531 (Hauser) according to the method, a set of microfibers formed or converted to staple fibers and combined with a population of sub-micrometer fibers.
在一些示例性实施例中,制备复合非织造纤维网的方法包括:通过混合纤维流、水刺法、湿法形成、丛丝形成或它们的组合来将粗微纤维组与细小微纤维组、超细微纤维组或亚微米纤维组结合。 In some exemplary embodiments, the method of making a composite nonwoven fibrous web comprising: mixing fiber streams, hydroentangling, wet forming, plexifilament formation, or a combination thereof to the fine and coarse micro fiber population fiber groups, ultrafine or sub-micrometer fibers of the fiber group binding group. 在将粗微纤维组与细小、超细或亚微米纤维组结合时,可以使用一种或两种类型的多个纤维流,并可按任何顺序结合这些纤维流。 In crude and fine microfibers, ultrafine or sub-micrometer fibers when combined, the plurality of fibers may be used one or two types of streams, and these fibers may be combined in any order streams. 这样,可以形成非织造复合纤维网,从而显示具有多种所需的浓度梯度和/或分层结构。 In this manner, nonwoven composite fibrous web formed thereby exhibit various desired concentration gradients and / or layered structure.
例如,在某些示例性实施例中,可将该组细小、超细或亚微米纤维与该组粗微纤维结合以形成不均一的纤维混合物。 For example, in certain exemplary embodiments, the set may be fine, ultrafine or sub-micrometer fibers are combined with the set of crude microfibers to form an inhomogenous mixture of fibers of. 在某些示例性实施例中,将该组细小、超细或亚微米纤维的至少一部分与该组微纤维的至少一部分混合。 In certain exemplary embodiments, the population of fine, mixing at least a portion of at least a portion of the microfibers of ultrafine or sub-micrometer fibers. 在其它示例性实施例中,可将该组细小、超细或亚微米纤维形成为包含该组微纤维的垫层上的覆盖层。 In other exemplary embodiments, the set may be fine, ultrafine or sub-micrometer fibers is formed on the underlayer comprising microfibers of the cover layer. 在某些其它示例性实施例中,可将该组微纤维形成为包含该组细小、超细或亚微米纤维的垫层上的覆盖层。 In certain other exemplary embodiments, the microfibers may be formed as a group including the fine, the covering layer on an underlayer of ultrafine or sub-micrometer fibers.
在其它示例性实施例中,与形成混合的原丝气流相反,可以操作两个或更多个纤维形成模具以形成单独的层。 In other exemplary embodiments, the gas stream to form a mixed strand contrary, may operate two or more fiber-forming mold to form a separate layer. 当元件横越在旋转轴柄上时,模具也可并列操作以形成不同的分层效果。 When the element traverses on the rotating mandrel, the mold may operate in parallel to form different layered effect. 可以通过在模具中的一个或多个中使用不同的聚合物或多组分纤维进行额外的性能改变。 Additional properties may be altered by one or more in a mold used in different polymer or multicomponent fibers.
也可以使用推进收集器轴柄使粒子加载器将颗粒仅添加到网的目标区域来形成梯度或均匀分层的过滤元件。 may also be used to promote particle collector mandrel loading will cause the particles to the target area network only added to form a uniform or gradient layered filter element. 这可通过与较宽的模具接合使用狭窄的粒子加载器或通过在粒子加载器中使用图案化进料辊而实现。 This may be achieved by engagement with the wider use of narrow particle loader mold or by using a patterned feed roll in the particle loader. 进料辊使用机加工的腔体来控制辊相对于刮粉刀翻转时的体积进料速率。 Feed rollers using machined cavities to control the volume of the feed roller with respect to the rate at which the doctor blade flip. 通过改变进料辊的整个面上(或周围)的腔体体积,可控制颗粒的局部进料,因此,控制所得的网中局部增加的颗粒重量。 By changing the cavity volume of the entire surface of the feed roll (or around), the feed particles can be controlled locally, so that locally control the resulting increase in net weight of the particles.
另一种方法是在粒子加载器中使用分段料斗。 Another method using a segmented hopper in the particle loader. 将颗粒仅添加到想进行进料的分段区域。 The particles were added to a staging area only want to feed. 这种方法也会允许在分段区域中使用不同的粒子,以允许使用两种粒子尺寸或控制处理过的吸附剂或具有特殊性能的吸附剂的添加。 This approach also allows the use of different particles in the segmented regions to allow the use of two particle sizes or controlling the addition of the adsorbent or adsorbent-treated with special properties. 多个粒子加载器可用于改变加载到目标区域中的粒子的量或类型。 Loading a plurality of particles may be used to change the amount or type of particle loaded into the target area.
通过使用这些方法,可以形成为特定应用而定制的直接形成的复合非织造纤维网。 By using these methods, it may be formed for specific applications tailored composite nonwoven fibrous web is formed directly. 例如,细小聚丙烯纤维的内层可形成为与有助于减少坍陷和脱落的轴柄芯直接相邻。 For example, an inner layer of fine polypropylene fibers can be formed with the help reduce sloughing and shedding shank directly adjacent the core. 可紧邻内层设置用于一次分离的粒子加载的网的中间层。 It may be provided for the inner layer adjacent to the primary separation of particles loaded intermediate layer web. 另外,在中间层上,可形成所需的功能的外层,例如外层可具有较大的孔尺寸以在到达一次分离层之前移除较大的污染物和/或具有较大直径的纤维以充当额外的预过滤层。 Further, on the intermediate layer, the outer layer of desired functionality can be formed, for example, the outer layer may have a larger pore size to remove larger contaminants and / or fibers having a larger diameter before reaching the primary separation layer to act as additional pre-filter layer. 本领域的技术人员也可实现许多其它可以的布置方式,预计这些布置方式将落在本发明的范围内。 Those skilled in the art may also be implemented in many other arrangements can be expected that these arrangements fall within the scope of the present invention.
在收集期间,根据纤维的状况和微纤维和亚微米纤维的相对比率,在纤维和颗粒之间以及纤维本身之间可以进行一些粘结。 During the collection, depending on the condition of the fibers and the relative ratio of sub-micrometer fibers and microfibers is, in and between the fibers and particles between the fibers themselves can make some bonding. 然而,可能理想的是在收集的网中在纤维和颗粒或纤维本身之间进行进一步粘结,从而得到所需的抱合力的基质,从而使网更可处理且能够更好地将任何亚微米纤维保持在基质内(“粘结”纤维本身意指将纤维牢固粘附在一起,因此,当网经受正常处理时纤维一般不会分离)。 However, it may be desirable to further bond between the fibers and the particles or the fibers themselves in the collected web to give the desired cohesion of the matrix, so that the web can be further processed and may be any better submicron fibers held within the matrix ( "bonding" is meant the fibers of the fiber itself firmly adhered together, thus, the fibers generally do not separate when the web is subjected to normal handling).
在某些示例性实施例中,可以将微纤维和亚微米纤维的共混物粘结在一起。 In certain exemplary embodiments, the adhesive may be a blend of micro fibers and sub-micrometer fibers together. 例如,可以使用热粘结、粘合剂粘结、粉状粘结剂、水刺法、针刺法、压延或它们的组合而实现粘结。 For example, thermal bonding, adhesive bonding, powdered binder, hydroentangling, needlepunching, calendering, or a combination thereof and effect bonding. 可使用在点粘结工艺中施加热和压力或通过平滑压延辊的常规粘结技术,但此类工艺可能引起不期望的纤维变形或网压缩。 Applying heat and pressure may be used in point-bonding process or by smooth calender rolls conventional bonding techniques, but such processes may cause undesired deformation of fibers or web compression. 在美国专利申请公布No. 2008/0038976A1中公开了更加优选的用于粘结纤维、特别是微纤维的技术。 In U.S. Patent Application Publication No. 2008 / 0038976A1 discloses a more preferred method for bonding fibers, particularly microfibers in the art.
(10)通过粘合剂或包括(但不限于)夹片、托架、螺栓/螺杆、钉子和条带的任何其他附接装置将复合非织造纤维网附接到另一基板。 (10) by adhesive or including (but not limited to) clips, any other attachment means bracket, bolts / screws, nails and strips the composite nonwoven fibrous web attached to the other substrate.
参见图2,该图示出用于制备根据本发明的复合非织造纤维网的设备300的一个示例性实施例的示意图。 Referring to Figure 2, which shows a schematic view of an exemplary embodiment for the preparation of the composite apparatus embodiment of the present invention according to a nonwoven fibrous web 300. 图2示出用于制备非织造颗粒加载的网的颗粒加载设备60。 Figure 2 shows a particle loading apparatus 60 for making nonwoven particle network loading. 颗粒74通过料斗76,穿过进料辊78和刮粉刀80。 Particles 7476 passing through the feed roller 78 and the doctor blade 80 through a hopper. 电动刷辊82使进料辊78旋转。 Electric brush roller 82 so that rotation of the feed rollers 78. 可使螺纹调整器84移动以改进幅材横向均匀度和通过进料辊78的颗粒渗漏速率。 Adjustment screw 84 can move in order to improve cross-web uniformity and through the feed rollers 78 of the leak rate of particles. 总颗粒流速可通过改变进料辊78的旋转速率来调整。 The total flow rate of the particles by varying the rate of rotation of the feed rollers 78 can be adjusted. 可以改变进料辊78的表面以优化用于不同颗粒的进料性能。 Feed rollers may be varied to optimize the surface 78 of the feed performance for different particles. 颗粒74的瀑布状物86从进料辊78穿过斜槽88落下,并移出沟槽94,从而形成颗粒流96。 86 particles was 74 falls through chute 88 fall from a feed roller 78, and out of the grooves 94, 96 so that the particle stream is formed.
颗粒流96形成基本上连续的三维网14中的一组颗粒。 particle stream 96 is formed of a set of particles 14 in a substantially continuous three-dimensional network. 在某些优选实施例中,粘结这些颗粒的至少一部分以形成基本上连续的三维网。 In certain preferred embodiments, at least a portion of the bonding of the particles to form a substantially continuous three-dimensional network. 可使用例如热量、压力、溶剂、粘合齐U、辐射、振动、缠结等等而实现颗粒之间的粘结。 E.g. heat, pressure, solvents, bonding together U, radiation, vibration, etc. to achieve entanglement bonding between the particles may be used. 图2示出一个目前优选的实施例,在该实施例中,颗粒流96包含热塑性聚合物颗粒,并且通过加热粘结颗粒使颗粒表面软化。 Figure 2 illustrates a presently preferred embodiment, in this embodiment, the particle stream 96 comprising a thermoplastic polymer particles, bonding the particles by heating the particles to soften the surface. 可以通过使用任何手段(例如使用从任选加热元件102和/或102'流出的热空气流)进行加热。 It may be (e.g., using heat and / or 'hot air flow coming out of element 102, optionally 102) by use of any means of heating.
如图2整体所示,从纤维形成设备101流出的纤维流100拦截颗粒流96。 As shown in FIG 2 as a whole, the device 101 exiting the fiber stream 100 is formed from the fiber stream to intercept particles 96. 如图2中虚线所示,可从任选纤维形成模具IOla将任选第二纤维流IOOa引入颗粒流96中。 2 in dotted lines, may be formed in an optional second mold IOla IOOa fiber stream 96 is introduced from the particle stream optionally fibers. 这些纤维流在经过距离21时合并,并变成在收集设备3上沉积为复合非织造纤维网10'。 These streams are combined in the fiber over a distance 21, and becomes deposited on the collection apparatus 3 as a composite nonwoven fibrous web 10 '.
本发明的示例性实施例可以通过以下方式来实施:在连续筛网型收集器(例如图2所示的带型收集器19)上、在筛网覆盖筒(未示出)上或使用本领域已知的替代方法来收集复合非织造纤维网10'。 Exemplary embodiments of the present invention may be implemented in the following way: In the continuous screen-type collector (e.g., as shown in FIG. 2 type collector belt 19), in a screen-covered drum (not shown) or to collect a composite nonwoven fibrous web 10 'using alternative methods known in the art. 可以将复合非织造纤维网10'卷绕成卷23。 May be a composite nonwoven fibrous web 10 'is wound into a roll 23.
在图2中示出的某些示例性实施例,复合非织造纤维网1(V可以被移动收集器19承载于受控加热装置200下方,受控加热装置200安装在收集器19上方。在示例性加热装置200中,将受热空气(通过空气导管207供应给加热装置200)的细长或刀状流210吹到在加热装置200下方的收集器19上移动的复合非织造纤维网10'上。 In certain exemplary embodiments FIG. 2 embodiment illustrated, the composite nonwoven fibrous web 1 (V collector 19 may be moved to a controlled heating means below the carrier 200, controlled heating means 200 mounted in collector 19 above. in the exemplary heating device 200, the heated air (supplied through air conduit 207 to heating means 200) is an elongated or knife-like stream 210 is blown in the heating device 19 moves on the collector 200 beneath the composite nonwoven fibrous network 10 '.
大量空气穿过微纤维形成设备,当纤维在区域215中到达收集器时,必须对这些空气进行处置。 large amount of air passing through the micro fibers forming apparatus, when the fibers reach the collector in the region 215, the air must be disposed of. 排气装置214优选充分延伸以位于加热装置200的狭槽209下方(以及如下所述,沿着幅材纵向延伸距离218超过受热的流210并穿过标记为220的区域)。 Exhaust means 214 preferably extends sufficiently to the heating apparatus 200 of the slot 209 below (and as described below, extends longitudinally along the web 210 and from the region labeled 220 through 218 over a heated stream). 足够的空气穿过区216中的网和收集器以使网在多种处理空气流下保持在适当的位置上。 Sufficient air passes through the region 216 and the collector of the network so that the network in a variety of process air flow is maintained at an appropriate position. 在热处理区217下部的板中的足够的开度允许处理空气穿过网,同时提供足够的阻力以保证空气的均匀分配。 A sufficient degree of opening in a lower portion of the plate 217 allows the heat treatment zone in the process air through the mesh, while providing enough resistance to ensure even distribution of air. 为了进一步控制加热,使聚集团块在施加受热空气流210之后迅速经受淬火。 To further control heating, aggregated lumps applying heated air stream 210 after subjected to quenching quickly. 这种淬火可通过在聚集团块离开受控热控制流210之后立即抽出复合非织造纤维网10'上方和遍及整个复合非织造纤维网10'的周围空气而获得。 Such quenching may be aggregated clumps away controlled thermal flow control 210 immediately after extraction composite nonwoven fibrous web 10 'above and throughout the composite nonwoven fibrous web 10' is obtained by ambient air. 图2中的数字220代表下述区域,在该区域中,在网穿过热空气流之后通过排气装置抽取穿过网的周围空气。 Numeral 220 represents the following regions in FIG. 2, in this region, after the web passes through the stream of hot air through the ambient air drawn through the exhaust sites. 排气装置(未示出)可以沿着收集器延伸距离218超过加热装置200以确保整个复合非织造纤维网10'的彻底冷却和/或淬火。 Exhaust means (not shown) may extend along the collector from more than 218 to ensure that the heating device 200 throughout the composite nonwoven fibrous web 10 'is completely cooled and / or quenched.
图3示出用于制备根据本发明的复合非织造纤维网的设备400的替代的示例性实施例的示意图。 Figure 3 shows a schematic view according to an alternative preparation of a composite nonwoven fibrous web according to the present invention, apparatus 400 according to an exemplary embodiment. 图3示出用于以熔喷法制备非织造纤维网的颗粒加载设备60的用法。 Figure 3 illustrates the use of particles for the meltblown nonwoven web prepared SYSTEM loading device 60. 熔化形成纤维的聚合物材料通过入口63进入非织造模具62,流过模具腔体66的模具狭槽64 (都用虚线示出),并作为一系列原丝68通过喷丝孔(例如喷丝孔67)退出模具腔体66。 Molten fiber-forming polymeric material through the inlet 63 enters nonwoven die 62, flows through the mold cavity of the mold 66 the slot 64 (both shown in dashed lines), and as a series of strands 68 through a nozzle (e.g., nozzle hole 67) to exit the mold cavity 66. 通过空气歧管70输送的细化用流体(通常为空气)在模具出口72处将原丝68细化成纤维98。 Thinning fluid (usually air) delivered through the air manifold 70 of the die 72 at the outlet of the filaments 68 into fibers 98.
同时,颗粒74通过料斗76,穿过进料辊78和刮粉刀80。 Meanwhile, particles 7476 passing through the feed roller 78 and the doctor blade 80 through a hopper. 电动刷辊82使进料辊78旋转。 Electric brush roller 82 so that rotation of the feed rollers 78. 可使螺纹调整器84移动以改进幅材横向均匀度和通过进料辊78的颗粒渗漏速率。 Adjustment screw 84 can move in order to improve cross-web uniformity and through the feed rollers 78 of the leak rate of particles. 总颗粒流速可通过改变进料辊78的旋转速率来调整。 The total flow rate of the particles by varying the rate of rotation of the feed rollers 78 can be adjusted. 可以改变进料辊78的表面以优化用于不同颗粒的进料性能。 Feed rollers may be varied to optimize the surface 78 of the feed performance for different particles. 颗粒74的瀑布状物86从进料辊78穿过斜槽88落下。 86 particles was 74 falls through chute 88 fall from a feed roller 78. 空气或其它流体穿过歧管90和腔体92,并导向原丝68当中的流96中穿过沟槽94落下的颗粒74和聚合物材料的纤维98。 Air or other fluid through the manifold 90 and the cavity 92, the flow guide 96 and among the strands 68 through the slot 94 in the falling particles 74 and fibers 98 of the polymeric material. 颗粒74和纤维98的混合物形成自支承复合非织造纤维网10”,并着陆于多孔收集器150。可任选地是,可以从任选辊152进料任选支承层50,任选支承层50可以用于收集和支承复合非织造纤维网10”。 Mixture of particles 74 and fibers 98 are formed self-supporting composite nonwoven fibrous web 10 ", and lands on the porous collector 150. Optionally, the can 50, the support layer optionally feed roller 152 optionally support layer optionally and the support 50 can be used to collect the composite nonwoven fibrous web 10. "
图4示出用于制备根据本发明的复合非织造纤维网的设备500的另一个示例性实施例。 FIG. 4 illustrates the preparation of another exemplary embodiment of an apparatus for the composite nonwoven fibrous web 500 in accordance with the present invention. 图4示出用替代的熔喷纤维形成法制备复合非织造纤维网的颗粒加载设备60的用法。 Figure 4 illustrates the use of particles prepared by a composite nonwoven fibrous web loading apparatus 60 for forming an alternative meltblown fibers.
如图4总体所示,示例性设备500利用两个大致垂直的、倾斜设置的熔喷模具66,这两个熔喷模具66朝收集器100喷射大致相对的熔喷纤维流162、164。 As shown in FIG 4 Overall, the exemplary device 500 with two generally vertical inclined meltblowing die 66, the die 66 toward two meltblowing collector 100 generally opposite the injection stream 162 of meltblown fibers, 164. 同时,颗粒74穿过料斗166并进入导管168中。 Meanwhile, particles 74 pass through hopper 166 and into conduit 168. 气动涡轮170迫使空气穿过第二导管172,并因此将颗粒从导管168抽到第二导管172中。 Air turbine 170 forcing air through a second conduit 172, and thus the particles are drawn into the second conduit 172 from the conduit 168. 颗粒穿过喷嘴174作为内聚的颗粒流176而喷出,内聚的颗粒流176与熔喷纤维流162和164结合。 Particles through the nozzle 174 as stream 176 discharged cohesive particles, cohesive particle stream 176 combined with the stream of meltblown fibers 162 and 164. 颗粒流176与熔喷纤维流162和164形成自支承非织造纤维网10'",并着陆于多孔收集器150。关于使用图4设备进行熔喷的方式的进一步的细节对于本领域的技术人员将是熟悉的。 Particle stream stream 176 of meltblown fibers 162 and 164 form a self-supporting nonwoven web 10 '', and landed on the porous collector 150. Further details regarding the manner of FIG. 4 using a device meltblown apparent to those skilled in the art It will be familiar.
本发明也涉及在多种吸收应用中使用本发明的复合非织造纤维网的方法。 The present invention also relates to methods of using the composite nonwoven fibrous web of the present invention in a variety of absorption applications. 在示例性实施例中,制品可以用作气体过滤制品、液体过滤制品、吸声制品、表面清洁制品、细胞生长支承制品、药物递送制品、个人卫生制品或伤口敷料制品。 In an exemplary embodiment, the article may be used as a gas filtration article, a liquid filtration article, a sound absorption article, a surface cleaning article, a cellular growth support article, a drug delivery article, a personal hygiene article, or a wound dressing article.
在某些示例性气体过滤应用中,例如本文所述的网可以提供得到很大改进的粒子捕集,而没有过度的压降。 In certain exemplary gas filtration applications, such as described herein may provide the network greatly improved particle collection, without excessive pressure drop. 颗粒本身可主动从空气捕集目标物质或气溶胶。 Particles themselves actively capture a target substance or an aerosol from the air. 通过利用较低纤维密度,这种系统将会比高度堆积的细小纤维层具有较低的压降。 By using a low fiber density, such a system will have a lower pressure drop than the height of the fine fiber layer deposited. 纤维和颗粒也可被充电为驻极体,从而提供额外的颗粒捕集性能。 Fibers and particles may also be electret charged, to provide additional particulate collection performance.
另外,由于密实度低而使得压降减小,所以本发明的某些示例性实施例的密实度低的复合非织造纤维网在气体过滤应用中可能是有利的。 Further, due to the low density such that the reduced pressure drop is low Solidity certain exemplary embodiments of the present invention, a composite nonwoven fibrous web in gas filtration applications be advantageous. 降低纤维网的密实度一般会减小其压降。 Decreasing the Solidity fiber web will generally reduce its pressure drop. 也可以导致在本发明的密实度低的亚微米复合非织造纤维网加载颗粒时压降增大降低。 It may also result in increased pressure drop decrease at low Solidity sub-micrometer of the present invention the composite particle loaded nonwoven fibrous web. 部分由于细小亚微米纤维网的密实度较高,所以目前用于形成颗粒加载的亚微米纤维的方法导致较粗微纤维网的较高压降。 Methods section due to the higher Solidity of the fine sub-micrometer fiber web, it is currently used to form a particle-loaded sub-micrometer fibers results in higher pressure drops coarser micro fiber web.
另外,由于亚微米纤维可以提供改进的颗粒捕集效率,所以将亚微米纤维用在气体过滤中可能是特别有利的。 Further, since the sub-micrometer fibers may provide improved particle capture efficiency, the sub-micrometer fibers in gas filtration may be particularly advantageous. 特别是,亚微米纤维可以比较粗纤维更好地捕集直径小的气载颗粒。 In particular, sub-micrometer fibers may be relatively coarse fibers to better capture small diameter airborne particulates. 例如,亚微米纤维可以更有效率地捕集维度小于约1000纳米(nm)、更优选地小于约500nm、甚至更优选地小于约lOOnm、最优选地低于约50nm的气载颗粒。 For example, sub-micrometer fibers may more efficiently capture a dimension of less than about 1000 nanometers (nm), more preferably less than about 500 nm, and even more preferably less than about lOOnm, and most preferably below about 50nm of airborne particulates. 气体过滤器(例如本例)在以下应用中可能特别可用:个人防护呼吸器;暖通空调(HVAC)过滤器;汽车空气过滤器(如汽车发动机空气清洁器、汽车排气过滤、汽车客舱空气过滤);和其它气体颗粒过滤。 A gas filter (e.g. in this example) may be particularly useful in the following applications: personal protection respirators; HVAC (HVAC) filters; automotive air filters (e.g., automotive engine air cleaners, automotive exhaust gas filtration, automotive passenger compartment air filtration); and other gas-particulate filtration.
本发明的某些示例性复合非织造纤维网形式的密实度低的包含亚微米纤维的液体过滤器也可以具有下述优点:在保持用于捕集亚微米的液载颗粒的小孔尺寸的同时,改进深度加载。 Certain exemplary Solidity composite nonwoven fibrous web according to the present invention forms a low liquid filter comprises sub-micrometer fibers may have the following advantages: the liquid contained in a small holding sub-micron particle capture pore size, while improving the depth of loading. 这些性质通过允许过滤器捕集测试用颗粒中的更多者而不发生堵塞来改进加载性能。 These properties allow the filter by collecting test more of particles to improve the load performance without clogging occurs.
另外,对于某些液体过滤应用,连续颗粒相可以允许限定的孔结构,从而提供深度过滤功能。 In addition, the liquid was filtered for some applications, may allow for the continuous pore structure of the particulate phase is defined so as to provide depth filtration function. 此外,较大的纤维和/或颗粒表面积可以用于促进与过滤器的化学粘结或反应。 In addition, larger fibers and / or particle surface area may be used to facilitate chemical bonding of the filter or the reaction. 颗粒相也可以用于抑制由于处理、加工或使用而导致的压碎。 Particulate phase may also be used to suppress the handling, processing, or use of crushing.
本发明的某些示例性复合非织造纤维网也可以用作隔热或隔音材料。 Certain exemplary composite nonwoven fibrous webs of the invention can also be used as thermal or acoustic insulation material. 将网用作隔热材料可有利地利用本发明的某些实施例所提供的低纤维密度。 The web as insulating material may advantageously utilize low fiber density certain embodiments of the present invention is provided. 纤维密度较低可以允许隔离捕获更多的滞留空气,从而减小导热率。 Lower fiber density allows isolating capture more air entrapment, thereby reducing the thermal conductivity. 细小纤维的增大的表面积也可以用于消音和吸音。 Fines increased surface area may also be used for noise and sound absorption. 可以用于这种实施例的颗粒包括(但不限于)相变材料、气味吸收剂和气凝胶。 Particles may be used for this embodiment include (but are not limited to) the phase change material, odor absorbers and aerogels.
根据本发明的某些示例性实施例的低密度复合非织造纤维网也可以用在用于表面清洁(例如个人卫生和清洁应用中)的擦拭物中。 The low density composite nonwoven fibrous web of certain exemplary embodiments of the present invention may also be used in a wipe for cleaning the surface (e.g., personal hygiene and cleaning applications) in. 密度低的结构可以允许用于更好的流体控制,同时可选择颗粒,从而得到例如吸收性、抗微生物性或气味控制的性质。 Low density structures may allow for better fluid control, while select particles to obtain properties such as absorbency, antimicrobial or odor control. 当用作擦拭物时,密度低的结构也提供更好的将灰尘、污垢和碎屑捕获在织物内的机会。 When used as a wipe, low density structure will provide a better opportunity within the fabric dust, dirt and debris capture. 某些示例性实施例的密实度低的复合非织造纤维网所提供的结构也可以有效地用于提供柔软的擦拭物,同时密实度低可以提供用于清洁剂的贮存器和用于捕获碎屑的孔体积大的优点。 Some structures low Solidity exemplary embodiment of the composite nonwoven fibrous web may also be provided effectively used to give a soft wipe, while low Solidity may be provided a reservoir for cleaning agents and for capturing broken the pore volume of the advantages of large chips. 本发明的一些示例性实施例的密实度低的包含亚微米纤维的复合非织造纤维网也可以是用于支承隔膜的优选基底。 Some low Solidity exemplary embodiment of a composite nonwoven fibrous web comprises sub-micrometer fibers The present invention may also be preferred substrate for supporting the diaphragm. 密实度低的细小纤维网可充当隔膜的物理支承,但也可充当深度预过滤器,从而提高隔膜的寿命。 Low Solidity fine web may act as a physical support for the membrane, but may also act as a depth pre-filter, thereby increasing the life of the diaphragm. 使用这种系统可充当高效对称或不对称的隔膜。 Using such a system can act as effective symmetric or asymmetric membrane. 这种隔膜的应用包括离子滤出、超滤、反渗透、选择性粘结和/或吸附以及燃料电池传送和反应系统。 Such applications include ion membrane was filtered off, ultrafiltration, reverse osmosis, selective binding and / or adsorption, and fuel cell transport and reaction systems.
本发明的一些特定实施例的密实度低的亚微米复合非织造纤维网也可以是用于促进细胞生长的可用的合成基质。 Some specific embodiments of low Solidity sub-micrometer composite nonwoven fibrous webs of the invention may also be available for synthetic substrate to promote cell growth. 具有细小亚微米纤维的开放式结构可以是模拟天然存在系统,并促进更类似于体内的行为。 Open structure with fine sub-micrometer fibers may be an analog of naturally occurring systems and promotes more in vivo like behavior. 这与目前的产品(例如可得自Donaldson Corp.(Minneapolis, Minnesota)的Donaldson Ultra-ffeb™ 合成ECM),在该产品中,高密实度纤维网充当合成基底膜,在纤维基质内很少有细胞渗透或没有细胞渗透。 This current products (e.g., available from Donaldson Corp. (Minneapolis, Minnesota) in Donaldson Ultra-ffeb ™ Synthesis of the ECM), in the product, the web acts as a high-density synthetic basement membrane, there is little in the fiber matrix no cell penetration or cell infiltration.
根据本发明的某些示例性实施例的密实度低的粒子加载的亚微米纤维网也可以用于促进非织造网内的细胞生长。 The low Solidity certain exemplary embodiments of the present invention, the particle-loaded sub-micrometer fiber web may also be used to facilitate cell growth in a nonwoven web. 具有足够细小的纤维可使得细胞可将纤维用作合成基质,同时颗粒可用于供应营养物质、生物活性化合物、抗微生物制剂等等。 Having a sufficiently fine fibers such as synthetic fibers may be the cell matrix, while the particles may be used to supply nutrients, bioactive compounds, antimicrobial formulation and the like. 如果非织造纤维网的密实度过高,则目标细胞不可能在纤维基质内生长,从而可能导致不同的细胞行为。 If compacting the nonwoven web is too high, the target cell can not grow in the fiber matrix, which may result in a different cell behavior.
在一些应用中,根据本发明的某些示例性实施例的非织造复合纤维网可以用于药物递送和/或伤口敷料。 In some applications, according to certain exemplary embodiments the nonwoven composite web embodiment of the present invention may be used in drug delivery and / or wound dressings. 例如,颗粒可被选择为用于递送到伤口进行处理的药物。 For example, the particles may be selected for delivery to a wound treatment medicament.
在某些示例性实施例中,如所述的复合非织造纤维网也可以具有许多有利的独特的处理优点。 In certain exemplary embodiments, as the composite nonwoven fibrous web may have a number of unique advantageous process advantages. 例如,在某些示例性实施例中,可制备可用的成品,该成品仅包含单层,但包含颗粒和纤维的混合物,所述纤维可以包含微纤维、超细微纤维和/或亚微米纤维。 For example, in certain exemplary embodiments, may be prepared by the finished product, the finished product contains only a single layer, but comprising a mixture of particles and fibers, the fibers may comprise microfibers, ultrafine microfibers and / or sub-micrometer fibers. 这种单层纤维网可以提供重要的制备效率;例如,通过去除层合工艺及设备并通过减少中间材料的数量,可以降低产品复杂性和浪费。 Such single-layer fiber web may provide important production efficiency; e.g., by removing the laminating processes and equipment and by reducing the number of intermediate material, the product can reduce the complexity and waste. 考虑到制备本发明的某些示例性实施例的网的直接网形成性质,本发明的某些示例性实施例的网可以是十分经济的,在所述直接网形成性质中,在一个必要的直接操作中将形成纤维的聚合物材料转变到网中。 Considering the net net direct certain exemplary embodiments of the present invention is prepared forming properties, some exemplary network embodiment of the present invention can be very economical, the web is formed directly in nature, in a necessary direct fiber-forming operation in the transition to the polymeric material web. 另外,如果网的纤维均具有相同的聚合物组合物,则该网可完全回收利用。 Further, if the web fibers have the same polymer composition, the web may be completely recyclable.
另外,本发明的某些示例性实施例的复合非织造纤维网可以用于制备多层产品,也可以以多种物理形式使用该复合非织造纤维网。 Further, the composite nonwoven fibrous web of certain exemplary embodiments of the present invention may be used to prepare multilayer product may be using the composite nonwoven fibrous web in a variety of physical forms. 例如,它可以是模制的或褶皱的,并可以以其收集的网形式使用它。 For example, it may be a molded or pleated, and may be used with its gathered web form. 在本发明的某些示例性实施例中,可以通过使用直径非常小的纤维(如超细微纤维和/或亚微米纤维),为网提供极大增加的纤维表面积,从而具有例如改进过滤和隔热或隔音性能这种有益效果。 In certain exemplary embodiments of the present invention, by the use of very small diameter fibers (e.g., ultra-fine fibers and / or sub-micrometer fibers), to provide significant net increase in fiber surface area, thereby improving filtration and separated with e.g. thermal or sound insulation performance of such benefit. 在一些实施例中,可以通过使用不同直径的纤维为特定用途定制流体过滤和吸音中的吸收性。 In some embodiments, the fluid may be customized filtration and sound absorption in the absorbent fibers for specific purposes by using different diameters. 遍及复合非织造纤维网的压降也可以较低。 Throughout the composite nonwoven fibrous web may drop lower.
在某些示例性实施例中,根据本发明的复合非织造纤维网公开了多孔片材材料可以用于捕集或吸附多种化学材料,包括有机溶剂、无机蒸气和本领域技术人员熟悉的其它材料。 In certain exemplary embodiments, the composite according to the present invention, discloses a nonwoven web of sheet material may be porous for trapping or more chemical adsorbing material comprises an organic solvent, and inorganic vapor skilled in the art other materials familiar.
正如本领域的技术人员所熟知,也可以采用一个或多个额外的层,如覆盖网、加强层、粒状过滤层(例如带电的非织造网或其他功能层或装饰层)。 As the skilled person in the art, may be used one or more additional layers, such as overlay, the reinforcement layer, the granular filtering layer (e.g. a nonwoven web of charged or other functional or decorative layers). 本发明所公开的复合非织造纤维网对于制备旨在用于包含溶剂的大气环境中的个人呼吸器的可置换滤筒可能是尤其可用的。 The composite nonwoven fibrous web according to the present invention is disclosed for the preparation of personal respirators intended for containing a solvent atmosphere in a replaceable cartridge may be particularly useful. 然而,本发明所公开的复合非织造纤维网可具有多种额外的用途。 However, the composite nonwoven fibrous web as disclosed in the present invention may have a variety of additional uses.
例如,示例性的复合非织造纤维网可以用于个人或集体防护设备,如化学防护套装、罩子、单独的封闭结构(如隔绝室)、掩蔽结构(如帐篷或其他便携式或永久式结构)以及其他的空气被所述多孔薄片制品过滤后进入其中的个人或集体防护设备。 For example, exemplary composite nonwoven fibrous web may be used for personal or collective protective equipment, such as chemical protective suits, cover, separate closed structure (e.g., isolation chamber), the masking structure (such as tents or other portable or permanent formula ) as well as other air entering the porous sheet article wherein individual or collective protective equipment after filtration. 本发明所公开的网也可以由适当的外壳支承,从而得到过滤器,以用于调节进入或在封闭区(例如建筑物或车辆)内循环的气体。 The network disclosed in the present invention may also be supported by a suitable housing, whereby the filter, or for adjusting into the enclosed area (such as a building or a vehicle) within the circulating gas. 本发明所公开的网也可与另外的(如现有的)过滤器结构组合起来,用于形成预过滤器或后过滤器。 The network disclosed in the present invention may also be combined with additional (e.g., conventional) filter arrangement for forming a pre-filter or post-filter. 其他用途是本领域的技术人员所熟知的。 Other uses are those of skill in the art.
以上描述了本发明的示例性实施例,并在以下通过下面的实例进一步对本发明进行说明,不应当以任何方式将这些实例理解为对本发明范围的限制。 the above described exemplary embodiments of the present invention, and the present invention is further illustrated by the following examples, without in any way should these examples be construed as limiting the scope of the invention. 相反,应当清楚地理解,可以采取多种其他实施例、修改形式及其等同物,在本领域的技术人员阅读本文的说明之后,在不脱离本发明的精神和/或所附权利要求书的范围的前提下,这些其他实施例、修改形式及其等同物将显而易见。 Instead, it should be clearly understood, may take various other embodiments, modifications, and equivalents thereof which, after reading those skilled in the art described herein, without departing from the spirit and / or claimed in the appended claims of the present invention, under the scope of these other embodiments, modifications, and equivalents thereof will become apparent. 此外,虽然阐述本发明广义范围的数值范围和参数是近似值,但在具体实施例中所列出的数值是尽可能精确地记录的。 In addition, although the numerical ranges and parameters set forth in the broad scope of the present invention are approximations, the numerical values set forth in the specific examples embodiments is recorded as precisely as possible. 然而,任何数值固有地包含某些误差,这些误差不可避免地存在于各自测试测量中的标准偏差所致。 However, any numerical value inherently contains certain errors, which inevitably exist in the respective testing measurements the standard deviation caused. 在最低程度上,每一个数值参数不是意图将等同原则的应用限制于权利要求保护的范围,但至少应该根据所报告的有效数字的数、并运用惯常的四舍五入法来解释每一个数值参数。 At a minimum number, each numerical parameter is not intended to be of significant figures of the doctrine of equivalents to limit the application scope of the claims, but should at least be based on the reported and by applying ordinary rounding techniques each numerical parameter.
可通过美国专利No. 4,536,361中所述的方法将各个颗粒流与纤维流结合来制备示例性复合纤维网。 each particle stream can flow to the fiber by the method described in U.S. Patent No. 4,536,361 will be prepared in conjunction with exemplary composite fibrous web. 该方法被构造为使得朝水平真空收集器将纤维形成模具定位在水平面下方成大约45度的角度。 The method is configured such that the horizontal vacuum collector positioned below the fiber-forming die at an angle of approximately 45 degrees in a horizontal plane. 从纤维模具上方的托盘筛出颗粒,使得颗粒流竖直地落到纤维流中。 Fibers from the tray above the mold sieved particles, so that the fibers fall vertically particle flow stream. 在真空收集器上收集复合纤维网,并从收集带将该复合纤维网卷起。 Composite web was collected on the vacuum collector and the collection belt from the composite web winding. 在收集带上形成网之后,没有进行任何额外的粘结。 After the collection belt to form a web, without any additional adhesive.
纤维处理使用 Total Petrochemicals (Houston, Texas)的3960 级聚丙烯。 fiber treatment using Total Petrochemicals (Houston, Texas) 3960 grade polypropylene. 使用3/4"直径单螺杆挤出机将聚合物熔化,并将该聚合物进料到亚微米纤维形成模具。将模具加热到290°C,并以每分钟7克的速率向模具进料聚合物。在每平方英寸80磅的压力下将室温空气进料到模具。对所有样品,纤维处理条件保持恒定。 3/4 "diameter single screw extruder melts the polymer and the polymer is fed into the sub-micrometer fibers forming the mold. The mold was heated to 290 ° C, and at a rate of 7 grams per minute fed to the mold polymer. at a pressure of 80 pounds per square inch of room temperature air fed to the mold. kept constant for all samples, fiber treatment conditions.
样品E : 240粗粒氧化铝研磨粉末。 Sample E: 240 grit aluminum oxide abrasive powder.
使用扫描电子显微镜法测量样品A的中值纤维直径;样品A的中值纤维直径为0. 86微米。 Median fiber diameter of Sample A was measured using a scanning electron microscopy; median fiber diameter of Sample A 0.86 microns. 测量每一个样品的基重,并在表I中记录结果。 Measuring the basis weight of each sample and the results recorded in Table I below.
根据每一个样品中的纤维的基重计算的纤维质量比率在所有样品中几乎保持恒定。 In all the samples remains almost constant in accordance with the mass ratio of the fibers in each sample fiber basis weight calculations.
测量取决于所施加的压力的每一个样品的厚度,作为颗粒加载的网样品的抗压碎性的测量。 The thickness of each sample measurements are dependent on the applied pressure, as an anti-particle-loaded web sample measurements of crushing. 使用15、30、60、120、150和225帕斯卡压力,并以密耳为单位测量网厚度(一密·耳对应于25微米)。 Use 15,30,60,120,150 and 225 pascals pressure, and is measured in mils thickness of the web (corresponding to a secret-ear 25 microns). 抗压碎性结果被表达为在给定的所施加的压力下测量的网厚度与15Pa压力下的网厚度的比率,因此,被归一化为100%。 Crush resistance results are expressed as the ratio of web thickness and web thickness measured under a pressure of 15Pa at a given pressure being applied, thus, normalized to 100%. 表II中示出测量厚度和抗压碎性随施加的压力结果而变。 Table II shows the results of measuring the pressure and the thickness applied with the crush resistance becomes. 所有颗粒加载的复合纤维网显示出与对照网相比得到改进的抗压缩性。 All particle loading composite web exhibits improved as compared with the control network resistance to compression.
定特征、结构、材料或特性包括在本发明的某些示例性实施例中的至少一个实施例中。 Feature, structure, material, or characteristic comprises at least one exemplary embodiment] In certain embodiments of the present invention. 因此,贯穿本说明书的多处出现的短语(例如“在一个或多个实施例中”、“在某些实施例中”、“在一个实施例中”或“在实施例中”)并非不可避免地参见本发明的某些示例性实施例中的同一实施例。 Thus, appearances of the phrases throughout this specification (e.g., "in one or more embodiments," "in some embodiments", "in one embodiment" or "in an embodiment") is not impossible Referring to avoid certain exemplary embodiments of the present invention in the same embodiment. 此外,某些特征、结构、材料或特性可以任何适合的方式在一个或多个实施例中结合。 Moreover, certain features, structures, materials, or characteristics may be in any suitable manner in conjunction with one or more embodiments.
虽然本说明书详细描述了某些示例性实施例,但应当理解,本领域的技术人员在理解上述内容后,可以易于设想这些实施例的更改形式、变型形式和等同形式。 While the specification has described in detail certain exemplary embodiments, it is to be appreciated that those skilled in the art upon understanding of the foregoing, may readily conceive of alterations to these embodiments, modifications and equivalents. 因此,应当理解,本发明不应不当地受限于以上示出的示例性实施例。 Accordingly, it should be understood that the present invention is not to be unduly limited to the above exemplary embodiment shown. 特别是,如本文所用,端点的数值范围的表述旨在包括该范围内所包括的所有数值(如I至5包括I、1. 5、2、2. 75、3、3. 80、4和5)。 In particular, as used herein, the expression numerical ranges by endpoints is intended to include all numbers subsumed within that range includes (e.g., I to 5 comprising I, 1. 5,2,2. 75,3,3. 80,4 and 5). 另外,假设本文所使用的所有数值都用术语“约”修饰。 It is assumed that all numbers used herein by the term "about". 此外,本文提及的所有出版物和专利全文以引用方式并入本文,犹如被特别地和单独地指出的各个出版物或专利都以引用方式并入的程度。 Furthermore, all publications and patents mentioned herein are incorporated herein by reference in entirety as if each was specifically and extent publication or patent were individually indicated to be incorporated by reference. 以上描述了多种示例性实施例。 Above describe various exemplary embodiments. 这些实施例和其它实施例都在以下权利要求书的范围内。 These embodiments and other embodiments are within the scope of the following claims.
1. 一种复合非织造纤维网,包含: 嵌入相,所述嵌入相包含一组颗粒,每个单独颗粒与至少一个其它颗粒面对面接触,由此形成颗粒链状的由单独颗粒构成的基本上连续的三维网;以及基质相,所述基质相包含围绕所述颗粒形成三维网的一组纤维。 1. A composite nonwoven fibrous web, comprising: embedding the phase, the phase comprises a set of embedded particles, each of the individual particles with particles of at least one other face to face contact, thereby forming a chain of particles consisting essentially of individual particles continuous three-dimensional network; and a matrix phase, said matrix phase comprising a population of fibers forming a three-dimensional network around the particles.
2.根据权利要求I所述的复合非织造纤维网,其中所述一组颗粒选自无机颗粒、有机颗粒或它们的组合。 2. The composite according to claim nonwoven fibrous web of claim I, wherein said particles are selected from a group of inorganic particles, organic particles, or a combination thereof.
3.根据权利要求I所述的复合非织造纤维网,其中所述一组颗粒包含非均一的固态颗粒、基本上均一的固态颗粒、中空泡、短纤维或它们的组合。 3. The composite according to claim nonwoven fibrous web of claim I, wherein the set of non-uniform particles comprise solid particles, substantially uniform solid particles, hollow bubbles, staple fibers, or combinations thereof.
4.根据权利要求I所述的复合非织造纤维网,其中所述一组颗粒包含吸收剂、吸附剂、活性炭、阴离子交换树脂、阳离子交换树脂、分子筛或它们的组合。 According to claim composite nonwoven fibrous web of claim I, wherein the particles comprise a set of an absorbent, an adsorbent, activated carbon, an anion exchange resin, cation exchange resin, molecular sieves, or a combination thereof.
5.根据权利要求I所述的复合非织造纤维网,其中所述一组颗粒的中值直径为至少一微米(μ m)。 According to claim composite nonwoven fibrous web of claim I, wherein the set median particle diameter of at least one micrometer (μ m).
7.根据权利要求I所述的复合非织造纤维网,其中包含所述一组纤维的三维网为基本上连续的。 According to claim composite nonwoven fibrous web of claim I, wherein three-dimensional network comprising a set of fibers is substantially continuous.
8.根据权利要求I所述的复合非织造纤维网,其中所述一组纤维为取向的。 According to claim composite nonwoven fibrous web of claim I, wherein the group of fibers are oriented.
10.根据权利要求9所述的复合非织造纤维网,其中所述一组纤维的中值纤维直径在从O. 2 μ m到O. 9 μ m的范围内。 Claim 10. The composite nonwoven fibrous web of claim 9, wherein said set of fibers median fiber diameter of from 2 [mu] m into the O. O. 9 μ m in range.
12.根据权利要求11所述的复合非织造纤维网,其中所述一组纤维的中值纤维直径在从2 μ m到50 μ m的范围内。 Claim 12. The composite nonwoven fibrous web of claim 11, wherein said set of fibers median fiber diameter of from 2 μ m to 50 μ m in the range.
13.根据权利要求I所述的复合非织造纤维网,其中所述纤维网具有厚度,并显示具有小于10%的密实度。 Claim 13. The composite nonwoven fibrous web of claim I, wherein the fibrous web has a thickness and exhibits a Solidity of less than 10%.
14.根据权利要求I所述的复合非织造纤维网,其中所述一组纤维包含聚合物纤维。 Claim 14. The composite nonwoven fibrous web of claim I, wherein the group of fibers comprise polymeric fibers.
15.根据权利要求14所述的复合非织造纤维网,其中所述聚合物纤维包含聚丙烯、聚乙烯、聚酯、聚对苯二甲酸乙二醇酯、聚对苯二酸丁二醇酯、聚酰胺、聚氨酯、聚丁烯、聚乳酸、聚乙烯醇、聚苯硫醚、聚砜、液晶聚合物、聚乙烯-共-乙酸乙烯酯、聚丙烯腈、环状聚烯烃、聚氧甲烯、多烯键热塑性弹性体或它们的组合。 Claim 15. The composite nonwoven fibrous web of claim 14, wherein said polymeric fibers comprise polypropylene, polyethylene, polyester, polyethylene terephthalate, polyethylene terephthalate, polybutylene terephthalate , polyamide, polyurethane, polybutene, polylactic acid, polyvinyl alcohol, polyphenylene sulfide, polysulfone, liquid crystal polymers, polyethylene - co - vinyl acetate, polyacrylonitrile, cyclic polyolefm, polyoxymethylene alkenyl, multi-ethylenically thermoplastic elastomer or a combination thereof.
16.根据权利要求14所述的复合非织造纤维网,其中所述聚合物纤维包含聚烯烃纤维。 Claim 16. The composite nonwoven fibrous web of claim 14, wherein the polymeric fibers comprise polyolefin fibers.
17.根据权利要求I所述的复合非织造纤维网,其中所述一组颗粒的至少一部分被粘结到分开形成的纤维的至少一部分。 Claim 17. The composite nonwoven fibrous web of claim I, wherein at least a portion of the population of particulates are bonded to at least a portion of the separately formed fibers.
18.根据权利要求17所述的复合非织造纤维网,其中粘结到分开形成的纤维的至少一部分的所述一组颗粒利用以下方法进行粘结:热粘结、粘合剂粘结、粉状粘结剂粘结、摩擦粘结、水刺法、针刺法、压延或它们的组合。 Claim 18. The composite nonwoven fibrous web of claim 17, wherein at least a portion of the fibers bonded to a separate set of particles formed by the following bonding methods: thermal bonding, adhesive bonding, powder shaped adhesive bonding, friction bonding, hydroentangling, needlepunching, calendering, or a combination thereof.
19.根据权利要求I所述的复合非织造纤维网,其中围绕所述颗粒形成三维网的所述一组纤维包含亚微米纤维。 19. The composite nonwoven fibrous web in claim I wherein said particles are formed around the three-dimensional network of fibers comprising a set of sub-micrometer fibers.
20.根据权利要求19所述的复合非织造纤维网,其中所述基质相还包含一组微纤维。 20. The composite nonwoven fibrous web according to claim 19, wherein said matrix phase further contains a set of micro fibers.
21.根据权利要求20所述的复合非织造纤维网,其中所述一组微纤维在组成上与所述一组亚微米纤维相同。 Claim 21. The composite nonwoven fibrous web of claim 20, wherein the microfibers and sub-micrometer fibers to the same compositionally.
22.根据权利要求20所述的复合非织造纤维网,其中所述一组微纤维与所述一组亚微米纤维分开形成。 Claim 22. The composite nonwoven fibrous web of claim 20, wherein the microfibers are formed with the set of sub-micrometer fibers to separate.
23.根据权利要求20所述的复合非织造纤维网,其中所述复合非织造纤维网具有厚度,并且亚微米纤维数与微纤维数的比率在所述复合非织造纤维网的整个厚度上有差别。 Claim 23. The composite nonwoven fibrous web of claim 20, wherein the composite nonwoven fibrous web has a thickness, and the ratio of the number of sub-micrometer fibers and microfibers have a number across the thickness of the composite nonwoven fibrous web difference.
24.根据权利要求23所述的复合非织造纤维网,其中所述亚微米纤维数与所述微纤维数的比率在所述复合非织造纤维网的整个厚度上递减。 Claim 24. The composite nonwoven fibrous web of claim 23, wherein the ratio of the number of sub-micrometer fibers to the number of micro fibers decreases in the entire thickness of the composite nonwoven fibrous web.
25.根据权利要求23所述的复合非织造纤维网,其中所述亚微米纤维数与所述微纤维数的比率从峰值变化到较低值,所述峰值靠近由所述复合非织造纤维网的一半厚度限定的中心线,所述较低值在所述复合非织造纤维网的表面处。 Claim 25. The composite nonwoven fibrous web of claim 23, wherein the number of sub-micrometer fibers to the ratio of the number of micro fibers varies from a peak to a lower value, close to the peak from the composite nonwoven fibrous web the half of the thickness center line is defined, a lower value at the surface of the composite nonwoven fibrous web.
26.根据权利要求I所述的复合非织造纤维网,还包含支承层。 Claim 26. The composite nonwoven fibrous web of claim I, further comprising a support layer.
27.根据权利要求26所述的复合非织造纤维网,其中所述支承层包含非织造物、织造物、针织织物、泡沫层、膜、纸质层、背胶层或它们的组合。 Claim 27. The composite nonwoven fibrous web of claim 26, wherein said support layer comprises a nonwoven, a woven, a knitted fabric, a foam layer, a film, a paper layer, adhesive layer, or a combination thereof.
28.根据权利要求26所述的复合非织造纤维网,其中所述支承层包含聚合物型非织造物。 Claim 28. The composite nonwoven fibrous web of claim 26, wherein said support layer comprises a polymeric nonwoven fabric.
29.根据权利要求26所述的复合非织造纤维网,其中所述支承层包含粘结的短纤维网,并且其中所述支承层利用以下方法进行粘结:热粘结、粘合剂粘结、粉状粘结剂、水刺法、针刺法、压延或它们的组合。 Claim 29. The composite nonwoven fibrous web of claim 26, wherein said support layer comprises a bonded staple fiber webs, and wherein said support layer bonded by the following methods: thermal bonding, adhesive bonding , powdered binder, hydroentangling, needlepunching, calendering, or a combination thereof.
30. 一种制备复合非织造纤维网的方法,包括: a.形成嵌入相,所述嵌入相包含基本上连续的三维网中的一组颗粒,每个单独颗粒与至少一个其它颗粒面对面接触,由此形成颗粒链;以及b.形成基质相,所述基质相包含围绕所述颗粒形成三维网的一组纤维。 30. A composite nonwoven fibrous web prepared, comprising:. A form fitted with a set of embedded particulate phase comprising a substantially continuous three-dimensional network of particles of each individual particle in contact with at least one other face to face, thereby forming chains of particles; and b. forming a matrix phase, said matrix phase comprising a population of fibers forming a three-dimensional network around the particulates.
31.根据权利要求30所述的方法,其中所述一组颗粒包含非均一的固态颗粒、基本上均一的固态颗粒、中空泡、短纤维或它们的组合。 31. The method according to claim 30, wherein the set of non-uniform particles comprise solid particles, substantially uniform solid particles, hollow bubbles, staple fibers, or combinations thereof.
32.根据权利要求30所述的方法,其中所述一组颗粒包含吸收剂、吸附剂、活性炭、阴离子交换树脂、阳离子交换树脂、分子筛或它们的组合。 32. The method according to claim 30, wherein the particles comprise a set of an absorbent, an adsorbent, activated carbon, an anion exchange resin, cation exchange resin, molecular sieves, or a combination thereof.
33.根据权利要求30所述的方法,其中所述一组颗粒的中值直径为至少一微米(μπι)。 33. The method according to claim 30, wherein the median diameter of a set of particles of at least one micrometer (μπι).
34.根据权利要求30所述的方法,其中所述一组颗粒的中值直径小于I μ m。 34. The method according to claim 30, wherein the median diameter of a set of particles smaller than I μ m.
35.根据权利要求30所述的方法,其中包含所述一组纤维的三维网为基本上连续的。 35. The method according to claim 30, wherein said set comprising three-dimensional network of fibers is substantially continuous.
36.根据权利要求30所述的方法,其中所述一组纤维为取向的。 36. The method according to claim 30, wherein said set of fibers are oriented.
37.根据权利要求30所述的方法,其中所述一组纤维的中值直径小于I μ m。 37. The method according to claim 30, wherein the median diameter of a set of fibers is less than I μ m.
38.根据权利要求37所述的方法,其中所述一组纤维的中值纤维直径在从O. 2 μ m到O. 9μπι的范围内。 38. The method according to claim 37, wherein said set of fibers median fiber diameter in the range from the O. 2 μ m is O. 9μπι.
39.根据权利要求30所述的方法,其中所述一组纤维的中值直径为至少Ιμπι。 39. The method according to claim 30, wherein the median diameter of a set of fibers is at least Ιμπι.
41.根据权利要求30所述的方法,其中所述纤维网具有厚度,并显示具有小于10%的密实度。 41. The method according to claim 30, wherein said web has a thickness and exhibits a Solidity of less than 10%.
42.根据权利要求30所述的方法,其中所述一组纤维包含聚合物纤维。 42. The method according to claim 30, wherein said set of fibers comprise polymeric fibers.
43.根据权利要求42所述的方法,其中所述聚合物纤维包含聚丙烯、聚乙烯、聚酯、聚对苯二甲酸乙二醇酯、聚对苯二酸丁二醇酯、聚酰胺、聚氨酯、聚丁烯、聚乳酸、聚乙烯醇、聚苯硫醚、聚砜、液晶聚合物、聚乙烯-共-乙酸乙烯酯、聚丙烯腈、环状聚烯烃、聚氧甲烯、多烯键热塑性弹性体或它们的组合。 43. The method according to claim 42, wherein said polymeric fibers comprise polypropylene, polyethylene, polyester, polyethylene terephthalate, polyethylene terephthalate, polybutylene terephthalate, polyamide, polyurethane, polybutene, polylactic acid, polyvinyl alcohol, polyphenylene sulfide, polysulfone, liquid crystal polymers, polyethylene - co - vinyl acetate, polyacrylonitrile, cyclic polyolefm, polyoxymethylene, polyenes key thermoplastic elastomer or a combination thereof.
44.根据权利要求42所述的方法,其中所述聚合物纤维包含聚烯烃纤维。 44. The method according to claim 42, wherein said polymeric fibers comprise polyolefin fibers.
45.根据权利要求30所述的方法,其中所述一组颗粒的至少一部分被粘结到分开形成的纤维的至少一部分。 At least a portion 45. The method of claim 30, wherein the population of particulates are bonded to at least a portion of the separately formed fibers.
46.根据权利要求45所述的方法,其中粘结到分开形成的纤维的至少一部分的所述一组颗粒利用以下方法进行粘结:热粘结、粘合剂粘结、粉状粘结剂粘结、摩擦粘结、水刺法、针刺法、压延或它们的组合。 46. The method according to claim 45, wherein at least a portion of said fibers bonded to a separate set of particles formed by the following bonding methods: thermal bonding, adhesive bonding, powdered binder bonding, friction bonding, hydroentangling, needlepunching, calendering, or a combination thereof.
47.根据权利要求30所述的方法,其中围绕所述颗粒形成三维网的所述一组纤维包含亚微米纤维。 47. The method according to claim 30, wherein said particles are formed around the set of three-dimensional network of fibers comprising sub-micron fibers.
48.根据权利要求47所述的方法,其中所述基质相还包含一组微纤维。 48. The method according to claim 47, wherein said matrix phase further contains a set of micro fibers.
49.根据权利要求48所述的方法,其中所述一组微纤维在组成上与所述一组亚微米纤维相同。 49. The method according to claim 48, wherein the microfibers and sub-micrometer fibers to the same compositionally.
50.根据权利要求48所述的方法,其中所述一组微纤维与所述一组亚微米纤维分开形成。 50. The method according to claim 48, wherein said forming a set of said microfibers with a separate set of sub-micrometer fibers.
51.根据权利要求48所述的方法,其中所述复合非织造纤维网具有厚度,并且亚微米纤维数与微纤维数的比率在所述复合非织造纤维网的整个厚度上有差别。 51. The method according to claim 48, wherein the composite nonwoven fibrous web has a thickness, and the ratio of the number of sub-micrometer fibers to the number of microfibers difference across the thickness of the composite nonwoven fibrous web.
52.根据权利要求51所述的方法,其中所述亚微米纤维数与所述微纤维数的比率在所述复合非织造纤维网的整个厚度上递减。 52. The method of claim 51, wherein the ratio of the number of sub-micrometer fibers to the number of micro fibers decreases in the entire thickness of the composite nonwoven fibrous web.
53.根据权利要求51所述的方法,其中所述亚微米纤维数与所述微纤维数的比率从峰值变化到较低值,所述峰值靠近由所述复合非织造纤维网的一半厚度限定的中心线,所述较低值在所述复合非织造纤维网的表面处。 53. The method according to claim 51, wherein the ratio of the number of sub-micrometer fibers to the number of microfibers varies from a peak value to a lower value, defined by the peak and close to half the thickness of the composite nonwoven fibrous web centerline, the lower value at the surface of the composite nonwoven fibrous web.
54.根据权利要求30所述的方法,还包括为所述嵌入相和所述基质相中的一者或两者提供支承层。 54. The method of claim 30, further comprising providing a support layer to one or both of the embedded phase and the matrix phase.
55.根据权利要求54所述的方法,其中所述支承层包含非织造物、织造物、针织织物、泡沫层、膜、纸质层、背胶层或它们的组合。 55. The method of claim 54, wherein said support layer comprises a nonwoven, a woven, a knitted fabric, a foam layer, a film, a paper layer, adhesive layer, or a combination thereof.
56.根据权利要求54所述的方法,其中所述支承层包含聚合物型非织造物。 56. The method according to claim 54, wherein said support layer comprises a polymeric nonwoven fabric.
57.根据权利要求54所述的方法,其中所述支承层包含粘结的短纤维网,并且其中所述粘结的短纤维的至少一部分利用以下方法粘结到所述嵌入相和所述基质相中的一者或两者:热粘结、粘合剂粘结、粉状粘结剂、水刺法、针刺法、压延或它们的组合。 57. The method of claim 54, wherein said support layer comprises a bonded staple fiber webs, and wherein at least a portion of the staple fibers using a method of bonding the insert is bonded to the matrix phase and one or both phases: thermal bonding, adhesive bonding, powdered binder, hydroentangling, needlepunching, calendering, or a combination thereof.
58. 一种包含根据权利要求30所述的方法制备的复合非织造纤维网的制品,所述制品选自气体过滤制品、液体过滤制品、吸声制品、表面清洁制品、细胞生长支承制品、药物递送制品、个人卫生制品和伤口敷料制品。 58. A method comprising the composite nonwoven fibrous web prepared according to the method of claim 30 article, the article is selected from a gas filtration article, a liquid filtration article, a sound absorption article, a surface cleaning article, a cellular growth support article, a drug delivery article, a personal hygiene article, and a wound dressing article. | 2019-04-22T06:19:48Z | https://patents.google.com/patent/CN101952498B/en |
1 HER HONOUR: The defendants’ Notice of Motion, filed on 21 August 2009, seeks leave to file a Further Amended Defence in proceedings brought by the plaintiff in trespass, and in the nature of declaratory and injunctive relief. The Notice of Motion is opposed by the plaintiff.
2 The proceedings arise out of the entry by the defendants onto land leased and occupied by the plaintiff, who conducted the business of a piggery, in July 2006. The defendants went onto the property without the consent of the plaintiff in order to take photographs and film footage of the piggery, in the expectation that the defendants could establish that the plaintiff was failing to comply with appropriate standards for the maintenance and care of the animals.
3 After the defendants left the property, they caused the photographs and film to be shown to representatives of Animal Liberation NSW and to be publicised, thereby intending to provoke a prosecution by the relevant authorities. However, despite an investigation by police and the RSPCA, no action was taken against the plaintiff.
4 The plaintiff commenced proceedings in this Court on 31 January 2008 and later filed a Statement of Claim on 20 March 2008. This Statement of Claim sought aggravated and exemplary damages arising out of trespass. There were various directions hearings over the next five months, culminating in an Amended Statement of Claim on 29 August 2008, which sought declaratory and injunctive relief in relation to the film footage and photographs in the possession of the defendants. In particular, the plaintiff sought an order delivering up the photographs and film to the plaintiff, on the basis that the copyright in those images is held by the defendants on trust for the plaintiff. In the alternative, the plaintiff claimed that the defendants be restrained from any further publication.
5 Such amendments to the Statement of Claim that have occurred since August 2008 have been inconsequential. A Further Amended Statement of Claim was filed on 2 December 2008 in order to join the third defendant whose identity was revealed during discovery, and a Second Further Amended Statement of Claim was filed on 6 July 2009 in order to correct the name of the plaintiff.
6 The Defence filed in the proceedings thus far by all three defendants (on 2 October 2008 and 14 January 2009) were substantially the same, that is, they consisted of bare denials and non admissions. Following a series of unanswered letters to the defendants’ solicitors wherein the plaintiff’s solicitors drew attention to the absence of any substantive defence, the plaintiff ultimately moved on a Notice of Motion filed 2 December 2008 to have the defences struck out pursuant to rule 14.28. The Notice of Motion was heard by James J on 6 April 2009.
There is no doubt that the defence filed on behalf of the defendants was seriously defective. It was reasonable for the plaintiff's solicitors to believe that the defendant's defence would not be limited to simply traversing the plaintiff's claim to possession and that the defendants would wish to raise some affirmative matter by way of defence, the nature of which had not been disclosed in the defence which had been filed. As I have indicated, that belief on the part of the plaintiff's solicitors was well founded. Even if the first order sought in the notice of motion would not have been an appropriate order for the Court to make, in my opinion the second order sought in the notice of motion by way of alternative relief was an appropriate order to seek. The plaintiff's solicitors gave notice on several occasions of their intention to file an application in respect of the defective defence.
8 His Honour directed that the defendants file any amended defence on or before 21 April 2009 and that any matter involving the raising of any affirmative defence should be specifically pleaded.
9 On 21 April 2009 the defendants filed an Amended Defence. Significantly, for present purposes, the defence to the plaintiff’s pleading, that the defendants held the copyright in the photographs and film on trust for the plaintiff (par. 6B of the Further Amended Statement of Claim), was that, in taking the photographs and film footage, the defendants committed no wrong recognisable at law and they denied that they held copyright on trust for the plaintiff.
10 Further directions hearings were held over the following three months, during which the plaintiff was directed to file and serve its evidence by 30 June 2009. It did so. The defendants were directed to file and serve their evidence by 28 July 2009, with the plaintiff to file and serve any evidence in reply by 11 August 2009. The defendants did not comply with that timetable. Discovery is virtually complete and the matter was ready for a date for trial, subject to the defendants filing their evidence.
11 Before proceeding to a consideration of the issues, it is important to appreciate that the claim in trespass is defended simply on the basis that the plaintiff will be put to proof of its entitlement to possession of the property. The defendants admit that they intentionally entered on the land occupied by the piggery without permission. In these circumstances, it may be reasonably assumed that the defendants’ prospects of defeating the plaintiff’s claim on that score are dim.
12 Any restrictions that may be imposed upon the defendants in the future use that might be made of the photographs and film, particularly with respect to the defendants’ links to Animal Liberation, appears to be the most contentious aspect of the litigation. The defendants are in fact funded by Animal Liberation, the Executive Director of which has played an active part in the conduct of the litigation: see Affidavit of Susan Goodman of 28 August 2009, Exhibit SUG 1 tabs 7, 8, 9 and 10.
13 One further observation should be made. The alleged trespass is at the heart of the proceedings. The plaintiff’s claim, that the defendants’ copyright in the photographs and film is held on trust for the plaintiff, turns upon the defendants’ unlawful entry onto the plaintiff’s property, for the purpose of attempting to discredit the plaintiff with respect to the operation of the piggery. This inextricable link between the alleged trespass and the claim for declaratory and injunctive relief, which has been pleaded since August 2008, could not have escaped the defendants’ attention.
14 It is against that background that the application to file a Further Amended Defence, which raises for the first time a positive defence to the plaintiff’s claim for declaratory and injunctive relief, must be assessed. The defendants have been aware of this aspect of the pleadings since August 2008 and were put on notice by James J that an affirmative defence was to be specifically pleaded by 21 April 2009.
(f)(iv) they rely on a defence of unclean hands in respect of the poor welfare of pigs kept by the plaintiff at the Windridge piggery, Young, to the extent shown in the Cinematograph Film and Photographs, where that is capable of constituting cruelty within the definition of that term in the Prevention of Cruelty to Animals Act 1979.
17 The proposed Further Amended Defence gives the following particulars of cruelty, namely, that the film depicted pigs experiencing distress and suffering caused by the conditions in which they were kept, including the allegedly inadequate floor area of the stalls, overcrowding, pigs with pressure sores and bursitis resulting from inactivity, excess weight and hard substrate, and pigs with other symptoms said to indicate poor welfare, suffering and distress. It is further particularised that the cage size of the plaintiff’s piggery did not conform to the Model Code of Practice, supported by a finding by the New South Wales Police, inter alia, that "the report found no breaches of the Prevention of Cruelty to Animals Act. Although stall sizes were not the size recommended under the code of practice (pigs), the company managed this problem by placing larger sows in community pens."
18 I note that defendants’ counsel informed the Court, and the defendants’ written submissions confirm, that the defendants seek to establish from the photographs and the film that the conditions under which the pigs were farmed were relevantly cruel, but not by reference to the conditions as they appeared later when the piggery was investigated. It is proposed to call expert evidence in that regard. This aspect of the defence will necessarily cause the plaintiff to seek out and call its own expert evidence. Expert evidence has not previously figured in the proceedings.
The poor welfare of pigs shown in the Photographs and .. Film is capable of constituting cruelty within the definition of that term in the Prevention of Cruelty to Animals Act by the plaintiff in keeping pigs at the Windridge piggery which precludes the plaintiff in good conscience from any relief under a constructive trust in favour of the plaintiff against the defendants as owners of copyright in the Photographs and .. Film.
Otherwise they rely on the freedom of expression or communication in respect of government or political matters implied in the Constitution of the Commonwealth of Australia recognized in Lange v Australian Broadcasting Corporation (1997) 189 CLR 520.
(b) that leave be granted to a party to amend any document in the proceedings.
(2) Subject to section 58, all necessary amendments are to be made for the purpose of determining the real questions raised by or otherwise depending on the proceedings, correcting any defect or error in the proceedings and avoiding multiplicity of proceedings.
(b) the terms in which any such order or direction is to be made, the court must seek to act in accordance with the dictates of justice.
(vii) such other matters as the court considers relevant in the circumstances of the case.
(d) the timely disposal of the proceedings, and all other proceedings in the court, at a cost affordable by the respective parties.
(2) This Act and any rules of court are to be so construed and applied, and the practice and procedure of the courts are to be so regulated, as best to ensure the attainment of the objects referred to in subsection (1).
24 The principles enshrined by ss 56, 57 and 58 of the Act operate as a mandatory framework for the determination of pre-trial applications: Dennis v ABC NSWCA 37 ; Arthur Anderson Corporate Finance v Buzzle Operation Pty Ltd NSWCA 104 ; Haplin & Ors. v Lumley General Insurance Ltd NSWCA 372 ; Hans Pet Constructions Pty Limited v Cassar NSWCA 230. The focus of the Court’s enquiry must be, whether granting leave to amend compromises the just, timely and efficient disposition of the real issues between the parties: see Commissioner of Police for New South Wales v Industrial Commission of New South Wales & Raymond Sewell NSWCA 198 per Spigelman CJ at .
25 Considerations of cost, not just to the parties but to the judicial and administrative resources of the Court, play a significant role in the exercise of the discretion to grant leave. Of course, the exercise of the discretion assumes that the amendment will not be futile, in the sense that it would survive a motion to strike it out.
26 The defendants contend that it is fairly arguable that, to the extent that the photographs and film over which the constructive trust is claimed by the plaintiff demonstrates that the plaintiff was in fact failing to comply with appropriate standards for maintaining and/or operating the piggery, it constitutes an impropriety with "an immediate and necessary relation to the equity sued for" : Kation Pty Ltd v Lamru Pty Ltd ; Lewis v Nortex Pty Ltd (in liq) NSWCA 145 per Hodgson JA (Allsop P agreeing). In this respect, it is said that the plaintiff is precluded from claiming in good conscience that the defendants hold copyright in the images on a constructive trust. In other words, it is submitted that the plaintiff comes to equity with unclean hands.
27 Further, it is submitted that, because the relief sought is equitable relief, the plaintiff’s "clean hands" was always an issue in the proceedings. The defendants’ explanation for failing to plead this defence at an earlier time is, in effect, that it did not occur to the defendants’ solicitor until he had read the plaintiff's affidavits, which contained assertions that the plaintiff had not committed any wrongdoing in relation to the welfare of the animals at the piggery.
28 It is difficult to understand how the defendants’ solicitor could not have appreciated from the inception of the proceedings that the plaintiff disputed that its management of the piggery was in any way improper or illegal. The plaintiff’s Statement of Claim of August 2008 referred to the publication of the photographs and film “for the purpose of alleging that the plaintiff was failing to comply with appropriate standards for maintaining the animals at the piggery”. I do not find the defendants’ attempts to justify this aspect of the proposed pleadings very persuasive.
29 There are a number of intermediate steps that are implicit in and necessary to the defendants’ argument. First, the pleading that “the poor welfare of the pigs” is solely attributable to the plaintiff’s conduct or omission assumes that expert evidence is capable of establishing that proposition from an inspection of the photographs and film, without more. Second, the pleading assumes that those images provide a sufficient basis upon which an expert can express the opinion that the condition of the pigs is as a result of treatment by, or omission on the part of, the plaintiff that is capable of constituting cruelty under the Prevention of Cruelty to Animals Act. I remain doubtful that an expert opinion derived in that manner would have the necessary factual basis, but for present purposes I am prepared to assume such evidence is available and admissible. Even so, the proposed defence falls short of alleging that the plaintiff has committed a legal wrong. At its highest, it claims that the plaintiff may have committed a legal wrong.
30 The real difficulty with the defendants’ argument is the lack of the requisite nexus between the right claimed by the plaintiff as the basis for the equitable relief (ownership of the copyright) on the one hand, and the alleged conduct of the plaintiff in conducting the piggery on the other. The former arises out of the defendants’ trespass, which bears no relationship to acts of cruelty allegedly committed by the plaintiff towards the pigs.
161 ...., the operation of the maxim is not triggered by any act of wrongful conduct by a defendant, regardless of its nature or connection to the subject matter of the suit.
163 Similarly, Brandeis J has referred to there being a limitation on the types of bad conduct which trigger the operation of the maxim by saying: “Equity does not demand that its suitors shall have led blameless lives”: Loughrin v Loughrin 292 US 216 at 229 (1934). Young J has expressed the limitations on the operation of the maxim by saying, “Unless there is established one of the equitable defences, then general naughtiness or the desire of the court to censor the plaintiff’s conduct, does not enter into the equation when one is considering whether the plaintiff should get relief”: FAI Insurances Ltd v Pioneer Concrete Services Ltd (1987) 15 NSWLR 552, at 554.
179 If a plaintiff needs to prove his own bad conduct to be able to prove the circumstances which he says entitles him to an equitable remedy, that bad conduct has an immediate and necessary relation to the equity sued for.
33 I do not accept that anything said by Allsop P and/or Hodgson JA in Kation Pty Ltd v Lamru Pty Ltd ; Lewis v Nortex Pty Ltd (in liq) NSWCA 145 was intended to dilute the meaning of “an immediate and necessary relation” as discussed in these authorities. The defendants’ submissions seem to suggest that Hodgson JA qualified the requirement by observing that it was not necessary for “the relation [to] be of the nature of contributing to or constituting the equity sued for”. However, that remark must be seen in the context of the facts of that case. The Court found that the relation between fraudulent practices, carried on by two persons over a period of time and later continued by one of them, and the equity sued for was that the practices were conducive to the understatement and disposal of stock in a company, and provided an essential part of the evidentiary material supporting the finding that the equity sued for existed. The Court found that the temporal and evidentiary connection was sufficiently close to justify the application of the unclean hands doctrine.
* The defendants trespassed on the plaintiff’s land.
* The defendants took photographs and film footage.
* The copyright in the photographs and film was obtained by the defendants as a result of the trespass.
* The photos and film were published for the purpose of alleging that the plaintiff was mistreating the pigs.
35 Does the plaintiff need to prove that it mistreated the pigs in any way in order to prove these matters? The answer is demonstrably, no. The defendants’ purpose in publishing the photographs and film is admitted by the defendants. In relying upon that motive for the publication, the plaintiff does not, and need not, assert anything in relation to its treatment of the pigs. The defendants’ contention that the doctrine of unclean hands applies in the circumstances of this case must be rejected. I do not regard this proposed defence as arguable.
36 According to the plaintiff, the true explanation for the late introduction of this pleading lies in the very thinly veiled strategy of Animal Liberation to use these proceedings as a platform for the promotion of its campaign against practices in the pig-farming industry, by way of exploring the conditions of the pigs at the plaintiff’s piggery. If I am wrong in reaching the conclusion that this aspect of the proposed pleading has no prospects of success, the plaintiff’s submission that the proposed defence constitutes an abuse of process acquires additional significance, that is, if the submission is made out, it may provide a further basis for refusing leave to amend (s 58(2)(b)(vii) of the Civil Procedure Act).
To say that a purpose of a litigant in bringing proceedings which is not within the scope of the proceedings constitutes, without more, an abuse of process might unduly expand the concept. The purpose of a litigant may be to bring the proceedings to a successful conclusion so as to take advantage of an entitlement or benefit which the law gives the litigant in that event.
court by proceedings he has abused.
38 The onus is on the plaintiff to show that the defence of unclean hands is pleaded for the purpose of obtaining a collateral advantage or a benefit not reasonably related to an order that could be obtained in the proceedings : Van Der Lee & Ors v State of New South Wales & Ors NSWCA 286, per Hodgson JA (Santow JA agreeing).
I was subpoenaed to the New South Wales Supreme Court to give evidence as to the details of the individuals who allegedly trespassed and provided the evidence that was later given to the police. Interestingly the police refused to give the management a statement to assist their potential bringing of civil trespass charges. It was decided to give information to the piggery management because we decided it would be better to defend them (the trespassers) vigorously against any potential charges. The reason for this decision is that we will be able to call a lot of evidence of how the industry fails to meet its own agreed code standards and how the RSPCA fails to pursue cases of cruelty of undersized stalls particularly after they had won such a case against Boen Boe piggery after I took A Current Affair there in 1998.
40 The exhibit also contains a number of e-mails between 14 March 2007 and 22 July 2008 between Mark Pearson and, variously, members of the committee of Animal Liberation and the individual defendants, wherein the threatened action for trespass by the plaintiff is raised as a matter for urgent discussion before the next committee meeting and a teleconference between Mr Pearson and the defendants is scheduled.
41 The combination of this evidence, together with the admitted facts that Mr Pearson was compelled by the threat of court process to disclose the identity of two of the defendants, that the photographs and film taken by the defendants were given to Mr Pearson and utilised by him to advance the objects of Animal Liberation, and that the defence is being funded by Animal Liberation NSW, found a compelling inference that the proposed pleading of unclean hands is mounted for the purpose of allowing the defendants to explore the conditions in which the pigs are kept by the plaintiff.
42 In this respect, the defendants are using the proposed pleading as a means of obtaining an advantage beyond any that is available under the law and one that is not reasonably related to a judgment in the plaintiff's favour on the issue of trespass.
43 The defendants concede that "there is evidence to suggest that one purpose in defending these proceedings is to raise awareness of the condition of pigs in a commercial piggery, namely the plaintiff's farm." (Defendants’ written submissions in reply) The defendants submit however, that it is not the predominant purpose and that the plaintiff has not discharged the heavy onus it bears to satisfy the Court that there is an abuse of process. Further, it is submitted that the proposed amendment to the defence is for the predominant purpose of "vindicating the defendants in the exercise of their exclusive rights as copyright owners .... , where the imposition of a constructive trust or injunction would deprive or restrain them in the use of those rights."
44 This submission appears to ignore the fact that it is the defendants’ trespass for an ulterior purpose which gives rise to the availability of the equitable remedy sought by the plaintiff. Apart from putting the plaintiff to proof on its occupancy and exclusive possession of the property, the defendants have no arguable defence to the trespass. The plaintiff offered, before the commencement of proceedings by way of Statement of Claim, to settle the matter by the recovery of its costs, an offer that was declined. There has been an attempt at mediation which has failed. The defendants’ entry onto the property was motivated solely by the desire to gather evidence, on behalf of Animal Liberation NSW, of some wrong committed by the plaintiff towards its animals. Given that the relevant authorities failed to prosecute on the basis of that evidence, a remaining avenue is the construction of a defence that is designed to re-agitate that evidence.
45 These factors persuade me to the view that the plaintiff has discharged its onus to satisfy the Court that the proposed amended defence of unclean hands constitutes an abuse of process. This finding constitutes an alternative basis upon which I would refuse the defendants leave to amend.
The Proposed Defence of Freedom of Political Communication.
The regulation of animal welfare within Australia is generally a responsibility of state parliaments and courts. ... The parliaments of the states are provided for in the federal Constitution. Ultimately, they now draw their authority from that Constitution. The states are part of the "indissoluble Federal Commonwealth". The federal Constitution appears to contemplate that state parliaments, by analogy with the federal parliament, will be representative of the people of the state and democratically elected. No other view would be compatible with the exceptional powers afforded to the parliaments of the states in relation to the composition of the senate.
..... broadcasting of ideas about government or politics relevant to the activities of the federal or of a state parliament would fall within the principle expressed in Lange.
47 The defendants characterise the communication of the photographs and film by the defendants to Animal Liberation NSW as matters concerning the regulation of animal welfare. It is further submitted that the regulation of animal welfare is an issue that was already in existence in the proceedings before the application to amend. The first proposition may be self-evident, however the second proposition once again refuses to acknowledge that the plaintiff has only ever taken proceedings for the tort of trespass. There is no aspect of the plaintiff’s pleadings up to the present time, nor is there any aspect of the defendants’ pleadings prior to the application to amend, that puts in issue the regulation of animal welfare generally or pigs in particular.
48 The High Court in Lange v Australian Broadcasting Corporation HCA 25; (1997) 189 CLR 520 held that there existed an implied freedom of political communication but that this entitlement is not freestanding or absolute and extends only so far as is necessary to give effect to those provisions of the Constitution that prescribe the federal system of responsible government. Further, the Court held that the implied freedom will not invalidate a law enacted to satisfy some other legitimate end, provided the law is compatible with the maintenance of the constitutionally prescribed system of government and the law is reasonably appropriate and adapted, or proportional to that end.
49 The first hurdle in the way of the defendants’ argument is the absence of authority in support of the proposition that the communications between the defendants and Animal Liberation NSW are capable of coming within the scope of the principle expressed in Lange, as expounded by Kirby J. in Lenah Game Meats.
50 The latter case involved an application for interlocutory injunctive relief in order to restrain the ABC from distributing, publishing, copying or broadcasting a video of the applicant’s activities in its possum meat processing plant in Tasmania. The video had been obtained by unknown persons who had unlawfully entered onto the premises and passed the film to Animal Liberation Ltd. That organisation subsequently supplied a copy of the film to the ABC. To the extent that a trespass had been committed, the ABC was not complicit in any illegality or impropriety.
The Constitution's protection of freedom of political communication, for example, precludes the curtailment of such freedom by the exercise of legislative or executive power. It restricts lawmaking power and executive action. And, because the common law of Australia conforms to the Constitution, it has an important role in the formulation of common law principle. But it is not a mere balancing factor in a discretionary judgment as to the preferred outcome in a particular case, to be given such weight as to a court seems fit.
The regulation of animal welfare within Australia is generally a responsibility of State parliaments and courts. On the other hand, the appellant, as a corporation established under federal law, has powers and responsibilities that extend to facilitating political and governmental discourse throughout the Commonwealth. Common experience suggests that, in Australia, many of the subjects of such discourse extend across State borders. Modern media of communications have reinforced nationwide discussion of matters of general political concern. The parliaments of the States are provided for in the federal Constitution. Ultimately, they now draw their authority from that Constitution. The States are part of the "indissoluble Federal Commonwealth". The federal Constitution appears to contemplate that State parliaments, by analogy with the Federal Parliament, will be representative of the people of the State and democratically elected. No other view would be compatible with the exceptional powers afforded to the parliaments of the States in relation to the composition of the Senate. Moreover, the respondent is engaged in an export business and that business would be damaged by the broadcast of the videotape restrained by the injunction.
In these circumstances, and in respect of the activities of the appellant in this case, I would be prepared to accept, for the purposes of the present appeal, that broadcasting of ideas about government or politics relevant to the activities of the Federal Parliament or of a State parliament would fall within the principle expressed in Lange.
However, this principle does not uphold an inflexible rule. Australian law does not embrace absolutes in this matter. Many regulatory laws, federal and State, continue to operate in ways that are compatible with the representative democracy established by the Constitution. Restrictions, imposed by law, for limited purposes (even where they may incidentally diminish completely uninhibited discussion of issues of government or politics) may yet be compatible with the Constitution. It is only if the law in question is inconsistent with the intended operation of the system of government created by the Constitution that the implied constitutional prohibition has effect.
Conclusion: no invalid law: There is nothing in the general language of the Tasmanian legislation, conferring on the Supreme Court the power to grant interlocutory injunctions, that is inconsistent with the representative democracy created by, or implied in, the Constitution. Nor is this power itself incompatible with the representative democracy created by the Constitution. To the contrary, the power is a feature of that democracy.
53 Further, at , Kirby J noted that "this was a matter of federal concern .. because the product involved was wholly exported and the appellant is the national broadcaster, established by federal law with national functions."
54 To the extent that Kirby J. expressed a view in relation to the application of the implied freedom of political communication to matters pertaining to animal welfare, it was a view that was confined to the facts of the particular case. Most importantly, it was a view formulated on the basis that both of the parties to the proceedings were engaged in activities at a federal level. That is patently not the position with respect to the defendants. The evidence before the Court is silent with respect to the activities of the plaintiff, that is, whether the plaintiff exports its products.
55 Furthermore, even acknowledging the theoretical availability of the power to grant injunctive relief in the circumstances of Lenah Game Meats, his Honour was of the view that the type of relief sought by the plaintiff in this case is not inconsistent or incompatible with representative democracy, rather it is a feature of it. His Honour expressly recognised that the grant of an injunction to restrain the use of information such as photographs and film obtained as a result of a trespass, where that use would be unconscionable, was not in any way incompatible with the implied freedom of communication with respect to political matters.
56 In short, Kirby J's judgment in Lenah Game Meats does not support the defendants’ argument on this limb of the proposed defence. The proposed amendment would, in my view, be futile.
57 The plaintiff submits that the history of the proceedings discloses an element of delay by the defendants in the conduct of their case. The affidavit of Susan Goodman establishes that it took approximately 6 weeks for the plaintiff to properly serve the first defendant with the summons, that it took the first and second defendants over one year to file a properly pleaded defence, that the first and second defendants were over five months late in providing discovery, that the third defendant further failed to provide discovery in accordance with the Court's directions, that the defendants have failed to reply to the plaintiff's letter raising possible defects in the defendants’ discovery and finally, that the defendants have failed to file and serve their affidavit evidence despite being ordered to do so by 28 July 2009.
58 The defendants’ response to these submissions assert that to the extent that there has been delay it has been of a minimal nature and there has been delay on both sides. The defendants are represented by a firm of solicitors based in Melbourne and that has on occasions contributed to the late service and filing of documents.
59 Of more concern however, is the prospect of further delay in the setting of a hearing date, should the defendants be granted leave to amend. I have already adverted to the necessity for both sides to put on expert evidence in the event that the Court is required to decide whether the photographs and film depict any relevant cruelty in the treatment or maintenance of the pigs. I am not persuaded that any of the explanations advanced by the defendants for the failure to plead affirmative defences in compliance with the timetable set by James J are satisfactory.
60 These considerations alone may not have been sufficient to warrant a refusal of leave to amend, had the defendants been able to persuade the Court that the proposed defences were necessary in order to resolve the real issues in the proceedings or that they had any prospects of success. When they are taken into account, together with the conclusions I have reached with respect to the futility of the proposed defences, the outcome is even more compelling.
61 For all of the above reasons, I dismiss the defendants’ Notice of Motion with costs. | 2019-04-25T23:56:09Z | https://www.animallaw.info/case/windridge-farm-pty-ltd-v-grassi |
Ate Up With Motor is not intended for or directed to children under the age of 16. If you are younger than 16, you may not use the site. Furthermore, you may not submit comments, contact forms, or emails to this website unless you are at least 18 years old.
By accessing and using this website, you represent and warrant that you are at least 16 years of age (or at least 18 years of age if you use any of the comment or contact features), and that your use of the site is not contrary to any applicable U.S. Economic Sanctions and does not violate any other applicable law, regulation, or company policy (including, but not limited to, regulations or policies governing online conduct and acceptable content or any applicable law regarding the transmission of technical data exported from the United States or the country in which you reside).
You further agree to indemnify and hold harmless Ate Up With Motor and its web host, advertisers, contractors, vendors, partners, and licensors (and their respective directors, officers, employees, and agents) against any and all claims related to or arising out of your use of the Ate Up With Motor website and its content, including, without limitation, any any all claims arising from your use of, interactions with, or business transactions involving any external website or third party mentioned or linked herein, including Ate Up With Motor’s advertisers.
The Ate Up With Motor website or certain portions thereof may use Google APIs or content served via those APIs (such as Google Fonts and/or Google Hosted Libraries). You agree that your use of the site and such content will be in accordance with the Google APIs Terms of Service and applicable law.
All content on this site is presented for the reader’s general information and entertainment. While we strive to make the site content as complete and correct as we reasonably can, the content is provided “as is.” Except as otherwise required by law, or, in the case of material used or offered under license (see the Reprint/Reuse Policy), to the extent expressly required by the applicable license agreement, we make NO WARRANTY of any kind, expressed or implied, of the content’s accuracy, completeness, or fitness for any purpose, including, but not limited to, the repair, modification, purchase, appraisal, or sale of any vehicle. (The author of these articles is NOT a mechanic or automotive technician and is definitely NOT qualified to tell you how to fix or modify your car!) Your use of any information presented on this website is entirely at your own risk.
We also make no warranty, expressed or implied, of the availability of or continuous or uninterrupted access to the Ate Up With Motor website or its content.
Periodically, the site content may present estimates of exchange rates between the U.S. dollar and foreign currencies, and/or of the inflation-adjusted modern equivalent of historical dollar amounts. Such figures are approximate estimates, provided solely for the purposes of illustration and reader reference and are NOT intended as financial advice of any kind. We make no warranty whatsoever as to the accuracy of those figures or their fitness for any purpose. This is an automotive history site, not a reference for international currency trading or the historical value of money!
Ate Up With Motor shall have no liability for any failure or delay due to matters beyond our reasonable control.
Trade names, trademarks, and/or service marks mentioned or described on this site, including (but not limited to) the names and distinctive logos of automakers, model or trim level names, brand names or trade names of automotive technology or automotive suppliers, and names of other products or websites, are used here for purposes of identification, description, and/or commentary. Such marks remain the property of their respective owners.
Except as otherwise expressly indicated, we have neither any affiliation or partnership with nor any endorsement by the holders of such marks, and no such affiliation, partnership, or endorsement is implied. This is not an official website of any automaker or automotive brand.
Certain content presented here may use images, historical information, or other media supplied by one or more automakers or their press/PR representatives. Such cases will be noted in the acknowledgements and sources of the relevant content. The use of automaker-supplied images or media in site content does not indicate that the applicable content was in any way authorized, endorsed, or reviewed by that automaker.
The opinions expressed in the content published on the Ate Up With Motor website are solely those of the author and do not necessarily reflect the opinions of the trademark owners, any advertisers or commentators, or the site’s web host or vendors.
Ate Up With Motor runs paid text or banner advertisements from various advertisers, which may include new or used car dealers; auto insurers; and other businesses connected with the sale, repair, modification, or insurance of automobiles. Such paid advertisements, whether text links, banner ads, or in any other form, will be identified with words such as, as appropriate, “Sponsor,” “Sponsors,” “Sponsored Link(s),” “Sponsored Content,” “Advertisement,” “Advertisement(s),” or “Paid Promotion” (or by images or icons containing such words).
Except as otherwise explicitly indicated (e.g., in a review of a book or other product), references to, depictions of, or advertisements for products or services on Ate Up With Motor do not constitute a recommendation or endorsement by Ate Up With Motor of those products or services.
Links to other sites presented or referenced on the Ate Up With Motor website are provided solely for reader information or for the purposes of bibliographic reference. Unless otherwise required by law, Ate Up With Motor offers NO warranty and accepts NO responsibility or liability whatsoever for the content, appropriateness, legality, safety, utility, or fitness for any purpose of any external website not owned and/or operated by us (including, without limitation, the websites of any Ate Up With Motor advertisers) or for your use of such links, which is entirely at your own risk.
Payments to Ate Up With Motor (such as, without limitation, payments for advertising on the site or contributions made via the Support Ate Up With Motor feature) are subject to our Financial Transactions Policy.
You affirm that you are at least 18 years old. You may not leave a comment if you are younger than 18.
You warrant and affirm that your comment and/or use of our comment system does not violate any applicable law or regulation or infringe the copyrights or any other rights (such as publicity rights) of any other person or entity.
You agree to indemnify and hold harmless Ate Up With Motor, its proprietor, web host, contractors, partners, licensors, and advertisers (and their respective directors, officers, employees, and agents) against any claims related to or arising from your comment or its content.
Publish the comment and its contents (including the name/pseudonym you supply) on the Ate Up With Motor website. Note that if the website’s “Recent Comments” widgets are enabled, your name/pseudonym and a link to your comment may also appear (along with other recent comments) in the “Recent Comments” box(es), which may be visible on the home page and other areas of the website as well as the specific article you commented on. The contents of published comments may also appear in search results of the website’s search function.
Edit or redact the comment as we deem appropriate.
Make copies of the comment and its contents for routine backup or other internal administrative purposes.
Transmit the comment and its contents via email to the site administrator and, if applicable, to other users who have requested email notifications of replies or follow-up comments.
Send you email notifications of replies or follow-up comments, if you specifically request such notifications (which you may discontinue upon request).
In the event that your comment contains factual information pertaining to Ate Up With Motor content (for example, if you offer a correction or addendum), reflect the factual substance of your comment (for example, by making the noted correction) in the applicable content and record it in our research notes.
Comments are published on the Ate Up With Motor website at our sole discretion. Comments may be screened prior to publication to prevent spam or defuse contentious arguments. We do not guarantee that any comment you post will be published.
Its content exceeds the maximum length allowed by the comment box or otherwise disrupts the formatting or functionality of the site.
The comment appears to contain malicious code (such as viruses, worms, or Trojan horses) intended to disrupt the functionality of the site or attack users, or contains links to external sites containing such code.
The comment contains or constitutes spam.
The comment includes copyrighted material without appropriate authorization, or contains hyperlinks to such material, or violates the privacy of any person.
The comment violates or appears to violate FTC guidelines on the disclosure of paid endorsements (for example, if you recommend a business of which you are a paid spokesperson without disclosing that relationship in your comment).
The comment includes abusive language, ad hominem attacks, or defamatory content.
We believe the commenter was under the age of 18.
The comment was originally posted in reply to another comment that has been deleted.
Technical problems, such as site backups or upgrades to the comment system, may occasionally result in the inadvertent deletion of recent comments. If you have a question about why a comment was deleted or not published, feel free to contact us via email or the contact form. Again, we do not guarantee that any posted comment will be published.
Comments posted on Ate Up With Motor do not necessarily represent our opinions or those of our web host, advertisers, contractors, partners, or licensors. The publication or posting of a comment on Ate Up With Motor does NOT necessarily constitute our endorsement of any opinion, product, or service.
When you submit a comment, you may have the option to request email notifications each time a reply or follow-up comment is posted. If you have previously requested such notifications and wish to stop receiving them, please contact us via email (to admin (at) ateupwithmotor (dot) com), by using the Contact Form, or by leaving a comment elsewhere on the site asking us to discontinue the notifications and we will do so at our earliest opportunity.
Please note that if a comment is deleted from the website, archival copies of the original comment and its associated information may be retained in our records and/or backup files and archives created by us and/or our web host. Under certain rare circumstances — e.g., the restoration of the site from a backup file — a previously deleted comment may reappear. In such instances, we will endeavor to promptly delete any such comments, but we cannot guarantee it. If you notice that your previously deleted comment has reappeared, please let us know via email or the Contact Form and we will remove it as soon as possible.
Unless otherwise required by law, Ate Up With Motor accepts NO responsibility or liability for and makes NO warranty of any kind, expressed or implied, with regard to any user comment, including without limitation the comment’s accuracy or suitability for any purpose (including, but not limited to, the repair, modification, purchase, appraisal, or sale of any vehicle); or for the accuracy, utility, or legality of any external website linked in a user comment. Any use of the information contained in any comment on the Ate Up With Motor website, particularly comments containing mechanical advice, is entirely at your own risk.
We reserve the right to temporarily or permanently limit or deny access, either to the commenting feature and/or the site as a whole, to readers who are under age 18; whose comments have been unpublished and/or deleted for the above or any other reasons; or whose comments and/or other activities on the site we deem (in our sole judgment) to be abusive, disruptive, or constitute spam.
You affirm that you are at least 18 years old. We cannot respond to communications from persons under 18. If we receive a communication from a person we know or reasonably suspect to be under the age of 18, we will promptly delete all copies of the message without acknowledging or responding to it.
You authorize us to respond to your inquiry as appropriate via the email address or other contact information you provide. Please note that while we endeavor to respond to all inquiries, we cannot guarantee that you will receive a reply.
Unless you specifically request otherwise, if your message includes factual information, corrections, or clarifications pertaining to Ate Up With Motor content, you authorize us to reflect the factual substance of your message in the applicable content (for example, to make the noted correction or incorporate a point of fact, such as a specification or date).
If you provide us (whether via comment, contact form, email, or by other means) with significant assistance with Ate Up With Motor content (for example, if you supply images, suggest useful resources, or offer substantial factual corrections) or assist us in the resolution of a technical issue, we may elect to acknowledge you by name or pseudonym, generally in the “Acknowledgments” or “Notes on Sources” section of the applicable article(s), unless you have specifically asked us not to or if the context of your communications with us reasonably suggests that you prefer not to be acknowledged or identified. This acknowledgment will be limited to your name/pseudonym and the nature of your assistance and will not include your email address or other personal information unless you expressly request that we publish such additional information. However, in some cases, certain personal information may be obvious or implicit in such an acknowledgement — for example, the nature of your assistance might indicate where you work, or identify you as the owner of a particular car.
In the event that you have received such an acknowledgment here or on Ate Up With Motor’s associated social media accounts and would like us to remove it, please contact us via email at admin (at) ateupwithmotor (dot) com or the Contact Form and we will promptly delete the applicable acknowledgment(s). If you wish to alter or correct the acknowledgment (for example, to replace a pseudonym with your real name or vice versa), we will make our best efforts to accommodate your request so long as it does not infringe on the rights of others or attempt to impersonate some other individual or organization.
The following is our policy for the reuse of Ate Up With Motor content.
HYPERLINKS: You may publish, post, or otherwise share hyperlinks to the Ate Up With Motor website or to any individual page or post on the site.
ACCESSIBILITY AND TRANSLATION: You are free to use accessibility aids or software (such as screen readers or automated text-to-speech readers) in any reasonable manner for purposes of enabling you to access the site and read or view its content. You are also free to translate the written content into languages other than English (either using automatic translation software or by some other means) for your personal use or internal reference or for the purposes of creating bibliographic citations in languages other than English.
Written content we offer under a specific license: If we explicitly indicate that a specific portion of the site’s written content (for example, a particular article or page) is offered under a Creative Commons or similar license — details of which will be specified within or adjacent to the applicable content — you may copy or use that portion of the content in any manner allowed under the applicable license or otherwise permitted by law. Except as expressly required by the terms of the applicable license or otherwise required by law, we offer NO WARRANTY whatsoever with regard to any material we offer under such a license, including, without limitation, the associated copyright and other rights information. Any use of such material is entirely at your own risk.
Images we offer under a specific license: If we explicitly indicate that a specific image owned by us is offered under a Creative Commons or similar license — details of which will be specified in the applicable image caption or otherwise adjacent to the image — you may copy or use that image in any manner allowed under the applicable license or otherwise permitted by law. Except as expressly required by the terms of the applicable license or otherwise required by law, we offer NO WARRANTY whatsoever with regard to any images we offer under such a license, including, without limitation, the accuracy or completeness of any associated copyright and other rights information. Any use of such material is entirely at your own risk.
All other images: Except as specified above or otherwise allowed by applicable law, you may NOT copy, reuse, or redistribute any of the photos or other images on the site without our prior written permission or, for images not owned by us, the permission of the applicable rights holder(s). If an image is not owned by us, you are of course free to contact the creator or rights holder directly for reuse permission; we cannot grant such permission. If the rights holder authorizes you to reuse their image(s), you do not need any additional permission from us to do so.
COMMENTS: Comments posted on Ate Up With Motor are the property of the people who originally posted those comments. Except as otherwise allowed by applicable law, if you wish to reprint or reuse a comment posted on this website by someone other than us, you will need to seek the permission of the original poster (or other applicable rights holder(s)). We cannot grant such permission, although if you obtain the permission of the original poster/rights holder(s) to reprint or reuse their comment, you do not need any additional permission from us unless you also wish to reprint our comments and/or other content owned by us (for instance, if you want to reprint a comment thread between us and one or more other site visitors). The same is true of photographs, images, or other non-text content in comments left by people other than us.
OTHER ELEMENTS: Some elements of the Ate Up With Motor website are neither written content nor images (e.g., scripts or font files). Most of those elements are used under license. In the event we distribute any such non-text/non-image elements (for example, if one of our articles allows you to download an electronic file that includes an open source font package), you may use those elements in any manner allowed by the specified license (or any other license or terms offered by the applicable rights holder(s)), or as otherwise permitted by law. Except as expressly required by the terms of the applicable license or otherwise required by law, we offer NO WARRANTY whatsoever with regard to any such non-text/non-image elements, including, without limitation, the accuracy or completeness of any associated license, copyright, and other rights information. Any use of such elements is entirely at your own risk.
TRADEMARK REUSE: You may NOT use the Ate Up With Motor name, logo, or any related trademarks or service marks for any commercial purpose without our advance written permission.
If you have any questions, or you are interested in reprinting, excerpting, or translating any Ate Up With Motor content (e.g., for your own website or book), please send us a note using the Contact Form.
The following terms and conditions shall apply to any photograph, illustration, or other image (“Images”) you provide to us for use on Ate Up With Motor. Please note that if you choose to make your Images available under a Creative Commons or other similar license (which you are in no way obliged to do), you may elect to have us use your Images under that license rather than the terms listed here. Also, if you complete the Image Authorization Form or make some other license agreement, contract, editorial release, or other legal arrangement with us regarding the use of your Images, those terms will apply instead of the ones below.
You affirm that the Images are (a) your own, original work(s), and wholly owned by you, (b) verifiably in the public domain, or (c) otherwise owned and/or administered by you. In the event that the Images are not your own work, you must inform us of their legal authorship and your rights to publish/distribute them.
You affirm that you have the legal right to use and license the Images.
You agree to indemnify Ate Up With Motor, its web host, and its advertisers and affiliates against any claims related to your ownership and/or authorship of the Images, your rights to use or license the Images, and/or your representations of your ownership, authorship, and/or rights.
You grant Ate Up With Motor a worldwide, non-exclusive, royalty-free license to publish the Images on the Ate Up With Motor website, with the understanding that Ate Up With Motor will not publish or otherwise distribute the Images by any other means or license the Images to any other website or entity (except as specifically required to display the Images on the Ate Up With Motor website or for routine backup or other internal administrative purposes) without your prior authorization.
In the event that you sell, publish, or otherwise license the Images to any other publication or entity in any manner that would conflict with or rescind the license granted to Ate Up With Motor hereunder (e.g., if you sell exclusive rights to a photograph to a magazine or news service), or if you elect to cancel or otherwise rescind Ate Up With Motor’s license to use the Images for any other reason, you agree to notify Ate Up With Motor in writing or via email at least seven (7) days prior to the effective date of such sale, license, or cancellation, to allow time to remove the Images from the Ate Up With Motor website.
You understand and agree that in the event you cancel or otherwise rescind the license granted to Ate Up With Motor herein, Ate Up With Motor may retain archival copies of the Images for administrative purposes, or as part of backup files created by Ate Up With Motor or its web host. However, Ate Up With Motor will not publish or otherwise distribute such copies without your authorization.
You understand and acknowledge that we reserve the right to decline to use or to remove any Images from the Ate Up With Motor website at any time, with or without notice.
Your legal name and contact information, including your email address.
A detailed description of the applicable work(s).
The location of the work(s) on the Ate Up With Motor site (including the URL and page number, as applicable).
You have the good faith belief that the use of the applicable work is (1) not authorized by the owner of the work and (2) not otherwise permitted by law.
Your signature, either physical or electronic.
If the material in question was provided to us by a third party, you expressly authorize us to forward your claim to that third party.
Ate Up With Motor will take reasonable efforts to terminate access to the website by a visitor who is determined to be a repeat infringer of copyrights or other intellectual property rights (e.g., by blocking the user’s IP address).
If you wish to terminate this agreement, you may simply discontinue using the Ate Up With Motor website. Ate Up With Motor may terminate your access to any or all part of the website, with or without cause or notice, at any time.
These terms may be modified from time to time, at our sole discretion. Your continued use of and access to the site signifies your acceptance of any such modifications. If you disagree with any of the changes, you should stop using or accessing the Ate Up With Motor website.
However, any dispute that arose before the changes shall be governed by the terms that were in place when the dispute arose.
The effective date of this version is Tuesday, April 9, 2019.
April 9, 2019: Under Use of Trademarks, changed “we have no affiliation or partnership with” to “we have neither any affiliation or partnership with” for grammatical purposes. Under Disclaimer of Warranties, changed “the site content may contain” to “the site content may present” for similar reasons.
March 23, 2019: Made a minor amendment to the Use of User-Submitted Images terms to note that if you fill out the Image Authorization Form or make some other type of image-use/licensing agreement with us, those terms will apply instead of the ones listed in that section, as with Creative Commons licenses.
March 6, 2019: Updated the FTC Disclosure Notice: Paid Advertisements and Endorsements section to add “Paid Promotion” to the list of words that may be used to identify paid advertising or links. Changed the beginning of that sentence from “All such …” to “Such …”; changed “will be identified with the words …” to “will be identified with words such as, as appropriate, …”; and changed “or by images or icons containing those words” to “or by images or icons containing such words.” Made a clarification to the entry in this revision list for February 28, 2019, to clarify what we changed at that time.
March 4, 2019: Fixed some punctuation issues.
February 6, 2019: Amended the language about the Google Fonts API to also include Google Hosted Libraries. Amended the Comment Policy to revise and expand the language regarding responding to your comments via email, also consolidating it with the related bullet point for clarity.
February 3, 2019: Under Reprint/Reuse Policy, made some minor adjustments to the examples listed in Accessibility and Translation.
February 1, 2019: Fixed some typos, updated text styles, and edited link titles on this page for better accessibility.
January 27, 2019: Further minor streamlinging of Reprint/Reuse Policy, changing “Except as expressly required under the terms of the applicable Creative Commons or other license or otherwise required by law” to “Except as expressly required by the terms of the applicable license or otherwise required by law” throughout (and changing an instance of “under the terms” to “by the terms”). Fixed a typo earlier in this list. In the preamble, changed “this website and its content” to “this website, its content, and related services such as the ateupwithmotor.com email addresses” and added two new paragraphs explaining that these terms don’t apply to our business dealings unrelated to Ate Up With Motor and that third-party sites or services linked from Ate Up With Motor (or on which we have accounts) have their own terms.
January 16, 2019: Clarified warranty disclaimer language in Reprint/Reuse Policy. Fixed a typo on this list (the date of the prior modification was supposed to be 2019).
January 13, 2019: Updated Reprint/Reuse Policy with a subsection on elements that are neither written content nor images.
November 29, 2018: Added warranty disclaimer language to the Reprint/Reuse Policy bullet points regarding content we offer under license.
November 28, 2018: Clarified the Reprint/Reuse Policy by changing “copyright and rights information” to “copyright and other rights information” (with or without an Oxford comma) and (in the Comments bullet point) changing “reprint our comments …” to “reprint our comments and/or other content owned by us …” Also added “… or, for content not created by us, the authorization of the applicable rights holder” to the “All Other Written Content” bullet point; changed “Again, these stipulations do NOT apply to public domain material or material used or offered under license as specified above” to “Again, these stipulations do NOT apply to public domain material or material used or offered under a Creative Commons or similar license, as specified above”; changed “specified adjacent to the applicable …” to “specified within or adjacent to” throughout that section; and changed “by the applicable Creative Commons or other license agreement” to “under the terms of the applicable Creative Commons or other license”.
November 27, 2018: Updated the Reprint/Reuse Policy to move the “no warranty” text regarding licensed images to the applicable bullet points, amending the wording slightly to align with the similar wording under the licensed text bullet point above. Added similar “no warranty” text to the bullet point on public domain text.
October 16, 2018: Fixed a typographical error in this revision list. Updated the preamble text to emphasize that we’re based in the U.S. and updated some text formatting. Minor wording clarification to Governing Law text.
September 29, 2018: Updated Comment Policy to note that published comments may appear in search results of the website’s search function.
September 28, 2018: Updated and clarified/streamlined Comment Policy, adding additional information about email notifications and modifying/deleting comments.
September 26, 2018: Clarified Comment Policy text about the Recent Comments widgets (including noting that there is more than one such widget).
September 5, 2018: Updated Contact Form and Email Communication Policy to note that if you contact us via a non-Ate Up With Motor email address or account, we will typically forward the message to the applicable Ate Up With Motor account/address and respond from there.
August 31, 2018: Changed contact email for changing an Acknowledgment of User Assistance to admin (at) ateupwithmotor (dot) com. Updated Contact Form and Email Communication Policy to clarify that the item pertaining to publishing inquiries refers to Contact Form and Advertise with Us form submissions.
August 29, 2018: Updated Comment Policy to note that comments you submit may appear in the Recent Comments area. Changed “pseudonym” to “name/pseudonym” in that bullet point for clarity. Added a subsection on comments to the Reprint/Reuse Policy. Added a link to the Financial Transactions Policy.
August 11, 2018: Clarified the wording of the Contact Form and Email Communication Policy section related to publishing excerpts of your inquiries, including adding “safety” to the phrase “provided that it does not infringe the rights or safety …” Adding a clarifying point to the Acknowledgments of User Assistance section about certain personal information being implicit in the nature of some forms of assistance. Updated the Use of User-Supplied Images terms to match the current version of the Image Authorization Form.
July 13, 2018: Further cleaned up age restriction language to avoid confusion, tidied up the preamble wording and formatting, and noted that we’ve borrowed a few bits and pieces from more recent versions of the WordPress.com TOS under the same CC BY-SA license.
July 4, 2018: Minor change to the Use of User-Supplied Images to match the wording of the updated authorization form: changed “for the specific purpose of displaying the Images on the Ate Up With Motor website or for routine backup or other internal administrative purposes” to “for the specific purposes of displaying the Images on the Ate Up With Motor website, clearly indicating their provenance, and for routine backup or other internal administrative purposes.” Clarified Contact and Email Communication Policy by amending “respond to your inquiry as appropriate via the email address you provide” to “respond to your inquiry as appropriate via the email address or other contact information you provide.” Clarified Comment Policy to make clear that we may reply to your comment via email. Minor editorial corrections.
May 25, 2018: Amended Comment Policy to clarify editing/deletion procedures. Minor editorial correction to replace double dashes with em dashes.
May 20, 2018: Updated Use of User-Supplied Images to include additional language about personal information in images.
May 10, 2018: Changed age restriction language from 13 to 16.
April 4, 2017: Updated links from http to https.
May 15, 2016: Clarified that Ate Up With Motor may make copies of comments, form submissions, and/or User-Submitted Images for routine backup or other internal administrative purposes.
February 1, 2016: Clarified recent revision list, added version date for Automattic TOS to attribution section.
January 17, 2016: Clarified the Public domain images section of Reprint/Reuse Policy: “We impose no conditions on such reuse” –> “We impose no conditions on such reuse (other than any conditions that applicable law may expressly require)”. Clarified the Images used under license section: “you are free to copy or use the image(s)” –> “you are free to copy or use the licensed image(s)”.
January 16, 2016: Clarified Reprint/Reuse Policy to make clear that our modified/adapted versions of public domain images may also be freely used.
January 13, 2016: Added note to preamble clarifying that variations in text style have no legal significance. Editorial corrections to past revision list.
January 6, 2016: Clarification of revision list. Clarified Disclaimer of Warranties: “Except as otherwise required by law or as expressly required under the terms of an applicable license agreement (see the href=”#Reprints”>Reprint/Reuse Policy)” –> “Except as otherwise required by law, or, in the case of material used or offered under license (see the Reprint/Reuse Policy), to the extent expressly required by the applicable license agreement”. ETA: Added Google API ToS information to Representations and Indemnification section.
December 31, 2015: Minor clarification of Reprint/Reuse Policy regarding reuse of licensed content.
December 29, 2015: Editorial corrections. Clarified that Use of User-Supplied Images terms do not apply to Creative Commons licenses unless you authorize us to use your images under these terms instead of the Creative Commons license. Amended “You understand that” in point 7 of those terms to “You understand and agree.” Clarified that this entire policy is available under CC BY-SA 4.0. Added “except as otherwise required by law or to the extent expressly required under the terms of an applicable license agreement” and “of any kind” to Disclaimer of Warranties. Updated warranty disclaimer in Comment Policy. Updated disclaimers of warranties in Reprint/Reuse Policy regarding licensed material and struck the word “original” in that section.
December 28, 2015: Streamlined portions of Reprint/Reuse Policy dealing with reusing text/written content. Deleted “(to whatever extent they legally constitute a derivative work or adaptation in your jurisdiction)” from the Reusing Images section of Reprint/Reuse Policy. Added note regarding version history of the Automattic terms. Editorial corrections.
December 24, 2015: Added link to Automattic Inc. main site. Added “contractors” to indemnification list. Clarified hotlinking policy. Added “except as specifically required by any applicable Creative Commons or other license or otherwise required by law” stipulation to disclaimer of warranties in Reprint/Reuse Policy.
December 23, 2015: Editorial corrections.
December 22, 2015: Streamlining of Reprint/Reuse Policy; editorial and formatting changes; added more detailed recent revision list. Clarified licensing notes for this policy.
December 21, 2015: Clarification of Reprint/Reuse Policy.
December 13, 2015: Added note explicitly allowing use of accessibility tools.
December 9, 2015: Editorial and formatting changes.
December 6, 2015: Added additional “no warranty” language to Reprint/Reuse Policy. Editorial corrections.
November 16, 2015: Editorial changes. Clarified Reprint/Reuse Policy and added note indicating that we can’t provide legal advice regarding licenses.
October 30, 2015: Clarification of Reprint/Reuse Policy.
October 23, 2015: Added clearer Contact Form and Email Communication Policy. Noted that grant of rights in Comment Policy is nonexclusive.
August 24, 2015: Extensive update based on the Automattic Inc. TOS language noted above (version dated 30 June 2015). Added new preamble; new Limitation of Liability, Governing Law, and Termination; Severability sections; retitled Indemnification section to Representations and Indemnification with revised language; retitled No Warranty to Disclaimer of Warranties with revised language; added note to Revisions section regarding disputes and changes of version. Reorganized and revised Comment Policy for greater clarity, added contractors, partners, licensors, and employees to comment indemnification. Clarified that we may publish excerpts of messages received via the comment forms to support other users or clarify your request. Added Trademark Use to Reprint/Reuse Policy. Revised Copyright Violations language. Various minor wording and editorial changes throughout. Added BY-SA 4.0 licensing. | 2019-04-23T12:51:04Z | https://ateupwithmotor.com/terms-and-conditions/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.